CN113259450A - Transaction management system based on block chain fragmentation - Google Patents

Transaction management system based on block chain fragmentation Download PDF

Info

Publication number
CN113259450A
CN113259450A CN202110595082.9A CN202110595082A CN113259450A CN 113259450 A CN113259450 A CN 113259450A CN 202110595082 A CN202110595082 A CN 202110595082A CN 113259450 A CN113259450 A CN 113259450A
Authority
CN
China
Prior art keywords
transaction
data
module
address
sender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110595082.9A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Xunru Electronic Technology Co ltd
Original Assignee
Suzhou Xunru Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Xunru Electronic Technology Co ltd filed Critical Suzhou Xunru Electronic Technology Co ltd
Priority to CN202110595082.9A priority Critical patent/CN113259450A/en
Publication of CN113259450A publication Critical patent/CN113259450A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Accounting & Taxation (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Power Engineering (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a transaction management system based on blockchain fragments, which comprises a transaction fragment module, a routing design module, a transaction protection module and a transaction module, and also discloses a transaction management method based on blockchain fragments, conducting transaction slicing on the blockchain according to the transaction type, distributing blockchain link points to each transaction slice according to needs, constructing a virtual node in each transaction slice to manage the transaction slices, selecting a storage path for transaction data generated by the transaction fragments, designing a routing mechanism for transaction data transmission, completing the safe storage and transmission of the transaction data, and when in transaction, the invention provides a method for keeping data integrity and data transaction safety, which can improve the efficiency of a system in data transaction.

Description

Transaction management system based on block chain fragmentation
Technical Field
The invention relates to the technical field of block chain fragment management, in particular to a transaction management system based on block chain fragments.
Background
The value of data transaction is brought into play to a great extent due to the arrival of a big data era, meanwhile, when people perform data transaction, the privacy and safety requirements of the data transaction process are correspondingly improved, the technologies such as digital currency, distributed accounts and the like in the block chain technology are widely applied in a plurality of fields, but the block chain technology has certain limitation in the data transaction process, and the transaction performed by utilizing the block chain technology can perform reliable transaction through nodes in the block chain, but the dependence on the nodes is overlarge, so that the transaction efficiency is influenced;
in the existing system, when data transaction is performed through the existing transaction platform, certain problems exist in data security and personal privacy, and the following are specifically included:
1. in the prior art, many systems share information among a plurality of organization devices by using the characteristic that a blockchain data record cannot be tampered and counterfeited, have the characteristic of openness and transparency, and apply a blockchain technology to a data transaction management process, so that the data security of transaction cannot be guaranteed;
2. in the prior art, part of systems encrypt data in a block chain by a simple encryption method, but the simple encryption method cannot meet the high security of data transaction, once a transaction channel is attacked, the data is easy to leak or be tampered, the data affects both transaction parties, and the transaction efficiency is correspondingly reduced;
therefore, a need exists for a blockchain fragmentation-based transaction management system that can improve transaction efficiency and ensure the security of transaction processes to solve the above problems.
Disclosure of Invention
The invention aims to provide a transaction management system and method based on blockchain fragments to solve the problems in the background technology.
In order to solve the technical problems, the invention provides the following technical scheme: a transaction management system based on blockchain fragmentation comprises a transaction fragmentation module, a routing design module, a transaction protection module and a transaction module;
the transaction slicing module carries out transaction slicing on the block chain according to the transaction type, distributes block chain links to each transaction slice as required, and simultaneously constructs a virtual node in each transaction slice to manage the transaction slices;
the routing design module is used for selecting a storage path for transaction data generated by the transaction fragments, designing a routing mechanism for transaction data transmission, and finishing the safe storage and transmission of the transaction data;
the transaction protection module is used for encrypting and protecting data information in transaction, encrypting the data before the transaction is carried out, and safely decrypting the transaction data when the transaction reaches a destination;
the transaction module is used for monitoring the transaction process in real time, broadcasting the transaction completion status to the whole transaction path within a fixed time interval and reminding the transaction path to enter a busy hour waiting state.
Further, the transaction fragmentation module comprises a block chain fragmentation unit, a node partitioning unit and a virtual construction unit;
the block chain fragmentation unit is used for fragmenting transactions and storing fragmented transaction data in different block chain units;
the node partitioning unit divides the nodes according to the length of the transaction data in the blockchain unit, inserts identification nodes into random positions in the blockchain unit according to the node partitioning sequence, and identifies the transaction fragments and the positions of the nodes in the current blockchain unit;
the virtual construction unit is used for generating a virtual address and a virtual random key of a transaction sender;
the virtual address is generated by hash processing, and the IP address of the transaction sender is determined according to a formula:
Figure 1
wherein M isIPFor encrypted virtual addresses, fuThe method is a random hash function of a transaction sender u, IP is an IP address of the transaction sender, K is a hash floating value generated randomly, m is the length of the IP address of the transaction sender, and the generation of a virtual address can protect personal information of both parties of a transaction and avoid personal information leakage in the transaction process.
Further, the routing design module comprises a storage path selection unit, a routing mechanism selection unit and a transaction data cloud backup unit;
the storage path selection unit broadcasts the virtual address generated by the virtual construction unit in a transaction network, a transaction sender takes a network address sending a response message as a transaction receiver address after receiving a response, the transaction receiver stores the current path and the transaction sender address, and the transaction sender starts to formally send transaction data after successfully receiving the broadcast response, so that whether the current transaction channel can smoothly complete the transaction can be judged, the safety of the transaction data in the sending process is improved, and the transaction can be smoothly completed;
after the routing mechanism selection unit determines the address of the transaction sender, an adaptive routing mechanism is selected to establish connection between all channels between the transaction sender and the transaction receiver, transaction data fragments are sequentially placed in all the channels, and meanwhile, the first transaction data fragment in all the channels is sent;
the transaction data cloud backup unit uploads all transaction data transmission related information to the cloud for backup storage after a first transaction data fragment is received by a transaction receiver, wherein the transaction data transmission related information comprises storage information in the storage path selection unit, time required for completing one-time transaction data fragment sending, maximum fragment allowing length of a path, path response time and path time delay.
Further, the transaction protection module comprises an encryption protection unit and a decryption protection unit;
the encryption protection unit comprises an address encryption unit and a data encryption unit, wherein the address encryption unit is used for generating a pair of public and private keys before transaction, deriving a corresponding encrypted virtual address from the public key, and the data encryption unit is used for encrypting the specific contents of all transaction data fragments through the private key and setting timing for re-encryption in the transaction process;
the address encryption unit generates a private key with the length of 32 bits by specifying a hyperbola through a system, and maps the private key with the length of 32 bits into a public key with the length of 65 bits to form a key pair (K)S,KG) In which K isSIs a private key, KGThe public key is subjected to Hash hash processing, and the last 20 bits of a processing result are taken to generate an encrypted address;
the private key is mapped to the public key according to the formula:
Figure DEST_PATH_IMAGE004
wherein, KGIs a public key, fuA random hash function for the sender of the transaction, e assigning the hyperbolic eccentricity to the system,
Figure DEST_PATH_IMAGE006
specifying a hyperbolic quasi-line equation for the system, and mapping a private key to a hyperbolic curve after hash processing to obtain a public key;
the data encryption unit carries out multi-round replacement encryption on transaction data by using a 32-bit private key and simultaneously sends encrypted ciphertext and a public key to a transaction receiver;
the transaction data is subjected to multiple rounds of replacement encryption according to a formula:
Figure DEST_PATH_IMAGE008
wherein, PnTo permute the encrypted transaction data n times,
Figure 7
for the inverse operation of the (n-1) th permutation, KSThe value is a private key, and the value is not carry addition;
the decryption protection unit carries out address verification through the public key after the transaction receiver receives the first piece of transaction data, sends a continuous transaction response to the transaction sender after the address verification is passed, and then decrypts the private key according to the public key and decrypts the transaction data through the private key;
the transaction protection module generates different keys when different transactions are carried out each time, meanwhile, a system user can set a key exchange time interval by himself, and key exchange can be carried out on fragments which are not finished to be sent even if the current transaction is not finished in a certain time interval, so that the safety of data transaction is further improved on the basis of ensuring one-time pad.
Further, the transaction module comprises a monitoring unit and a broadcast query unit;
the monitoring unit is used for monitoring the transaction process, checking whether all the fragments are successfully transmitted in the transaction process, monitoring the transaction access condition, and reminding both transaction parties of suspending transaction in time when the transaction access fails;
the broadcast inquiry unit is used for sending detection broadcast to all transaction channels, inquiring the current busy state of the channels, reminding the sending of the next transaction data fragment to enter an advanced waiting state according to the transaction data transmission related information, and entering the next transaction data fragment sending process when the channel is idle for the next second, so that the transaction completion time can be shortened, the system transaction efficiency is improved, and the transaction process is always kept to be smoothly carried out.
A transaction management method based on blockchain fragments comprises the following steps:
step S1, performing transaction slicing on the block chain according to the transaction type, distributing the block chain links to each transaction slicing as required, and simultaneously constructing virtual nodes in each transaction slicing to manage the transaction slicing;
step S2, selecting a storage path for the transaction data generated by the transaction fragment, designing a routing mechanism for transaction data transmission, and completing the safe storage and transmission of the transaction data;
step S3, encrypting the data information of the transaction, encrypting the data before the transaction, and safely decrypting the transaction data when the transaction reaches the destination;
step S4, real-time monitoring the transaction process, and broadcasting the transaction completion status to the whole transaction path within a fixed time interval to remind the transaction path to enter a busy waiting state.
Further, the step S1 includes the following steps:
step S11, the transaction is fragmented, and the fragmented transaction data is stored in different block chain units;
step S12, dividing the nodes according to the length of the transaction data in step S11, inserting identification nodes into random positions in the blockchain unit according to the node partition sequence, and identifying the positions of the transaction fragments and the nodes in the current blockchain unit;
step S13, generating a virtual address and a virtual random key of a transaction sender;
the virtual address is generated by hash processing, and the IP address of the transaction sender is determined according to a formula:
Figure 100002_2
wherein M isIPFor encrypted virtual addresses, fuIs a random hash function of the transaction sender u, IP is the transaction sender IP address, K is a randomly generated hash floating value, and m is the transaction sender IP address length.
Further, the step S2 includes the following steps:
step S21, the virtual address generated in the step S12 is broadcasted in the transaction network, after the transaction sender receives the response, the network address sending the response message is used as the address of the transaction receiver, and the transaction receiver stores the current path and the address of the transaction sender;
step S22, after determining the address of the transaction sender, selecting an adaptive routing mechanism to establish connection between all the paths between the transaction sender and the transaction receiver, putting the transaction data fragments into all the paths in sequence, and sending the first transaction data fragment in all the paths;
and step S23, after the first transaction data fragment is received by the transaction receiver, uploading all the transaction data transmission related information to the cloud for backup storage.
Further, the step S3 includes the following steps:
step S31, generating a pair of public-private key pairs before transaction, and performing address encryption and data encryption according to the public-private key, including the following steps:
step S311, a hyperbola is specified by the system to generate a private key with the length of 32 bits;
step S312, mapping the 32-bit private key to a 65-bit public key to form a key pair (K)S,KG) In which K isSIs a private key, KGThe public key is subjected to Hash hash processing, and the last 20 bits of a processing result are taken to generate an encrypted address;
the private key is mapped to the public key according to the formula:
Figure DEST_PATH_IMAGE004A
wherein, KGIs a public key, fuA random hash function for the sender of the transaction, e assigning the hyperbolic eccentricity to the system,
Figure 695309DEST_PATH_IMAGE006
specifying a hyperbolic quasi-line equation for the system, and mapping a private key to a hyperbolic curve after hash processing to obtain a public key;
step S313, performing multi-round replacement encryption on the transaction data by using a 32-bit private key, and simultaneously sending the encrypted ciphertext and the public key to a transaction receiver;
the transaction data is subjected to multiple rounds of replacement encryption according to a formula:
Figure DEST_PATH_IMAGE008A
wherein, PnTo permute the encrypted transaction data n times,
Figure 6
for the inverse operation of the (n-1) th permutation, KSThe value is a private key, and the value is not carry addition;
and step S32, after the transaction receiver receives the first piece of transaction data, the address verification is carried out through the public key, after the address verification is passed, a continuous transaction response is sent to the transaction sender, and then the private key is decrypted according to the public key for the transaction data content, and the transaction data is decrypted through the private key.
Further, the step S4 includes the following steps:
step S41, monitoring the transaction process, checking whether all the fragments are successfully transmitted in the transaction process, monitoring the transaction access condition, and reminding both transaction parties of suspending the transaction in time when the transaction access fails;
and step S42, sending detection broadcast to all transaction channels for inquiring the current busy state of the channels, reminding the next transaction data fragment sending to enter an advanced waiting state according to the transaction data transmission related information, and entering the next transaction data fragment sending process when the channel is idle for the next second.
Compared with the prior art, the invention has the following beneficial effects: the invention combines the cryptographic technology and the block chain technology to carry out data transaction privacy protection, improves the security of the transaction process by technical means such as one-time pad and random key, segments the transaction data, and utilizes a plurality of channels to carry out broadcast transmission after each segment is marked, thereby improving the transaction efficiency, avoiding data loss, saving time for user transaction, simultaneously avoiding data transaction failure caused by channel failure due to the arrangement of a monitoring unit and a broadcast query unit, and preventing the data from being maliciously distorted or maliciously attacked in the interaction process by using the encryption means, thereby preventing the loss of correct data and influencing the transaction completion.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a block chain fragmentation based transaction management system according to the present invention;
fig. 2 is a flowchart illustrating a transaction management method based on blockchain fragmentation according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, the present invention provides the following technical solutions: a transaction management system based on blockchain fragmentation comprises a transaction fragmentation module, a routing design module, a transaction protection module and a transaction module;
the transaction slicing module carries out transaction slicing on the block chain according to the transaction type, distributes block chain links to each transaction slice as required, and simultaneously constructs a virtual node in each transaction slice to manage the transaction slices, and the method comprises the following steps:
step S11, the transaction is fragmented, and the fragmented transaction data is stored in different block chain units;
step S12, dividing the nodes according to the length of the transaction data in step S11, inserting identification nodes into random positions in the blockchain unit according to the node partition sequence, and identifying the positions of the transaction fragments and the nodes in the current blockchain unit;
step S13, generating a virtual address and a virtual random key of a transaction sender;
the virtual address is generated by using hash processing, and the IP address of the transaction sender is according to a formula:
Figure 3
wherein M isIPFor encrypted virtual addresses, fuIs a random hash function of the transaction sender u, IP is the transaction sender IP address, K is a randomly generated hash floating value, and m is the transaction sender IP address length.
The route design module is used for selecting a storage path for transaction data generated by the transaction fragments, designing a route mechanism for transaction data transmission, and finishing the safe storage and transmission of the transaction data, and comprises the following steps:
step S21, the virtual address generated in step S12 is broadcasted in the transaction network, after the transaction sender receives the response, the network address sending the response message is used as the address of the transaction receiver, and the transaction receiver stores the current path and the address of the transaction sender;
step S22, after determining the address of the transaction sender, selecting an adaptive routing mechanism to establish connection between all the paths between the transaction sender and the transaction receiver, putting the transaction data fragments into all the paths in sequence, and sending the first transaction data fragment in all the paths;
step S23, after the first transaction data fragment is received by the transaction receiver, all the transaction data transmission relevant information is uploaded to the cloud for backup storage, and the transaction data transmission relevant information comprises storage information in the storage path selection unit, time required for completing one-time transaction data fragment sending, path permission maximum fragment length, path response time and path time delay.
The transaction protection module is used for encrypting and protecting data information in transaction, encrypting the data before the transaction is carried out, and safely decrypting the transaction data when the transaction reaches a destination, and comprises the following steps:
step S31, generating a pair of public-private key pairs before transaction, and performing address encryption and data encryption according to the public-private key, including the following steps:
step S311, a hyperbola is specified by the system to generate a private key with the length of 32 bits;
step S312, will 3The 2-bit private key is mapped to a 65-bit public key to form a key pair (K)S,KG) In which K isSIs a private key, KGThe public key is subjected to Hash hash processing, and the last 20 bits of a processing result are taken to generate an encrypted address;
the private key is mapped to the public key according to the formula:
Figure DEST_PATH_IMAGE004AA
wherein, KGIs a public key, fuA random hash function for the sender of the transaction, e assigning the hyperbolic eccentricity to the system,
Figure 861028DEST_PATH_IMAGE006
specifying a hyperbolic quasi-line equation for the system, and mapping a private key to a hyperbolic curve after hash processing to obtain a public key;
step S313, performing multi-round replacement encryption on the transaction data by using a 32-bit private key, and simultaneously sending the encrypted ciphertext and the public key to a transaction receiver;
the transaction data is subjected to multiple rounds of replacement encryption according to a formula:
Figure 4
wherein, PnTo permute the encrypted transaction data n times,
Figure 5
for the inverse operation of the (n-1) th permutation, KSThe value is a private key, and the value is not carry addition;
and step S32, after the transaction receiver receives the first piece of transaction data, the address verification is carried out through the public key, after the address verification is passed, a continuous transaction response is sent to the transaction sender, and then the private key is decrypted according to the public key for the transaction data content, and the transaction data is decrypted through the private key.
The transaction module is used for monitoring the transaction process in real time, broadcasting the transaction completion status to the whole transaction path within a fixed time interval and reminding the transaction path to enter a busy hour waiting state, and comprises the following steps:
step S41, monitoring the transaction process, checking whether all the fragments are successfully transmitted in the transaction process, monitoring the transaction access condition, and reminding both transaction parties of suspending the transaction in time when the transaction access fails;
and step S42, sending detection broadcast to all transaction channels for inquiring the current busy state of the channels, reminding the next transaction data fragment sending to enter an advanced waiting state according to the transaction data transmission related information, and entering the next transaction data fragment sending process when the channel is idle for the next second.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in the claims should not be considered as limiting the involved transaction slicing of the blockchain according to the transaction type, distributing the blockchain nodes to each transaction slice as required, and constructing virtual nodes in each transaction slice to manage the transaction slices;
step S2, selecting a storage path for the transaction data generated by the transaction fragment, designing a routing mechanism for transaction data transmission, and completing the safe storage and transmission of the transaction data;
step S3, encrypting the data information of the transaction, encrypting the data before the transaction, and safely decrypting the transaction data when the transaction reaches the destination;
step S4, real-time monitoring the transaction process, and broadcasting the transaction completion status to the whole transaction path within a fixed time interval to remind the transaction path to enter a busy hour waiting state and claim.

Claims (1)

1. A transaction management system based on blockchain fragments is characterized by comprising a transaction fragment module, a route design module, a transaction protection module and a transaction module;
the transaction slicing module carries out transaction slicing on the block chain according to the transaction type, distributes block chain links to each transaction slice as required, and simultaneously constructs a virtual node in each transaction slice to manage the transaction slices;
the routing design module is used for selecting a storage path for transaction data generated by the transaction fragments, designing a routing mechanism for transaction data transmission, and finishing the safe storage and transmission of the transaction data;
the transaction protection module is used for encrypting and protecting data information in transaction, encrypting the data before the transaction is carried out, and safely decrypting the transaction data when the transaction reaches a destination;
the transaction module is used for monitoring the transaction process in real time, broadcasting a transaction completion condition to the whole transaction path within a fixed time interval and reminding the transaction path to enter a busy hour waiting state;
the transaction management method of the transaction management system comprises the following steps:
step S1, performing transaction slicing on the block chain according to the transaction type, distributing the block chain links to each transaction slicing as required, and simultaneously constructing virtual nodes in each transaction slicing to manage the transaction slicing;
step S2, selecting a storage path for the transaction data generated by the transaction fragment, designing a routing mechanism for transaction data transmission, and completing the safe storage and transmission of the transaction data;
step S3, encrypting the data information of the transaction, encrypting the data before the transaction, and safely decrypting the transaction data when the transaction reaches the destination;
step S4, real-time monitoring the transaction process, broadcasting the transaction completion status to the whole transaction path within a fixed time interval, and reminding the transaction path to enter a busy hour waiting state;
the step S1 includes the steps of:
step S11, the transaction is fragmented, and the fragmented transaction data is stored in different block chain units;
step S12, dividing the nodes according to the length of the transaction data in step S11, inserting identification nodes into random positions in the blockchain unit according to the node partition sequence, and identifying the positions of the transaction fragments and the nodes in the current blockchain unit;
step S13, generating a virtual address and a virtual random key of a transaction sender;
the virtual address is generated by hash processing, and the IP address of the transaction sender is determined according to a formula:
Figure 2
wherein M isIPFor encrypted virtual addresses, fuIs a random hash function of the transaction sender u, IP is the transaction sender IP address, K is a randomly generated hash floating value, and m is the transaction sender IP address length.
CN202110595082.9A 2020-09-30 2020-09-30 Transaction management system based on block chain fragmentation Pending CN113259450A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110595082.9A CN113259450A (en) 2020-09-30 2020-09-30 Transaction management system based on block chain fragmentation

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110595082.9A CN113259450A (en) 2020-09-30 2020-09-30 Transaction management system based on block chain fragmentation
CN202011069344.XA CN112235382B (en) 2020-09-30 2020-09-30 Transaction management system and method based on block chain fragmentation

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN202011069344.XA Division CN112235382B (en) 2020-09-30 2020-09-30 Transaction management system and method based on block chain fragmentation

Publications (1)

Publication Number Publication Date
CN113259450A true CN113259450A (en) 2021-08-13

Family

ID=74120532

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202011069344.XA Active CN112235382B (en) 2020-09-30 2020-09-30 Transaction management system and method based on block chain fragmentation
CN202110595082.9A Pending CN113259450A (en) 2020-09-30 2020-09-30 Transaction management system based on block chain fragmentation

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202011069344.XA Active CN112235382B (en) 2020-09-30 2020-09-30 Transaction management system and method based on block chain fragmentation

Country Status (1)

Country Link
CN (2) CN112235382B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114692133A (en) * 2021-01-22 2022-07-01 支付宝(杭州)信息技术有限公司 Program running method and system
CN114529405B (en) * 2022-02-24 2022-11-15 发明之家(北京)科技有限公司 Information access management method and system based on intelligent transaction

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108647361B (en) * 2018-05-21 2021-12-03 中国工商银行股份有限公司 Data storage method, device and system based on block chain
CN109508968B (en) * 2018-10-25 2020-12-18 常州唯康信息科技有限公司 Block chain system and control method thereof
CN109361952A (en) * 2018-12-14 2019-02-19 司马大大(北京)智能系统有限公司 Video management method, apparatus, system and electronic equipment
CN110062034B (en) * 2019-04-01 2021-11-12 中科天御(苏州)科技有限公司 Block chain large file secure storage method and system
CN110430039B (en) * 2019-07-19 2022-08-19 瑞纳智能设备股份有限公司 Production management system and method based on block chain
CN110570202B (en) * 2019-09-02 2022-06-03 杭州趣链科技有限公司 Hybrid consensus method based on fragmentation technology
CN111144866B (en) * 2019-12-25 2021-04-30 腾讯科技(深圳)有限公司 Data transfer method, device, node equipment and storage medium
CN111612466B (en) * 2020-01-17 2022-02-18 厦门潭宏信息科技有限公司 Consensus and resource transmission method, device and storage medium

Also Published As

Publication number Publication date
CN112235382B (en) 2021-09-10
CN112235382A (en) 2021-01-15

Similar Documents

Publication Publication Date Title
CN111818031B (en) Block chain based covert communication message security encoding method, system and medium
CN101322349B (en) Certification and segmenting system and method for Substitution encryption key
Liu et al. Establishing pairwise keys in distributed sensor networks
US9338150B2 (en) Content-centric networking
EP0916209B1 (en) Cryptographic key recovery system
KR20190034505A (en) Data conversion system and method
CN111092717B (en) Group authentication-based safe and reliable communication method in smart home environment
US7634659B2 (en) Roaming hardware paired encryption key generation
US6851049B1 (en) Method and apparatus for facilitating secure anonymous email recipients
US7774594B2 (en) Method and system for providing strong security in insecure networks
CN109145612B (en) Block chain-based cloud data sharing method for preventing data tampering and user collusion
US7457411B2 (en) Information security via dynamic encryption with hash function
CN109257346B (en) Concealed transmission system based on block chain
US10586065B2 (en) Method for secure data management in a computer network
CN110336673B (en) Block chain design method based on privacy protection
WO2020173231A1 (en) Resource request method, device and storage medium
US10699031B2 (en) Secure transactions in a memory fabric
CN110581839B (en) Content protection method and device
CN112235382B (en) Transaction management system and method based on block chain fragmentation
Khalil et al. Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks
US20030188012A1 (en) Access control system and method for a networked computer system
CN110688666A (en) Data encryption and storage method in distributed storage
US20210099296A1 (en) Key generation for use in secured communication
Alghamdi et al. Routing-aware and malicious node detection in a concealed data aggregation for WSNs
CN113111386A (en) Privacy protection method for block chain transaction data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210813