WO2020241995A1 - 블록체인의 거래검증시스템, 및 블록체인의 거래검증방법 - Google Patents
블록체인의 거래검증시스템, 및 블록체인의 거래검증방법 Download PDFInfo
- Publication number
- WO2020241995A1 WO2020241995A1 PCT/KR2019/017571 KR2019017571W WO2020241995A1 WO 2020241995 A1 WO2020241995 A1 WO 2020241995A1 KR 2019017571 W KR2019017571 W KR 2019017571W WO 2020241995 A1 WO2020241995 A1 WO 2020241995A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- transaction
- block
- safe
- attacker
- verifications
- Prior art date
Links
- 238000012795 verification Methods 0.000 title claims abstract description 156
- 238000000034 method Methods 0.000 title claims description 32
- 238000005065 mining Methods 0.000 claims description 44
- 230000006870 function Effects 0.000 claims description 29
- 238000005457 optimization Methods 0.000 claims description 16
- 239000000284 extract Substances 0.000 claims description 2
- 238000000605 extraction Methods 0.000 claims description 2
- 238000004364 calculation method Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 5
- 238000009826 distribution Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012886 linear function Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000000571 coke Substances 0.000 description 1
- 230000006735 deficit Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 1
- 239000010931 gold Substances 0.000 description 1
- 229910052737 gold Inorganic materials 0.000 description 1
- 238000005304 joining Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000004448 titration Methods 0.000 description 1
- 210000003462 vein Anatomy 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/223—Payment schemes or models based on the use of peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
Definitions
- the present invention relates to a transaction verification system of a block chain, and a transaction verification method of a block chain.
- the transaction through the cryptocurrency is completed through block confirmation.
- the block verification is a technique of completing a transaction after confirming that blocks corresponding to the set number of block verifications are generated after a current transaction between traders occurs. For example, if the number of block verifications is 6, the transaction is completed after waiting for 6 additional blocks to be generated after the block in which the transaction between traders is recorded.
- the transaction completion may exemplify that a product holder sends a product to a cryptocurrency provider.
- Non-Patent Document 1 proves that the larger the number of block verifications, the safer the transaction.
- the block verification can be used as a means to defend against double spending.
- the double payment refers to an attack in which a malicious user destroys an actual transaction by secretly providing a malicious block chain longer than the block chain of actual transactions, using the principle of the block chain in which the longest block chain survives.
- Non-Patent Document 1 S Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System” [Online] Available: https://bitcoinorg/bitcoinpdf
- the present invention proposes a transaction verification system and a transaction verification method of a blockchain that proposes an appropriate number of block verifications according to the current conditions.
- the present invention proposes a transaction verification system of a blockchain, and a transaction verification method, capable of completing a transaction through cryptocurrency safely and quickly in response to various external situations as well as the transaction amount input by a trader.
- the present invention proposes a transaction verification system and a transaction verification method of a block chain that can achieve both purposes of safe commerce and rapid transaction completion through cryptocurrency.
- a user information input unit into which user information is input An external information input unit for inputting external information related to the cryptocurrency system;
- An appropriate verification frequency search unit for searching for a number of block verifications appropriate for verification of a current transaction occurring currently using the external information and the user information;
- an appropriate number of verifications output unit that outputs the number of block verifications. According to the present invention, the user can automatically find out the number of block verifications necessary for safe and rapid transactions.
- the user information includes at least an input transaction amount input by the user, so that a safe transaction can be quickly performed in response to the input transaction amount input by the user.
- the external information includes at least one of a reward paid when one block is mined, an average cost used when mining a current block, and a mining speed of the current block, to determine the attack tendency of an attacker using a cryptocurrency system.
- a reward paid when one block is mined an average cost used when mining a current block
- a mining speed of the current block to determine the attack tendency of an attacker using a cryptocurrency system.
- the external information includes all of the rewards paid when one block is mined, the average cost used when mining the current block, and the mining speed of the current block, so that a more accurate number of block verifications can be found.
- a memory for storing necessary information
- a safe transaction limit extracting unit for extracting a safe safe transaction limit amount in a current state by using the external information
- a stability determination unit for determining safety by comparing the safe transaction limit amount with the input transaction amount.
- the safe transaction limit extracting unit includes an operation unit for extracting an amount that makes the attacker's expected profit to zero as the safe transaction limit. According to this, since it is based on the interest of the attacker, the attack tendency of the attacker is predicted, so that the number of more accurate block verifications can be found.
- the expected profit of the attacker may be provided by subtracting the expected cost of the attacker from the expected profit of the attacker.
- the safe transaction limit extractor includes a parameter optimizer, and the parameter optimizer may optimally estimate at least one of an attacker's stop-loss time and an attacker's resource ratio. Otherwise, it is possible to optimally predict the attacker's selection parameter, thus suggesting a more secure number of block verifications.
- a process of increasing the number of block verifications to extract the safe transaction limit amount may be repeated. This allows the user to find out the safest and least number of block verifications.
- the transaction verification method of a block chain includes receiving external information, which is information about a cryptocurrency system, and user information input by a user; Searching for an appropriate number of verifications, which is an appropriate number of block verifications, for safe and rapid transactions; And outputting the appropriate number of verifications. Users can safely and quickly conduct transactions through the blockchain.
- the search for the appropriate number of verifications may include calculating a safe transaction limit, which is a safe transaction amount in a current state, using the external information and an arbitrary number of current block verifications; Comparing the safe transaction limit with the input transaction amount input as the user information; And comparing the safe transaction limit with the input transaction amount, determining that it is safe when the safe transaction limit is large, and outputting the current number of block verifications. According to this, the user can find out the number of safe block verifications, or by actually applying the number of block verifications, a transaction can occur safely.
- a trader can know an appropriate number of block verifications by inputting only the transaction amount.
- appropriate means that the two objectives of safe and expedited transactions can be achieved for a combined purpose.
- the meaning of titration in this document can be understood as above.
- the present invention it is possible to propose an appropriate number of block verifications by referring to not only the current transaction between the parties, but also the situation information of the entire cryptocurrency system (which may be referred to as external information) placed outside the transaction between the parties. . Therefore, it is possible to predict the attacker's choice and more accurately propose the number of block verifications.
- FIG. 1 is a diagram showing a transaction verification system of a block chain according to an embodiment.
- 2 is a view showing in detail an appropriate number of verification search units.
- FIG. 3 is a flowchart illustrating a part of a block chain transaction verification method for explaining the detailed operation of the appropriate verification frequency search unit.
- Figure 4 is a view showing a detailed configuration of the safe transaction limit extractor.
- 5 is an example of a graph of the safe transaction limit using the resource ratio (p A ) occupied by an attacker as a variable.
- FIG. 7 is a diagram illustrating a safe transaction limit in a graph with stop loss time as a variable.
- FIG. 1 is a diagram showing a transaction verification system of a block chain according to an embodiment.
- an appropriate number of verification search unit (1) for searching for the number of verifications required for transaction verification and a user information input unit (2) that receives information input by a user of the system and outputs it to the appropriate number of verification number search unit (1).
- an external information input unit 3 that receives context information of the cryptocurrency system, that is, external information and outputs it to the appropriate verification count search unit 1.
- the appropriate verification count search unit 1 may search for an appropriate number of block verifications and output to the appropriate verification count output unit 4.
- the user information input unit 2 may be an input means such as a computer having a display and an input device.
- the external information input unit 3 may be a communication means connected to a network, and a computer that reads and stores public information on the network.
- the appropriate verification count output unit 4 may be an output means such as a display or a computer having a communication means.
- the appropriate verification count search unit 1 may be a computer having a computing device and a predetermined memory.
- the external information may include a reward paid when one current block is mined, an average cost used when one current block is mined, and a mining speed of the current block.
- the user information may include information related to the transaction amount input by the user for the current transaction.
- the transaction verification system of the block chain of the embodiment uses the transaction amount information input from the user information input unit 2 and the external information input from the external information input unit 3, and uses the appropriate verification frequency search unit (1). ) Searches for the appropriate number of block verifications. The searched information may be output through the appropriate verification count output unit 4.
- the user can set the number of block verifications by himself using the number of block verifications output from the appropriate verification count output unit 4. After block verification is performed according to the number of block verifications, the transaction can be completed.
- the number of block verifications output from the appropriate verification count output unit 4 is automatically applied, so that a transaction verification system of the blockchain may be operated.
- the transaction verification system of the block chain shown in FIG. 1 can be mounted on a trader's terminal.
- One unit block shown in FIG. 1 is provided to a trader's terminal, and another unit block is provided to at least one of another trader and a terminal of an exchange, and the transaction verification system of the block chain may be operated while being connected through a network.
- the transaction verification system of the block chain includes a network node for chaining blocks through block mining by any other user of the cryptocurrency system.
- terminals of at least one other node on the network cooperate to complete the transaction verification by chaining as many blocks as the number of block verifications required to complete the current transaction.
- the appropriate number of verification is searched. Thereafter, it may be performed by outputting the searched appropriate number of verifications.
- the output of the appropriate number of verifications may be performed by outputting an appropriate number of block verifications to the user and then inputting the number of block verifications by the user.
- block verification may be automatically performed according to the appropriate number of block verifications.
- 2 is a view showing in detail the appropriate verification frequency search unit.
- the appropriate number of verifications search unit 1 includes a safety transaction limit extractor 10 that extracts a safe level of verification amount in a current state, and the safety extracted by the safe transaction limit extractor 10.
- a safety determination unit 12 that compares the transaction limit amount with the transaction amount entered by the user to determine safety, and a memory storing information necessary for the operation of the safety determination unit 12 and the safe transaction limit extraction unit 10 (11) may be included.
- FIG. 3 is a flowchart illustrating a part of a block chain transaction verification method for explaining the detailed operation of the appropriate verification frequency search unit.
- the external information and the user information are input (S1).
- the external information may include a reward paid when one current block is mined, an average cost used when one current block is mined, and a mining speed of the current block.
- the user information may include transaction amount information input by the user.
- the transaction amount may be information on the amount of currency or cryptocurrency used in each country. For example, the amount of KRW or BTC may be included as information.
- the safe transaction limit is calculated using the entered information (S2).
- the safe transaction limit may be calculated by comparing the cost and profit of the attacker, predicted by the external information. The calculation of the safe transaction limit will be described in more detail later.
- the input transaction amount is compared with the safe transaction limit amount, and when the input transaction amount is small, it is determined that it is safe and the current number of verifications is output (S4).
- the safety determination step (S3) if the input transaction amount is large, it is determined that it is not secure, the number of verification is increased (S5), and the safe transaction limit calculation step (S2) is performed again. For example, if the current number of verification is 1, the number of verification can be increased to 2. After that, the number of verifications becomes 2, and the safe transaction limit can be recalculated using the user information and the external information at the current time point.
- the safe transaction limit may be expected to increase.
- the safe transaction limit is the cost used for the attacker to perform a double payment attack (in the case of an attack in this document, if there is no special explanation, it means a double payment attack), and when the attacker succeeds in a double payment attack. It can be calculated by comparing the profits you earn on.
- the attacker succeeds in the attack compared to the cost of the attacker, if the profit is small, the attacker does not attack, or the attacker will not succeed.
- the transaction amount in a state in which the attacker's expected profit becomes zero may be defined as the safe transaction limit.
- the expected return of the attacker can be given as the sum of the return (C+R) when the attack is successful and the return (zero) when the attack fails. Simply, it can be expressed as P AS *(C+R( ⁇ ,T AS )).
- the expected cost of the attacker may be given as the sum of the cost spent for a certain time (T AS ) when the attack is successful and the cost spent during the t cut time when the attack fails. For simplicity, it can be given as P AS *X( ⁇ ,E[T AS ]) + (1-P AS )*X( ⁇ ,t cut ).
- the stop-loss time may mean the time to stop the attack after it is determined that the probability of successful attack is slim after the stop-loss time has elapsed, and suffers a certain amount of damage to prevent further damage.
- Table 1 summarizes the meanings of the symbols presented in the above description and the various symbols used in the actual calculation of the limit for safe transaction below.
- P AS dimensionless
- R( ⁇ ,t)($, BTC) Average block mining rewards obtained when an attacker mines for time t (a function that increases for ⁇ and t)
- X( ⁇ ,t)($, BTC) Average block mining cost (a function that increases with ⁇ and t) if an attacker mines for time t Calculated value
- the remarks column shows how the value of each symbol is derived.
- the user input value is user information input by the user, and means a transaction amount here.
- the external input value is a value that is announced in the system of each cryptocurrency and changes in real time.
- the external input value is disclosed on btc.com in the case of Bitcoin and etherscan.io in the case of Ethereum.
- the guess verification value is a value that an attacker can select and may be selected as the safest value while calculating the safe transaction limit.
- the guess verification value can be optimally estimated by the parameter optimization unit 16 to be described later.
- the output value is a value that is output for one purpose in this embodiment, is the number of safe verifications, and indicates the number of block verifications.
- the calculated value is a value used in the middle of the calculation of the safe transaction limit.
- FIG. 4 is a view showing a detailed configuration of the safe transaction limit extractor.
- the safe transaction limit extractor 10 includes an operation unit 15 for calculating the safe transaction limit, and a parameter optimization unit 16 for optimizing parameters required for the operation of the operation unit 15. do.
- the parameter optimization unit 16 is a block for optimizing the guess verification value, and is a value capable of predicting an attack from an attacker's point of view.
- Equation 1 illustrates converting the unit of mining cost/time into a unit of mining cost/block.
- a mining cost per block can be obtained by multiplying the mining cost/hash and the number of hashes/blocks known as the external information.
- the result of Equation 1 may be stored in a memory.
- Equation 2 exemplifies finding the mining speed of an attacker.
- Equation 2 lambda is the speed, H (honest) is the general person, T (Total) is the whole, A (Attacker) is the attacker, p A is the ratio of the resources the attacker has, p H is the percentage of resources that the public has.
- the lowercase p in p H can be understood as the acronym of proportion.
- Equation 2 The attacker's mining speed ( ⁇ T ) can be found through Equation 2 above.
- the result of Equation 2 may be stored in the memory 11.
- the memory 11 not only the mining cost and the mining speed, but also information necessary for calculation may be stored as needed.
- Equation 3 is the probability of successful attack when the stop-loss time is infinite, and is known by Satoshi Nakamoto's paper cited in non-patent literature.
- Equation 3 P means probability, AS (attack success) means attack success, ICT (infinite cut time) means that the stop-loss time is infinite, and N BC means block verification for verification. Means the number of.
- Equation 4 is an equation derived by Equation 3, and represents a probability distribution regarding the probability of successful attack within a given time.
- Equation 4 where p F q is a generalized hypergeometric function defined in [G Gasper and M Rahman, “Basic Hypergeometric series,” in Basic hypergeometric series , Second, vol 96, Cambridge University Press, Cambridge, 2004] hypergeometric function), and a and b are defined in Equation 5.
- Equation 4 By first integrating the probability distribution of Equation 4, the probability of successful attack within the stop-loss time of Equation 6 below can be found.
- Equation (7) By integrating the second probability distribution of Equation (5), the average time required to successfully attack within the stop-loss time of Equation (7) can be found.
- E is an expected value
- P is a probability
- f is a probability distribution in probability theory.
- Equation 8 the average attack cost of the attacker can be found as shown in Equation 8.
- X represents the mining cost.
- Providing the mining cost X as a linear function is an example of the cost of lending mining equipment through a rental office (eg, nicehach.com) on the Internet as a linear function.
- the cost function X is, n-squared function, n-root function, log function, exponential function, or -It could be a root function.
- Equation 9 when the stop loss time is infinite, the average time required for attack success ( ) Can be found out as in Equation 9.
- Equation 9 it is possible to find out the resource ratio (p A ) occupied by the attacker, which predicts the resources occupied by the attacker and presents the most stable verification amount.
- the average time required for attack success ( ) Is a function that takes as a factor the percentage of resources occupied by the attacker (p A ).
- the resource ratio occupied by the attacker can be most stably optimized. This is because the attacker will choose the ratio of the occupied resources that can obtain the fastest attack effect at the lowest cost.
- the optimization of the resource ratio occupied by the attacker may be performed by the parameter optimization unit 16 through an action separate from the operation unit 15.
- the resource ratio that the attacker occupies, optimized by the parameter optimization unit 16, is fed back to the calculation unit 15 and may be used to obtain the safe transaction limit.
- Equation 10 is applied to obtain the safe transaction limit.
- Equation 10 R is a reward, and R may be given as in Equation 11 below.
- Equation 11 the log term appears to be that the reward is possible with a log function or an exponential function with respect to time. However, when given as a function proportional to time, all log terms may be given as 1.
- the compensation R may also be an n-square function, an n-root function, a log function, an exponential function, or an n-root function, similar to the mining cost (X).
- Equation 10 may be given as a function taking the stop-loss time as a factor. Therefore, it is possible to optimize the safe transaction limit (C req ) using the stop loss time as a variable.
- Fig. 7 is a diagram illustrating the stop-loss time as a variable and the safe transaction limit as a graph.
- the safe transaction limit for the stop-loss time is shown as a convex graph below.
- the safest transaction limit the lowest verification amount can be output.
- the operation of obtaining an optimum value of the safe transaction limit in response to the stop loss time may be performed through the parameter optimization unit 16.
- the parameter optimization unit 16 may output the safe transaction limit, which is the lowest in the current state, to the calculation unit 15.
- the attacker's resource ratio exceeds 50%, the attacker can set the stop-loss time to infinite, as already explained. This is because if the resource exceeds 50%, the resource prevails one day, and an attacker can one day create a longer blockchain.
- the optimization of the attacker's stop-loss time (T cut ) and the attacker's resource ratio (P A ) may be performed by the parameter optimization unit 16.
- the optimal number of verifications for 51% attacks is greater than the optimal number of verifications for 50% attacks.
- a network with a large computing resource such as Bitcoin
- a 51% attack may be possible in a network with small computational resources, so more thorough preparation is required.
- Profits can be compared for finite and infinite stop-loss times. For example, if the reward ( ⁇ ) for mining one block is greater than the cost ( ⁇ ) for mining one block, that is, if the hourly reward obtained from mining is greater than the hourly cost of mining, stop loss If the time is infinite, the profit of the attack is greatest.
- C Req. is a function that is convex down to the resource ratio (p A ) of the attacker, which has been proven mathematically and is shown in FIG. It is actually illustrated as.
- the attacker is forced to choose a finite stop-loss time.
- the average time it takes for the attack to succeed that is, the average time for attack success must be considered.
- the stop-loss time can be set as the average time of attack success, a time slightly larger than that, or several times larger than that when attempting an attack.
- the attack success rate is not very high, so the attacker will try to attack several times to make a profit. Therefore, the longer it takes for each attack attempt, the slower it will take to convert from the deficit to the surplus.
- the attacker In order to find the stop loss time quickly and accurately, the attacker will search for the resource ratio (p A ) of the attacker whose average time of attack success is minimized.
- the safe transaction limit (C Req ) is a function that is convex downward for t cut , as shown in FIG. 7. That is, there is a lower limit of the safe transaction limit for the stop loss time. Therefore, in order to judge safety, the trader only needs to consider the case in which the stop loss time is the worst, that is, the safe transaction limit is the lowest.
- Equation 12 the resource ratio (p A ) occupied by the attacker is not known, and Equation 12 may be given as a function taking the resource ratio (p A ) occupied by the attacker as a factor. Therefore, the safe transaction limit (C req ) can be optimized by using the resource ratio (p A ) occupied by the attacker as a variable. The optimization may be performed by the parameter optimization unit 16.
- FIG. 5 A diagram illustrating the resource ratio (p A ) occupied by the attacker as a variable and the safe transaction limit as a graph has already been described with FIG. 5.
- the safe transaction limit is shown as a convex graph below. As the safest transaction limit, the lowest verification amount can be output.
- the user can output an appropriate number of verifications by inputting only the transaction amount, and set the number of block verifications according to the appropriate number of verifications. According to this, there is an advantage of enabling commercial transactions using safe and fast cryptocurrency.
- a guess verification value that must be estimated in the process of calculating the safe transaction limit is optimized, so that even if a user inputs only the transaction amount, an appropriate number of block verifications can be found.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
기호(단위) | 설명 | 비고 |
C($, BTC) | 이중지불 공격대상 거래의 거래금액 | 사용자입력값 |
β($, BTC) | 블록 하나를 채굴하면 지급되는 보상금 | 외부입력값 |
γ($, BTC) | 블록 하나를 채굴할 때 소요되는 평균비용 | 외부입력값 |
λA(No./T) | 공격자의 평균 블록채굴 속도(공격자에 따라서 다르고 알려져 있는 것 중의 최고를 이용할 수 있다)(pool에 가입해서 채굴을 하고 있고, 풀 간에 담합할 수 있다) | 외부입력값 |
λH(No./T) | 일반인의 채굴속도 | 외부입력값 |
λT(No./T) | 전체 채굴속도 | 외부입력값 |
tcut(T) | 무한정 커질 수 있는 손실을 방지하기 위한 공격제한 시간, 손절시간, cut-time | 추측검증값 |
pA(%) | 공격자가 점유한 계산 자원의 비율 | 추측검증값 |
NBC(No.) | 거래자가 거래를 완료하기 전 거래를 검증하는 블록검증의 수(block confirmation number) | 출력값 |
E[TAS](T) | 공격이 성공하기까지 소요된 평균 시간, tcut보다 작음. | 계산값 |
PAS(무차원) | 이중지불공격이 tcut 시간 내에 성공할 확률 | 계산값 |
R(β,t)($, BTC) | 공격자가 시간 t동안 채굴 할 경우 획득하는 평균 블록 채굴 보상금(β와 t에 대해 증가하는 함수) | 계산값 |
X(γ,t)($, BTC) | 공격자가 시간 t동안 채굴 할 경우 소요하는 평균 블록 채굴 비용(γ와 t에 대해 증가하는 함수) | 계산값 |
Claims (15)
- 사용자 정보가 입력되는 사용자 정보 입력부;암호화폐시스템과 관련되는 외부정보가 입력되는 외부정보 입력부;상기 외부정보 및 상기 사용자 정보를 이용하여, 현재 일어나는 현재 거래의 검증에 적정한 블록검증의 수를 탐색하는 적정 검증횟수 탐색부; 및상기 블록검증의 수를 출력하는 적정 검증횟수 출력부가 포함되는 블록체인의 거래검증시스템.
- 제 1 항에 있어서,상기 사용자 정보에는, 적어도 사용자가 입력하는 입력 거래금액이 포함되는 블록체인의 거래검증시스템.
- 제 1 항에 있어서,상기 외부정보에는,-현재 블록 하나를 채굴하면 지급되는 보상금,-현재 블록 하나를 채굴할 때 소용되는 평균비용, 및-현재 블록의 채굴속도,중의 적어도 하나가 포함되는 블록체인의 거래검증시스템.
- 제 3 항에 있어서,상기 외부정보에는,-블록 하나를 채굴하면 지급되는 보상금,-현재 블록 하나를 채굴할 때 소용되는 평균비용, 및-현재 블록의 채굴속도가,모두 포함되는 블록체인의 거래검증시스템.
- 제 2 항에 있어서,상기 적정 검증횟수 탐색부에는,필요한 정보가 저장되는 메모리;상기 외부정보를 이용하여, 현재 상태에서 안전한 안전거래 한도액을 추출하는 안전거래 한도액 추출부; 및상기 안전거래 한도액과 상기 입력 거래금액을 비교하여 안전성을 판별하는 안정성 판별부가 포함되는 블록체인의 거래검증시스템.
- 제 5 항에 있어서,상기 안전거래 한도액 추출부에는,공격자가 기대이윤을 영이 되게 만드는 금액을, 상기 안전거래 한도액으로 추출하는 연산부가 포함되는 블록체인의 거래검증시스템.
- 제 6 항에 있어서,상기 공격자의 기대이윤은, 공격자의 기대수익에서 공격자의 기대비용을 감산하여 제공되는 블록체인의 거래검증시스템.
- 제 6 항에 있어서,상기 안전거래 한도액(CReq)는CReq. = (1-PAS)/PAS*X(γ,tcut)+X(γ,TAS)-R(β,TAS)에 의해서 추출되고,여기서,PAS(무차원)는 이중지불공격이 tcut 시간 내에 성공할 확률이고,X(γ,t)는 공격자가 t 시간 동안 채굴 할 경우 소요하는 평균 블록 채굴 비용(γ와 t에 대해 증가하는 함수)이고,γ는 블록 하나를 채굴할 때 소요되는 평균비용이고,TAS는 공격이 성공하기까지 소요된 시간이고,β는 블록 하나를 채굴하면 지급되는 보상금이고,R(β,t)는 공격자가 t 시간 동안 채굴할 경우 획득하는 평균 블록 채굴 보상금(β와 t에 대해 증가하는 함수)인,블록체인의 거래검증시스템.
- 제 5 항에 있어서,상기 안전거래 한도액 추출부에는 파라미터 최적화부가 포함되고,상기 파라미터 최적화부에는,- 공격자의 손절시간, 및- 공격자의 자원비율 중의 적어도 하나를최적으로 추측하는 블록체인의 거래검증시스템.
- 제 5 항에 있어서,상기 안전성 판별부에 의해서 안전하지 않다고 판별되는 경우에는, 상기 블럭검증의 수를 증가시켜 상기 안전거래 한도액을 다시금 추출하는 블록체인의 거래검증시스템.
- 암호화폐시스템에 관한 정보인 외부정보 및 사용자가 입력하는 사용자 정보를 입력받는 것;상기 외부 정보 및 상기 사용자 정보를 이용하여, 안전하고 신속한 거래를 위하여 적정한 블록검증의 수인 적정 검증횟수를 탐색하는 것; 및상기 적정 검증횟수를 출력하는 것이 수행되는 블록체인의 거래검증방법.
- 제 11 항에 있어서,상기 적정 검증횟수를 탐색하는 것은,상기 외부정보 및 임의의 현재 블록검증의 수를 이용하여, 현재 상태에서 안전한 거래금액인 안전거래 한도액을 계산하는 것;상기 안전거래 한도액과, 상기 사용자 정보로서 입력되는 입력 거래금액을 비교하는 것; 및상기 안전거래 한도액과 상기 입력 거래금액을 비교하여, 상기 안전거래 한도액이 큰 경우에는 안전한 것으로 판단하고, 상기 현재 블록검증의 수를 출력하는 것이 수행되는 블록체인의 거래검증방법.
- 제 12 항에 있어서,상기 안전거래 한도액과 상기 입력 거래금액을 비교하여, 상기 안전거래 한도액이 작은 경우에는 안전하지 않은 것으로 판단하고, 상기 현재 블록검증의 수를 증가시킨 다음에, 상기 안전거래 한도액을 다시 계산하는 것이 수행되는 블록체인의 거래검증방법.
- 제 11항에 있어서,상기 사용자 정보에는, 적어도 사용자가 입력하는 입력 거래금액이 포함되는 블록체인의 거래검증방법.
- 제 11 항에 있어서,상기 외부정보에는,-현재 블록 하나를 채굴하면 지급되는 보상금,-현재 블록 하나를 채굴할 때 소용되는 평균비용, 및-현재 블록의 채굴속도,중의 적어도 하나가 포함되는 블록체인의 거래검증방법.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/611,506 US20220215394A1 (en) | 2019-05-24 | 2019-12-12 | Transaction verification system for blockchain, and transaction verification method for blockchain |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20190061493 | 2019-05-24 | ||
KR10-2019-0061493 | 2019-05-24 | ||
KR10-2019-0120655 | 2019-09-30 | ||
KR1020190120655A KR102288776B1 (ko) | 2019-05-24 | 2019-09-30 | 블록체인의 거래검증시스템, 및 블록체인의 거래검증방법 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020241995A1 true WO2020241995A1 (ko) | 2020-12-03 |
Family
ID=73552875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2019/017571 WO2020241995A1 (ko) | 2019-05-24 | 2019-12-12 | 블록체인의 거래검증시스템, 및 블록체인의 거래검증방법 |
Country Status (2)
Country | Link |
---|---|
US (1) | US20220215394A1 (ko) |
WO (1) | WO2020241995A1 (ko) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160283920A1 (en) * | 2015-03-28 | 2016-09-29 | Justin Fisher | Authentication and verification of digital data utilizing blockchain technology |
KR101796690B1 (ko) * | 2016-06-28 | 2017-11-10 | 상명대학교 천안산학협력단 | 블록체인 기반의 펌웨어 무결성 검증 시스템 및 그 방법 |
KR20180014534A (ko) * | 2016-08-01 | 2018-02-09 | 서강대학교산학협력단 | 블록체인 기반 트랜잭션 검증 시스템 및 그 방법 |
US20180191502A1 (en) * | 2015-09-04 | 2018-07-05 | NEC Laboratories Europe GmbH | Method for storing an object on a plurality of storage nodes |
KR101951408B1 (ko) * | 2017-10-17 | 2019-02-22 | 백종윤 | 보안성을 강화한 가상화폐 관리 시스템 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8205098B2 (en) * | 2008-02-25 | 2012-06-19 | Microsoft Corporation | Secure and usable protection of a roamable credentials store |
DK2811708T3 (en) * | 2013-06-06 | 2017-01-16 | Nagravision Sa | User authentication system and method |
US20150363778A1 (en) * | 2014-06-16 | 2015-12-17 | Bank Of America Corporation | Cryptocurrency electronic payment system |
US9832220B2 (en) * | 2015-09-22 | 2017-11-28 | The United States Of America As Represented By The Secretary Of The Air Force | Security method for allocation of virtual machines in a cloud computing network |
US11727391B2 (en) * | 2016-04-11 | 2023-08-15 | Nchain Licensing Ag | Computer-implemented methods and systems for validating tokens for blockchain-based cryptocurrencies |
US20180005235A1 (en) * | 2016-06-29 | 2018-01-04 | Ca, Inc. | Electronic transaction risk assessment based on digital identifier trust evaluation |
JP2020503579A (ja) * | 2016-10-25 | 2020-01-30 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | 電子通信の受信者を指定するブロックチェーンに基づく方法及びシステム |
US20180374094A1 (en) * | 2017-06-22 | 2018-12-27 | Mastercard International Incorporated | Method and system for indexing consumer enrollment using blockchain |
US11132704B2 (en) * | 2017-07-06 | 2021-09-28 | Mastercard International Incorporated | Method and system for electronic vouchers via blockchain |
CN108171494A (zh) * | 2017-11-23 | 2018-06-15 | 阿里巴巴集团控股有限公司 | 一种数据处理方法和装置 |
US10832220B2 (en) * | 2018-03-06 | 2020-11-10 | At&T Intellectual Property I, L.P. | Methods, devices and systems for managing group membership and record verification using blockchain |
US11700132B2 (en) * | 2018-05-02 | 2023-07-11 | Cable Television Laboratories, Inc. | Systems and methods for secure event and log management |
US11695735B2 (en) * | 2018-05-10 | 2023-07-04 | Nxm Labs, Inc. | Security management for net worked client devices using a distributed ledger service |
US11036865B2 (en) * | 2018-07-05 | 2021-06-15 | Massachusetts Institute Of Technology | Systems and methods for risk rating of vulnerabilities |
US10868825B1 (en) * | 2018-08-14 | 2020-12-15 | Architecture Technology Corporation | Cybersecurity and threat assessment platform for computing environments |
WO2020079492A1 (en) * | 2018-10-19 | 2020-04-23 | Longenesis Ltd. | Systems and methods for blockchain-based health data validation and access management |
US11824864B2 (en) * | 2019-01-31 | 2023-11-21 | Salesforce, Inc. | Systems, methods, and apparatuses for implementing a declarative and metadata driven blockchain platform using distributed ledger technology (DLT) |
US11971874B2 (en) * | 2019-01-31 | 2024-04-30 | Salesforce, Inc. | Systems, methods, and apparatuses for implementing efficient storage and validation of data and metadata within a blockchain using distributed ledger technology (DLT) |
US20200285637A1 (en) * | 2019-03-04 | 2020-09-10 | Conduent Business Services, Llc | Method and system for information visualization and digital interactions for enterprise applications on blockchain |
-
2019
- 2019-12-12 US US17/611,506 patent/US20220215394A1/en active Pending
- 2019-12-12 WO PCT/KR2019/017571 patent/WO2020241995A1/ko active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160283920A1 (en) * | 2015-03-28 | 2016-09-29 | Justin Fisher | Authentication and verification of digital data utilizing blockchain technology |
US20180191502A1 (en) * | 2015-09-04 | 2018-07-05 | NEC Laboratories Europe GmbH | Method for storing an object on a plurality of storage nodes |
KR101796690B1 (ko) * | 2016-06-28 | 2017-11-10 | 상명대학교 천안산학협력단 | 블록체인 기반의 펌웨어 무결성 검증 시스템 및 그 방법 |
KR20180014534A (ko) * | 2016-08-01 | 2018-02-09 | 서강대학교산학협력단 | 블록체인 기반 트랜잭션 검증 시스템 및 그 방법 |
KR101951408B1 (ko) * | 2017-10-17 | 2019-02-22 | 백종윤 | 보안성을 강화한 가상화폐 관리 시스템 |
Also Published As
Publication number | Publication date |
---|---|
US20220215394A1 (en) | 2022-07-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016171349A2 (ko) | 당사자간 블록체인을 갖는 디지털 가상화폐의 거래시스템 및 방법 | |
WO2018074902A2 (en) | System and method for mobile wallet remittance | |
WO2018008800A1 (ko) | 블록체인을 기반으로 하는 공인인증서 인증시스템과 이를 이용한 블록체인을 기반으로 하는 공인인증서 인증방법 | |
WO2013081282A1 (en) | System and method for recommending application by using keyword | |
WO2018166099A1 (zh) | 信息泄露检测方法及装置、服务器及计算机可读存储介质 | |
WO2023113157A1 (ko) | 범죄 은어 변이 추적 방법, 이를 수행하는 장치 및 컴퓨터 프로그램 | |
WO2012165924A2 (ko) | 인터넷 검색의 키워드 광고를 이용하는 유효 키워드 선정 시스템 및 그 유효 키워드 선정 방법 | |
CN111126533B (zh) | 基于动态口令的身份认证方法、装置和动态令牌 | |
WO2022019500A1 (ko) | 인공지능 학습데이터 생성을 위한 크라우드소싱 기반 프로젝트에서의 실습 교육 참여자에 대한 보상형 실습 교육 제공 방법, 그 장치 및 그 컴퓨터 프로그램 | |
WO2020241995A1 (ko) | 블록체인의 거래검증시스템, 및 블록체인의 거래검증방법 | |
WO2020130331A1 (ko) | 블록체인에서 노드들간 블록 및 전자 문서를 공유 및 검증하는 방법 | |
WO2023106572A1 (ko) | 가상 자산 부정 거래 탐지를 위한 탐지 모델의 학습 방법, 탐지 모델을 이용한 가상 자산 부정 거래의 탐지 방법 및 이들을 수행하는 장치 및 컴퓨터 프로그램 | |
WO2017183830A1 (ko) | 홍채템플릿 분산 저장 및 매칭을 이용한 홍채인식 보안 강화 방법 및 장치 | |
Varun et al. | Mitigating frontrunning attacks in ethereum | |
WO2020175753A1 (ko) | 전문가에 의해 생성되는 프로젝트 결과물을 빅데이터 기반으로 관리하는 방법 및 시스템 | |
WO2024143917A1 (ko) | 접속 대기 화면의 정보 제공을 위한 대기열 관리 장치 및 방법 | |
WO2022163893A1 (ko) | 결제 서비스 제공 방법 및 이를 수행하는 전자 장치 | |
WO2021177639A1 (ko) | 거래에서 사용자 정보를 식별하는 방법 및 이러한 방법을 수행하는 장치 | |
WO2021080261A1 (ko) | 금융거래시스템 및 그 방법 | |
WO2021107326A1 (ko) | 실전 작업을 기반으로 한 검증용 크라우드소싱 작업을 제공하는 방법 및 장치 | |
WO2022080583A1 (ko) | 시계열 분포 특징을 고려한 딥러닝 기반 비트코인 블록 데이터 예측 시스템 | |
WO2018169160A1 (ko) | 가변적 생체정보 기반의 복합 인증 시스템 및 이를 이용한 복합 인증 방법 | |
WO2013032198A1 (ko) | 높은 연관성을 가지는 아이템을 추천하는 아이템 기반의 추천 엔진 | |
WO2023145984A1 (ko) | 블록체인에 기초하여 데이터의 분석 서비스를 제공하는 시스템 및 시스템의 동작 방법 | |
KR20200135119A (ko) | 블록체인의 거래검증시스템, 및 블록체인이 거래검증방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19931493 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 21.04.2022) |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 21.04.2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19931493 Country of ref document: EP Kind code of ref document: A1 |