WO2020259156A1 - 一种区块链的私密交易方法及装置 - Google Patents

一种区块链的私密交易方法及装置 Download PDF

Info

Publication number
WO2020259156A1
WO2020259156A1 PCT/CN2020/091933 CN2020091933W WO2020259156A1 WO 2020259156 A1 WO2020259156 A1 WO 2020259156A1 CN 2020091933 W CN2020091933 W CN 2020091933W WO 2020259156 A1 WO2020259156 A1 WO 2020259156A1
Authority
WO
WIPO (PCT)
Prior art keywords
account
institution
certificate
blockchain
transaction
Prior art date
Application number
PCT/CN2020/091933
Other languages
English (en)
French (fr)
Inventor
李昊轩
严强
李辉忠
张开翔
范瑞彬
Original Assignee
深圳前海微众银行股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳前海微众银行股份有限公司 filed Critical 深圳前海微众银行股份有限公司
Publication of WO2020259156A1 publication Critical patent/WO2020259156A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Definitions

  • the embodiments of the present invention relate to the field of fintech, and in particular to a method and device for private transactions on a blockchain.
  • Blockchain technology is no exception, but due to the security of the financial industry , Real-time requirements, but also higher requirements for technology.
  • blockchain is widely used in various industries, such as finance, securities, and logistics.
  • blockchains can be divided into public chains, private chains, and blocks.
  • the public chain can be used and maintained by anyone, the information is completely open, and the private chain is managed and restricted by centralized managers, and only a few internal people can use it.
  • the information is not open.
  • the blockchain is the media Between the two, a blockchain maintained by a number of institutions, only those institutions or members with access rights can access the information in the blockchain.
  • the present invention provides a private transaction method and device of a blockchain to solve the technical problem of low security of the blockchain in the existing access method.
  • the present invention provides a private transaction method of a blockchain, the method includes: a supervisor obtains an access request sent by a first institution; the access request includes that the access request needs to be added to the blockchain The asset certificate; the regulator verifies the access request, and if it is determined to pass the verification, it will generate an account certificate for the second account based on the second account generated by the first institution based on the blockchain; the regulator will The asset certificate is encrypted into an encrypted asset certificate according to the public key of the first institution; the encrypted asset certificate is used for the second account to conduct transactions with other accounts on the blockchain, and the transaction is verified by a private transaction verification method The correctness; the supervisor generates an access transaction request based on the account certificate of the second account and the encrypted asset certificate, and the access transaction request is used to add the encrypted asset certificate to the second account ; The supervisor initiates the access transaction request to the node on the blockchain so that the node on the blockchain verifies the access transaction request; if the supervisor determines that the node on the blockchain If the verification of the access transaction
  • the regulator can encrypt the asset certificate of the first institution that needs to be chained, so that the asset certificate written in the second account of the first institution on the blockchain is an encrypted asset certificate, so that the first institution is in the block
  • the transactions on the chain are encrypted from funding to transactions, ensuring the privacy of the transactions of the first institution on the blockchain.
  • the supervisor generates an account certificate for the second account, which effectively guarantees the validity and security of the account on the blockchain, enhances the security and privacy of the blockchain in private transactions, and expands the process of blockchain Application scenarios for private transactions such as transfers.
  • the access request further includes the identity information of the first institution and the account information of the first offline account corresponding to the first institution; the supervisor verifies the access request , Including: the supervisor verifying whether the identity information of the first institution is consistent with the identity information of the offline first account of the first institution; the supervisor verifying the first institution’s Whether the assets of the account meet the conditions for redeeming the asset certificate that needs to be added to the blockchain for the access request; after the regulator encrypts the asset certificate into an encrypted asset certificate, it also includes: The asset certificate of an institution is recorded in the supervisory account of the supervisor to update the assets of the offline account of the first institution according to the encrypted asset certificate of the second account traded on the blockchain; the supervisor Freezing the assets corresponding to the asset certificate in the first account.
  • the supervisor verifies the identity information of the first institution and the account information of the first account, establishes a connection between the first account and the second account, and verifies whether the assets of the first account of the first institution are Meeting the conditions for redeeming the asset certificate that needs to be added to the blockchain for the access request improves the security of the second account of the first institution on the chain, and is beneficial to the first institution’s second account on the blockchain.
  • the method further includes: the supervisor obtains a first transaction request sent by the first institution; the first transaction request includes a request to transfer out the first asset in the first account To the second institution; the account of the second institution on the blockchain is the third account, and the offline account corresponding to the second institution is the fourth account; if the supervisor verifies the first transaction If the request is passed, a second transaction request is generated according to the first transaction request; the second transaction request is used to transfer the first encrypted asset certificate from the second account to the third account; the first An encrypted asset certificate is determined according to the first asset; the supervisor sends the second transaction request to a node on the blockchain to verify the transaction of the first encrypted asset certificate through a private transaction verification method If the supervisor determines that the verification of the second transaction request is passed, it will record the second transaction on the blockchain through the accounting node and pass the accounting node on the blockchain Update the second account and the third account.
  • the first institution can initiate the first transaction request to the offline second institution through the first offline account to the supervisor, and the supervisor uses the respective accounts of the first institution and the second institution on the blockchain. , Initiate private transactions and complete transactions. During the transaction process, the privacy of an account is guaranteed, the security of the transaction is improved, and transactions that cannot be achieved offline are realized, and the application of private transactions on the blockchain is expanded.
  • the method further includes: the supervisor obtains a third transaction request sent by the first institution; the third transaction request includes a request to transfer the second encrypted asset certificate to the third institution to In the first account; the account of the third institution on the blockchain is the fifth account, and the corresponding offline account is the sixth account; if the supervisor verifies that the third transaction request is passed, Then, according to the third transaction request, a fourth transaction request is generated; the fourth transaction request is used to transfer the second encrypted asset certificate from the fifth account to the second account; the supervision area
  • the node on the block chain sends the fourth transaction request to verify the correctness of the transaction of the second encrypted asset certificate through a private transaction verification method; the second encrypted asset certificate is determined according to the first asset If the supervisor determines that the verification of the second transaction request is passed, it determines the second asset transferred to the first account according to the second encrypted asset certificate; the supervisor passes the billing node
  • the second transaction is recorded on the blockchain, and the second account and the fifth account are updated through the accounting node on the blockchain.
  • the first institution can process the second transaction request initiated by the offline second institution to the offline first institution through the supervisor, and the supervisor uses the respective accounts of the first institution and the second institution on the blockchain , Initiate private transactions and complete transactions.
  • the privacy of an account is guaranteed, the security of the transaction is improved, and transactions that cannot be achieved offline are realized, and the application of private transactions on the blockchain is expanded.
  • the method further includes: the supervisor obtains a cancellation request for the second account from the first institution; the cancellation request includes the first encrypted asset certificate requested to be cancelled; the The supervisor sends a verification of the revocation request to the node on the blockchain to verify the account certificate of the second account and verify the first encrypted asset certificate requested to be revoked and the second Whether the encrypted asset certificate of the account meets the revocation conditions; if the supervisor determines that the verification is passed, the account certificate of the second account is revoked, and the second account is set to be invalid; the supervisor makes the second The asset corresponding to the offline first account of the first institution corresponding to the encrypted asset certificate in the account is unfrozen.
  • the supervisor verifies the encrypted asset certificate of the second account of the first institution to realize the solution of canceling the encrypted asset certificate in the account on the blockchain, and associates the first institution’s offline Account, and then realize the safe cancellation of the second account on the blockchain, which ensures the security of the account on the blockchain.
  • the method further includes: the supervisor obtains an asset certificate transfer request from the first institution for the second account; the asset certificate transfer request includes a request to cancel the second account , And transfer the encrypted asset certificate in the second account to the new account of the first institution; the supervisor sends a verification for the asset certificate transfer request to the node on the blockchain to verify the The account certificate of the second account and the account certificate of the newly entered account of the first institution, and verify whether the first encrypted asset certificate requested to be revoked and the encrypted asset certificate of the second account meet the transfer conditions through a private transaction verification method If the supervisor determines that the verification is passed, the account certificate of the second account is revoked, and the second account is set to be invalid; the encrypted asset certificate in the second account is transferred to the first institution New account.
  • the regulator has realized the solution of revoking the encrypted asset certificate in the account on the blockchain by verifying the encrypted asset certificate of the second account of the first institution and the newly entered account of the first institution, and Associate the offline account of the first institution, and then realize the safe cancellation of the second account on the blockchain, ensuring the security of the account on the blockchain.
  • the method further includes: the supervisory party transferring the encrypted asset certificate in the second account of the first institution to the supervisory account of the supervisory party, and transferring the first institution 2.
  • the account certificate of the account is locked; the supervisory party verifies whether the encrypted asset certificate of the second account is abnormal according to the asset certificate of the first institution transferred to the supervisory account; if it is determined that there is no abnormality, unlock The account certificate of the second account, and transfer the encrypted asset certificate generated by the asset certificate of the first institution deposited in the supervision account to the second account; The private key of the organization and the transaction data stored on the blockchain to find abnormal transactions.
  • the regulator transfers the encrypted asset certificate in the second account of the first institution on the blockchain to the supervision account to verify whether the second account of the first institution on the blockchain is abnormal, It can effectively supervise the accounts on the blockchain, discover abnormal transactions in time, and trace the transactions on the blockchain according to the private key of each account, and then identify the cause of the abnormality, which effectively improves the intensity of supervision. To ensure the normal and orderly progress of transactions on the blockchain.
  • the present invention provides a block chain private transaction device, which includes:
  • the transceiving unit is used to obtain the access request sent by the first institution; the access request includes the asset certificate that the access request needs to be added to the blockchain;
  • the processing unit is used to verify the access request; if it is determined that the verification is passed, generate an account certificate for the second account according to the second account generated by the first institution according to the blockchain; and compare the asset certificate according to The public key encryption of the first institution is an encrypted asset certificate; the encrypted asset certificate is used for the second account to transact with other accounts on the blockchain, and the correctness of the transaction is verified by a private transaction verification method; The supervisory party generates an access transaction request according to the account certificate of the second account and the encrypted asset certificate, and the transaction access request is used to add the encrypted asset certificate to the second account; If the node on the blockchain passes the verification of the access transaction request, the second account, the account certificate of the second account, and the encrypted asset certificate of the second account are written into the block chain;
  • the transceiver unit is configured to initiate the transaction access request to a node on the blockchain, so that the node on the blockchain verifies the transaction access request.
  • the admission request further includes the identity information of the first institution and the account information of the first offline account corresponding to the first institution; the processing unit is specifically configured to:
  • the transceiver unit is further configured to obtain a first transaction request sent by the first institution; the first transaction request includes a request to transfer the first asset in the first account to the first Two institutions; the account of the second institution on the blockchain is the third account, and the offline account corresponding to the second institution is the fourth account; sending a second transaction request to a node on the blockchain, Verifying the correctness of the transaction of the first encrypted asset certificate by a private transaction verification method;
  • the processing unit is further configured to generate a second transaction request according to the first transaction request if it is verified that the first transaction request is passed; the second transaction request is used to transfer the first encrypted asset certificate from the The second account is transferred to the third account; the first encrypted asset certificate is determined according to the first asset; if it is determined that the verification of the second transaction request is passed, the second transaction It is recorded on the blockchain, and the second account and the third account are updated through the accounting node on the blockchain.
  • the transceiver unit is further configured to obtain a third transaction request sent by the first institution; the third transaction request includes a second encrypted asset certificate requested to be transferred to the third institution to the The first account; the account of the third institution on the blockchain is the fifth account, and the corresponding offline account is the sixth account; the fourth transaction request is sent to the node on the blockchain to pass the privacy
  • the transaction verification method verifies the correctness of the transaction of the second encrypted asset certificate; the second encrypted asset certificate is determined according to the first asset;
  • the processing unit is further configured to: if it is verified that the third transaction request is passed, generate the fourth transaction request according to the third transaction request; the fourth transaction request is used to encrypt the second transaction request.
  • the asset certificate is transferred from the fifth account to the second account; if it is determined that the verification of the second transaction request is passed, the second encrypted asset certificate is determined to be transferred to the second account according to the second encrypted asset certificate.
  • Assets; the second transaction is recorded on the blockchain through the accounting node, and the second account and the fifth account are updated through the accounting node on the blockchain.
  • the transceiver unit is further configured to obtain a cancellation request of the first institution for the second account; the cancellation request includes the first encrypted asset certificate requested to be cancelled;
  • the upper node sends verification for the cancellation request to verify the account certificate of the second account, and verify the first encrypted asset certificate of the request for cancellation and the encrypted asset certificate of the second account through a private transaction verification method Whether the cancellation conditions are met;
  • the processing unit is further configured to: if it is determined that the verification is passed, revoke the account certificate of the second account and set the second account to be invalid; set the encrypted asset certificate in the second account to the corresponding The corresponding assets in the offline first account of the first institution are unfrozen.
  • the transceiver unit is further configured to obtain an asset certificate transfer request from the first institution for the second account; the asset certificate transfer request includes a request to cancel the second account, and Transfer the encrypted asset certificate in the second account to the new account of the first institution; send verification for the asset certificate transfer request to the node on the blockchain to verify the account of the second account A certificate and the account certificate of the newly entered account of the first institution, and verifying whether the first encrypted asset certificate requested to be revoked and the encrypted asset certificate of the second account meet the transfer conditions through a private transaction verification method;
  • the processing unit is further configured to: if it is determined that the verification is passed, revoke the account certificate of the second account and set the second account to be invalid; transfer the encrypted asset certificate in the second account to the State the new account of the first institution.
  • the processing unit is further configured to:
  • the asset certificate of the first institution verifies whether there is an abnormality in the encrypted asset certificate of the second account; if it is determined that there is no abnormality, the account certificate of the second account is unlocked, and the second account is deposited in the supervised account.
  • An institution’s asset certificate generates an encrypted asset certificate and transfers it to the second account; if it is determined that there is an abnormality, the abnormal transaction is searched for according to the private key of each institution on the blockchain and the transaction data stored on the blockchain.
  • the present invention provides a server, which includes:
  • Memory used to store instructions executed by at least one processor
  • the processor is configured to execute instructions stored in the memory to execute the method described in the first aspect.
  • the present invention provides a computer-readable storage medium, the computer-readable storage medium stores computer instructions, and when the computer instructions run on a computer, the computer executes the method described in the first aspect.
  • FIG. 1 is a schematic structural diagram of a blockchain network system provided by an embodiment of the present invention
  • FIG. 2 is a flowchart of a method for private transactions on a blockchain provided by an embodiment of the present invention
  • Figure 3 is a flowchart of a verification method provided by an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a block chain private transaction device provided by an embodiment of the present invention.
  • Fig. 5 is a schematic structural diagram of a server provided by an embodiment of the present invention.
  • Block chain is a chain composed of a series of blocks. In addition to recording the data of this block, each block also records the hash value of the previous block. In this way, a chain is formed.
  • a block consists of a block header and a block body.
  • the block header definition includes the block height h.
  • the hash of the previous block refers to important fields such as prevHash, and the block body mainly stores transaction data.
  • consortium chain The consortium chain is only for members of a certain group and limited third parties. A number of pre-selected nodes are designated as bookkeepers. The generation of each block is jointly determined by all pre-selected nodes, and other access nodes can participate Transaction, but not about the accounting process, other third parties can make limited queries through the open interface API of the blockchain.
  • the alliance chain has certain requirements for the configuration of consensus or verification nodes and the network environment. Through the access mechanism, transaction performance can be improved more easily and some security problems caused by the qualifications of the participants can be avoided.
  • Confidential transaction is a kind of completely concealing the transaction amount when transferring funds between accounts in the blockchain.
  • the transaction amount can be converted into ciphertext through homomorphic encryption through encryption;
  • Blockchain nodes can verify the correctness of transaction data according to homomorphic encryption.
  • a transaction that transfers the amount a from account A can be split into the amount b transferred from account A and the amount c transferred from Zhang A; when the node verifies, it is not clear about the transfer a,
  • the present invention provides a blockchain network system architecture.
  • the blockchain network system includes a supervisor 101, a first institution 102, a second institution 104, and a blockchain 103.
  • the blockchain 103 may include multiple nodes, such as node 0, node 1, node 2, and node 3.
  • the regulator 101 is used to manage the institutions of the blockchain, the monitoring of the network status, and the supervision of transactions on the blockchain.
  • the first institution 102 and the second institution 104 are used to communicate with the regulator 101 or the node of the blockchain 103.
  • the supervisor 101 is used to verify the identity information of the institution that joins the blockchain, and the node of the blockchain 103 is used to verify the encrypted asset certificate of the institution that joins the blockchain, and the institution is in Private transactions initiated on the blockchain can be verified through private transaction verification methods.
  • the verification method of the private transaction can be any method in the zero-knowledge proof, for example, using perdenser commitent and bulletproofs to implement the private transaction, which is not limited by the present invention.
  • the supervisor 101 may include multiple servers or one server, which is not limited here.
  • Step 201 The supervisor obtains the access request sent by the first institution; the access request includes the asset certificate that the access request needs to be added to the blockchain;
  • the asset certificate can be recorded in the supervisory account of the supervisor in the form of a deposit, so that the supervisor can supervise the first offline account of the first institution and the second account on the blockchain.
  • the admission request further includes the identity information of the first institution and the account information of the first offline account corresponding to the first institution; the identity information includes the first institution The name of the first organization, the type of the first organization, and the Uniform Resource Locator (URL) address of the first organization’s invention certificate.
  • the identity information includes the first institution The name of the first organization, the type of the first organization, and the Uniform Resource Locator (URL) address of the first organization’s invention certificate.
  • URL Uniform Resource Locator
  • the verification of the admission request by the supervisory party includes:
  • the supervisor verifies whether the identity information of the first institution is consistent with the identity information of the offline first account of the first institution;
  • the identity information such as the name of the first organization, the type of the first organization, the URL address of the first organization’s invention certificate, and the identity of the first organization (such as the organization code) can be obtained, and the first organization can also be acquired.
  • the supervisor verifies whether the assets of the first account of the first institution meet the conditions for redeeming the asset certificate that needs to be added to the blockchain for the access request.
  • the supervisor verifies whether the asset certificate of the first account converted to the blockchain resource certificate according to a preset ratio is greater than or equal to the asset certificate requested in the access request.
  • Step 202 The supervisor verifies the admission request, and if it is determined that the verification is passed, it generates an account certificate for the second account according to the second account generated by the blockchain for the first institution;
  • the account certificate can be generated according to the requirements of the blockchain account certificate, set the validity period, password algorithm, etc., and generated by the organization that has issued the account certificate. In the specific implementation, it can be generated by the supervisor, or it can be issued by a third party, which is not limited here.
  • the generated account certificate may also be signed by the private key of the regulatory agency; to enhance security, the account certificate may also include the signature of the first agency.
  • the signature can be signed by the first institution after confirming the second account, or it can be generated after sending the access request, which is not limited here.
  • Step 203 The supervisor encrypts the asset certificate into an encrypted asset certificate according to the public key of the first institution; the encrypted asset certificate is used for the second account to trade with other accounts on the blockchain, and passes The private transaction verification method verifies the correctness of the transaction.
  • the first institution can decrypt the encrypted asset certificate through the private key of the first institution, so that the first institution can directly initiate a private transaction request to the blockchain through the established second account, as shown in Figure 3, include:
  • Step 1 The first institution sends the first transaction request to the node on the blockchain;
  • the first transaction request includes a request to transfer out the first encrypted asset certificate in the second account to a second institution; it may also include the remaining encrypted asset certificate in the second account after the first institution transfers out;
  • the account of the second institution on the blockchain is the third account;
  • Step 2 The node on the blockchain verifies the correctness of the transaction of the first encrypted asset certificate through a private transaction verification method
  • the first encrypted asset certificate and the current encrypted asset certificate in the second account can be used to determine whether the estimated remaining encrypted asset certificate of the second account deducted from the second account is the same as that in the first transaction request.
  • the remaining encrypted asset certificates are equal, and whether the first encrypted asset certificate, the predicted remaining encrypted asset certificate, and the remaining encrypted asset certificate in the first transaction request are not 0, to verify whether the transaction request is a correct private transaction.
  • Step 3 If the node on the blockchain verifies that the first transaction request is passed, the first transaction is recorded on the blockchain, and the second transaction is updated by the accounting node on the blockchain. Account and said third account.
  • the method may also include:
  • Step 1 The second institution sends a third transaction request to the blockchain
  • the third transaction request includes a request to transfer the second encrypted asset certificate in the fifth account of the third institution to the second account;
  • the account of the third institution on the blockchain is the fifth account ,
  • the corresponding offline account is the sixth account;
  • Step 2 The node on the blockchain verifies the correctness of the transaction of the second encrypted asset certificate through a private transaction verification method
  • Step 3 If the accounting node determines that the verification of the second transaction request is passed, it records the second transaction on the blockchain, and updates the second account and the fifth account.
  • the transaction is directly initiated by the first institution to log in to the second account corresponding to the blockchain, and the transaction is performed through the encrypted asset certificate, which ensures the privacy of account transactions on the blockchain.
  • the regulator encrypts the asset certificate into an encrypted asset certificate using the public key of the first institution, it also includes:
  • the supervisory party records the asset certificate of the first institution in the supervisory account of the supervisory party to update the offline of the first institution according to the encrypted asset certificate of the second account traded on the blockchain The assets of the account;
  • the supervisor freezes the assets in the first account corresponding to the asset certificate.
  • the supervisor verifies the identity information of the first institution and the account information of the first account, establishes a connection between the first account and the second account, and verifies whether the assets of the first account of the first institution are Meeting the conditions for redeeming the asset certificate that needs to be added to the blockchain for the access request improves the security of the second account of the first institution on the chain, and is beneficial to the first institution’s second account on the blockchain.
  • Step 204 The supervisor generates an access transaction request according to the account certificate of the second account and the encrypted asset certificate, and the transaction access request is used to add the encrypted asset certificate to the second account;
  • Step 205 The supervisor initiates the transaction access request to a node on the blockchain, so that the node on the blockchain verifies the transaction access request;
  • the supervisor can send the transaction access request to each trusted third party in the blockchain, and receive feedback from each trusted third party based on the transaction access request. verify message.
  • the server sends the received transaction request of the first institution to each trusted third party in the blockchain, where the blockchain may include multiple trusted third parties, and the trusted third parties may It is a certificate authority (Certificate Authority, CA), multiple trusted third parties can correspond to one server, or each trusted third party can correspond to one server.
  • CA Certificate Authority
  • Multiple trusted third parties in the blockchain can verify the account certificate of the second account in the transaction request, the first institution, and the encrypted asset certificate according to the transaction access request received from the first institution.
  • it can include:
  • Step 1 Verify whether the regulatory signature is issued by the regulatory agency
  • Step 2 Verify whether the account certificate of the first organization is issued by a valid certificate issuing organization, whether it meets the requirements of the blockchain account certificate, and whether the certificate format (validity period, password algorithm) is legal;
  • the valid certificate issuing authority can be a supervisor or a pre-confirmed third party, which is not limited here.
  • Step 2 Verify whether the signature of the first organization is legal.
  • the verification of the encrypted asset certificate can be verified according to the verification method of the private transaction. For example, verifying whether the initial quota a0 of the second account, the encrypted asset certificate, and the quota a1 of the second account after adding the encrypted asset certificate to the second account meet the verification of private transactions, that is, three amounts (initial quota a0, encrypted Whether the asset certificate and the quota a1 of the second account after adding the encrypted asset certificate is greater than 0, and whether the estimated quota a2 of the second account determined by the initial quota a0 and the encrypted asset certificate is equal to the quota a1 of the second account.
  • step 206 if the supervisor determines that the node on the blockchain has passed the verification of the access transaction request, then the second account, the account certificate of the second account, and the The encrypted asset certificate is written into the blockchain.
  • the consensus mechanism includes: based on a voting algorithm, determining the number of organizations in the blockchain that agrees to the first organization to join, and if the number exceeds a preset threshold, allowing the first organization to join the zone Block chain; or, if it is determined that the institution preset in the blockchain agrees to the first institution to join, the first institution is allowed to join the blockchain, wherein the preset institution includes at least one of the Institutions in the blockchain.
  • the account certificate of the second account and the encrypted asset certificate of the second account can be written into the smart contract corresponding to the blockchain.
  • the asset certificate of the first institution that needs to be chained can be encrypted by the supervisor, so that the asset certificate written in the second account of the first institution on the blockchain is an encrypted asset certificate, so that the first institution is in the district
  • the transactions on the blockchain are encrypted from funding to transactions, which ensures the privacy of the transactions of the first institution on the blockchain.
  • the supervisor generates an account certificate for the second account, which effectively guarantees the validity and security of the account on the blockchain, enhances the security and privacy of the blockchain in private transactions, and expands the process of blockchain Application scenarios for private transactions such as transfers.
  • a possible implementation method includes:
  • Step 1 The supervisor obtains the cancellation request of the first institution for the second account; the cancellation request includes the first encrypted asset certificate requested to be cancelled;
  • Step 2 The supervisor sends a verification for the revocation request to the node on the blockchain to verify the account certificate of the second account and verify that the first encrypted asset certificate requested to be revoked is verified by the private transaction verification method. Whether the encrypted asset certificate of the second account meets the revocation conditions;
  • the cancellation conditions can be determined according to the method of private transaction verification.
  • Step 3 If the supervisor determines that the verification is passed, the account certificate of the second account is revoked, and the second account is set to be invalid;
  • the account certificate can be added to the certificate revocation list of the node, and all accounts corresponding to the first institution can be invalidated. It can also be invalid for the second account, which can be determined according to specific needs.
  • Step 4 The supervisor unfreezes the corresponding assets in the offline first account of the first institution corresponding to the encrypted asset certificate in the second account.
  • the supervisor verifies the encrypted asset certificate of the second account of the first institution to realize the solution of canceling the encrypted asset certificate in the account on the blockchain, and associates the first institution’s offline Account, and then realize the safe cancellation of the second account on the blockchain, which ensures the security of the account on the blockchain.
  • the method further includes:
  • Step 1 The supervisor obtains the asset certificate transfer request of the first institution for the second account; the asset certificate transfer request includes a request to cancel the second account and transfer the encrypted assets in the second account The certificate is transferred to the new account of the first institution;
  • Step 2 The supervisor sends a verification for the asset certificate transfer request to the node on the blockchain to verify the account certificate of the second account and the account certificate of the newly entered account of the first institution, and pass the private transaction verification The method verifies whether the first encrypted asset certificate requested to be revoked and the encrypted asset certificate of the second account meet the transfer condition;
  • the node can verify whether the regulatory signature is issued by the regulatory agency, verify the digital signature of the first agency (the sender of the asset certificate transfer request), and verify whether the account certificate in the request matches the public key of the signature.
  • the specific implementation process can refer to the verification process in the admission request, which will not be repeated here. It should be noted that the transfer conditions can be determined according to the method of private transaction verification, which is not limited here.
  • Step 3 If the supervisor determines that the verification is passed, the account certificate of the second account is revoked, and the second account is set to be invalid; the encrypted asset certificate in the second account is transferred to the first institution New account.
  • the supervisor initiates an access transaction request to transfer funds to the new account, so that the encrypted asset certificate can be transferred to the new account.
  • the regulator has realized the solution of revoking the encrypted asset certificate in the account on the blockchain by verifying the encrypted asset certificate of the second account of the first institution and the newly entered account of the first institution, and Associate the offline account of the first institution, and then realize the safe cancellation of the second account on the blockchain, ensuring the security of the account on the blockchain.
  • the supervisor can supervise the second account of the first institution in the following ways, which may specifically include:
  • Step 1 The supervisor transfers out the encrypted asset certificate in the second account of the first institution to the supervisory account of the supervisor, and locks the account certificate of the second account;
  • Step 2 The supervisory party verifies whether the encrypted asset certificate of the second account is abnormal according to the asset certificate of the first institution transferred to the supervisory account; if there is an abnormality, proceed to step 4, if not, then Perform step three;
  • Step 3 Unlock the account certificate of the second account, and transfer the encrypted asset certificate generated by the asset certificate of the first institution deposited in the supervision account to the second account;
  • Step 4 Find abnormal transactions based on the private keys of various institutions on the blockchain and the transaction data stored on the blockchain.
  • the supervision performed by the supervisor can be carried out at a preset time, for example, it can be carried out at a time with relatively few transactions, so as to avoid affecting the normal progress of transactions on the blockchain.
  • the regulator transfers the encrypted asset certificate in the second account of the first institution on the blockchain to the supervision account to verify whether the second account of the first institution on the blockchain is abnormal, It can effectively supervise the accounts on the blockchain, discover abnormal transactions in time, and trace the transactions on the blockchain according to the private key of each account, and then identify the cause of the abnormality, which effectively improves the intensity of supervision. To ensure the normal and orderly progress of transactions on the blockchain.
  • the embodiment of the present invention also provides a private transaction method of the blockchain, which may include:
  • Step 1 The supervisor obtains the first transaction request sent by the first institution; wherein the first transaction request includes a request to transfer the first encrypted asset certificate in the second account to a second institution; the second institution
  • the account on the blockchain is the third account;
  • Step 2 If the supervisor verifies that the first transaction request is passed, it forwards the first transaction request to the node on the blockchain to verify the correctness of the transaction of the first encrypted asset certificate through the private transaction verification method ;
  • Step 3 If the node determines that the verification of the second transaction request is passed, it records the first transaction on the blockchain through the accounting node, and updates the first transaction through the accounting node on the blockchain. The second account and the third account.
  • Step 4 The supervisor records the first transaction record and updates the asset certificate of the first institution in the supervisory account
  • the supervisor can also determine, according to the first encrypted asset certificate and the private key of the first institution, that the first account changes the assets in the first account in the first transaction request, and then transfers to the first account
  • the first institution initiates settlement for the first transaction to update the first account.
  • the fourth account of the second institution can also be updated.
  • you can also initiate settlement at a set time as needed, and there is no limitation here.
  • the supervisor can supervise each transaction, make it easier to find abnormal transactions, and improve the monitoring effectiveness.
  • the first institution can initiate transaction requests through the supervisory institution without logging in to the account on the blockchain.
  • the specific implementation process can include:
  • Step 1 The supervisor obtains the first transaction request sent by the first institution; the first transaction request includes a request to transfer the first asset in the first account to a second institution; the second institution is in the The account on the blockchain is the third account, and the offline account corresponding to the second institution is the fourth account;
  • Step 2 If the supervisor verifies that the first transaction request is passed, it generates a second transaction request according to the first transaction request; the second transaction request is used to transfer the first encrypted asset certificate from the second account Transfer to the third account; the first encrypted asset certificate is determined according to the first asset;
  • Step 3 The supervisor sends the second transaction request to the node on the blockchain to verify the correctness of the transaction of the first encrypted asset certificate through a private transaction verification method;
  • Step 4 If the supervisor determines that the verification of the second transaction request is passed, the second transaction is recorded on the blockchain through the accounting node, and the accounting node on the blockchain updates the The second account and the third account.
  • the first institution can initiate the first transaction request to the offline second institution to the regulator through the first offline account, and the regulator uses the respective accounts of the first institution and the second institution on the blockchain. , Initiate private transactions and complete transactions. During the transaction process, the privacy of an account is guaranteed, the security of the transaction is improved, and transactions that cannot be achieved offline are realized, and the application of private transactions on the blockchain is expanded.
  • the method further includes:
  • Step 1 The supervisor obtains the third transaction request sent by the first institution; the third transaction request includes the second encrypted asset certificate requested to be transferred to the third institution to the first account; the third institution The account on the blockchain is the fifth account, and the corresponding offline account is the sixth account;
  • Step 2 If the supervisor verifies that the third transaction request is passed, it generates a fourth transaction request according to the third transaction request; the fourth transaction request is used to transfer the second encrypted asset certificate from the first 5. The account is transferred to the second account;
  • Step 3 The supervisor sends the fourth transaction request to the node on the blockchain to verify the correctness of the transaction of the second encrypted asset certificate through a private transaction verification method; the second encrypted asset certificate is the basis The first asset is determined;
  • Step 4 If the supervisor determines that the verification of the second transaction request is passed, it determines the second asset transferred to the first account according to the second encrypted asset certificate;
  • Step 5 The supervisor records the second transaction on the blockchain, and updates the second account and the fifth account through the accounting node on the blockchain.
  • the first institution can process the second transaction request initiated by the offline second institution to the offline first institution through the supervisor, and the supervisor uses the respective accounts of the first institution and the second institution on the blockchain , Initiate private transactions and complete transactions.
  • the privacy of an account is guaranteed, the security of the transaction is improved, and transactions that cannot be achieved offline are realized, and the application of private transactions on the blockchain is expanded.
  • the present invention provides a block chain private transaction device. As shown in FIG. 4, the device includes:
  • the transceiver unit 401 is configured to obtain an access request sent by a first institution; the access request includes the asset certificate that the access request needs to be added to the blockchain;
  • the processing unit 402 is configured to verify the access request; if it is determined that the verification is passed, generate an account certificate for the second account according to the second account generated by the blockchain for the first institution; and transfer the asset certificate Encrypted into an encrypted asset certificate according to the public key of the first institution; the encrypted asset certificate is used for the second account to transact with other accounts on the blockchain, and the correctness of the transaction is verified by a private transaction verification method;
  • the supervisory party generates an access transaction request based on the account certificate of the second account and the encrypted asset voucher, where the access transaction request is used to add the encrypted asset voucher to the second account; if It is determined that the node on the blockchain has passed the verification of the access transaction request, then the second account, the account certificate of the second account, and the encrypted asset certificate of the second account are written into the area Block chain
  • the transceiver unit 401 is configured to initiate the access transaction request to a node on the blockchain, so that the node on the blockchain verifies the access transaction request.
  • the admission request further includes the identity information of the first institution and the account information of the offline first account corresponding to the first institution; the processing unit 402 is specifically configured to:
  • the transceiver unit 401 is further configured to obtain a first transaction request sent by the first institution; the first transaction request includes a request to transfer the first asset in the first account to The second institution; the account of the second institution on the blockchain is the third account, and the offline account corresponding to the second institution is the fourth account; sending a second transaction request to a node on the blockchain , Verifying the correctness of the transaction of the first encrypted asset certificate by a private transaction verification method;
  • the processing unit 402 is further configured to generate a second transaction request according to the first transaction request if the verification of the first transaction request is passed; the second transaction request is used to transfer the first encrypted asset certificate from the The second account is transferred to the third account; the first encrypted asset certificate is determined according to the first asset; if it is determined that the verification of the second transaction request is passed, the second The transaction is recorded on the blockchain, and the second account and the third account are updated through the accounting node on the blockchain.
  • the transceiver unit 401 is further configured to obtain a third transaction request sent by the first institution; the third transaction request includes a second encrypted asset certificate that is requested to be transferred to the third institution to the In the first account; the account of the third institution on the blockchain is the fifth account, and the corresponding offline account is the sixth account; the fourth transaction request is sent to the node on the blockchain to pass
  • the private transaction verification method verifies the correctness of the transaction of the second encrypted asset certificate; the second encrypted asset certificate is determined according to the first asset;
  • the processing unit 402 is further configured to: if it is verified that the third transaction request is passed, generate the fourth transaction request according to the third transaction request; the fourth transaction request is used to transfer the second transaction request
  • the encrypted asset certificate is transferred from the fifth account to the second account; if it is determined that the verification of the second transaction request is passed, according to the second encrypted asset certificate, the first account transferred to the first account is determined Two assets; record the second transaction on the blockchain, and update the second account and the fifth account through the accounting node on the blockchain.
  • the transceiver unit 401 is further configured to obtain a cancellation request of the first institution for the second account; the cancellation request includes the first encrypted asset certificate requested to be cancelled;
  • the nodes on the chain send verification for the cancellation request to verify the account certificate of the second account, and verify the first encrypted asset certificate of the request for cancellation and the encrypted asset of the second account through a private transaction verification method Whether the certificate meets the revocation conditions;
  • the processing unit 402 is further configured to: if it is determined that the verification is passed, revoke the account certificate of the second account, and set the second account to be invalid; and set the encrypted asset certificate in the second account to correspond to The corresponding assets in the offline first account of the first institution are unfrozen.
  • the transceiver unit 401 is further configured to obtain an asset certificate transfer request from the first institution for the second account; the asset certificate transfer request includes a request to cancel the second account, And transfer the encrypted asset certificate in the second account to the new account of the first institution; send a verification of the asset certificate transfer request to the node on the blockchain to verify the account of the second account The account certificate and the account certificate of the newly entered account of the first institution, and verifying whether the first encrypted asset certificate requested to be revoked and the encrypted asset certificate of the second account meet the transfer conditions through a private transaction verification method;
  • the processing unit 402 is further configured to: if it is determined that the verification is passed, revoke the account certificate of the second account, and set the second account as invalid; transfer the encrypted asset certificate in the second account to The new account of the first institution.
  • processing unit 402 is further configured to:
  • the asset certificate of the first institution verifies whether there is an abnormality in the encrypted asset certificate of the second account; if it is determined that there is no abnormality, the account certificate of the second account is unlocked, and the second account is deposited in the supervised account.
  • An institution’s asset certificate generates an encrypted asset certificate and transfers it to the second account; if it is determined that there is an abnormality, the abnormal transaction is searched for according to the private key of each institution on the blockchain and the transaction data stored on the blockchain.
  • the present invention provides a computer-readable storage medium, the computer-readable storage medium stores computer instructions, and when the computer instructions run on a computer, the computer executes the method described in the first embodiment.
  • the server may include a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, and a communication bus 1002.
  • the communication bus 1002 is used to implement connection and communication between these components.
  • the user interface 1003 may include a display screen (Display) and an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
  • the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface).
  • the memory 1005 may be a high-speed RAM memory, or a non-volatile memory (non-volatile memory), such as a magnetic disk memory.
  • the memory 1005 may also be a storage device independent of the foregoing processor 1001.
  • FIG. 5 does not constitute a limitation on the computer device, and may include more or less components than those shown in the figure, or a combination of certain components, or different component arrangements.
  • the memory 1005 may include an operating system, a network communication module, a user interface module, and a private transaction program of the blockchain.
  • the operating system is a program for the supervisor to obtain system hardware and software resources, a program that supports private transactions on the blockchain and the operation of other software or programs.
  • the user interface 1003 is mainly used to connect, the second server, the third server, etc., to communicate with each server;
  • the network interface 1004 is mainly used to connect to the background server, and to communicate with the background server;
  • the processor 1001 can be used to call the memory
  • Verify the access request if it is determined that the verification is passed, generate an account certificate for the second account according to the second account generated by the blockchain for the first institution; and use the asset certificate according to the first institution
  • the public key encryption is an encrypted asset certificate
  • the encrypted asset certificate is used for the second account to conduct transactions with other accounts on the blockchain, and the correctness of the transaction is verified by a private transaction verification method
  • the account certificate of the second account and the encrypted asset certificate generate an access transaction request, which is used to add the encrypted asset certificate to the second account; if it is determined that the blockchain
  • the upper node passes the verification of the access transaction request, and then writes the second account, the account certificate of the second account, and the encrypted asset certificate of the second account into the blockchain.
  • the admission request further includes the identity information of the first institution and the account information of the first offline account corresponding to the first institution; the processor 1001 is specifically configured to:
  • the processor 1001 is further configured to generate a second transaction request according to the first transaction request if it is verified that the first transaction request is passed; the second transaction request is used to transfer the first transaction request
  • the encrypted asset certificate is transferred from the second account to the third account; the first encrypted asset certificate is determined according to the first asset; if it is determined that the verification of the second transaction request is passed, then
  • the second transaction is recorded on the blockchain, and the second account and the third account are updated through a billing node on the blockchain.
  • the processor 1001 is further configured to: if it is verified that the third transaction request is passed, generate the fourth transaction request according to the third transaction request; the fourth transaction request is used for Transfer the second encrypted asset certificate from the fifth account to the second account; if it is determined that the verification of the second transaction request is passed, determine the transfer to the second account according to the second encrypted asset certificate
  • the second asset of the first account; the second transaction is recorded on the blockchain, and the second account and the fifth account are updated through the accounting node on the blockchain.
  • the processor 1001 is further configured to: if it is determined that the verification is passed, revoke the account certificate of the second account, and set the second account to be invalid; The corresponding asset in the offline first account of the first institution corresponding to the encrypted asset certificate is unfrozen.
  • the processing unit 402 is further configured to: if it is determined that the verification is passed, revoke the account certificate of the second account, and set the second account as invalid; in the second account The encrypted asset certificate of is transferred to the new account of the first institution.
  • processing unit 402 is further configured to:
  • the asset certificate of the first institution verifies whether there is an abnormality in the encrypted asset certificate of the second account; if it is determined that there is no abnormality, the account certificate of the second account is unlocked, and the second account is deposited in the supervised account.
  • An institution’s asset certificate generates an encrypted asset certificate and transfers it to the second account; if it is determined that there is an abnormality, the abnormal transaction is searched for according to the private key of each institution on the blockchain and the transaction data stored on the blockchain.
  • the embodiments of the present invention may be provided as methods, systems, or computer program products. Therefore, the present invention may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, the present invention may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, optical storage, etc.) containing computer-usable program codes.
  • a computer-usable storage media including but not limited to disk storage, optical storage, etc.
  • These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing functions specified in a flow or multiple flows in the flowchart and/or a block or multiple blocks in the block diagram.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

一种区块链的私密交易方法及装置,涉及科技金融(Fintech)领域,该方法包括:监管方(101)获取第一机构(102)发送的准入请求,所述准入请求包括所述准入请求需加入至区块链(103)的资产凭证;监管方(101)为第二账户生成账户证书;监管方(101)将所述资产凭证根据所述第一机构(102)的公钥加密为加密资产凭证;监管方(101)根据所述第二账户的账户证书及所述加密资产凭证,生成准入交易请求;监管方(101)向区块链(103)上的节点发起所述准入交易请求,监管方(101)若确定所述区块链(103)上的节点对所述准入交易请求的验证通过,则将第二账户、所述第二账户的账户证书、及所述第二账户的加密资产凭证写入区块链(103)。通过监管方(101)对第一机构(102)的准入的资产进行加密,有效保证了第一机构(102)对上链的交易的私密性要求。

Description

一种区块链的私密交易方法及装置
相关申请的交叉引用
本申请要求在2019年06月28日提交中国专利局、申请号为201910579322.9、申请名称为“一种区块链的私密交易方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明实施例涉及科技金融(fintech)领域,尤其涉及一种区块链的私密交易方法及装置。
背景技术
随着计算机技术的发展,越来越多的技术应用在金融领域,传统金融业正在逐步向金融科技(fintech)转变,区块链(block chain)技术也不例外,但由于金融行业的安全性、实时性要求,也对技术提出的更高的要求。
随着区块链技术的迅猛发展,区块链被广泛应用于各行各业,例如金融、证券以及物流等领域,而根据参与方的不同区块链可分为公有链、私有链以及区块链,其中,公有链是任何人都可以参与使用和维护,信息是完全公开的,私有链是由集中管理者进行管理限制,只有内部少数人可以使用,信息不公开的,区块链是介于两者之间,由若干机构一起维护的一条区块链,有访问权限的机构或成员才能访问区块链中的信息。
但是,由于区块链上的交易针对各节点可查,使得参与方的交易没有私密性,无法满足参与方对交易的私密性和安全性的要求。
发明内容
本发明提供一种区块链的私密交易方法及装置,用以解决现有准入方法中区块链的安全性较低的技术问题。
第一方面,本发明提供一种区块链的私密交易方法,该方法包括:监管方获取第一机构发送的准入请求;所述准入请求包括所述准入请求需加入至区块链的资产凭证;所述监管方验证所述准入请求,若确定验证通过,则根据区块链为所述第一机构生成的第二账户,为所述第二账户生成账户证书;监管方将所述资产凭证根据所述第一机构的公钥加密为加密资产凭证;所述加密资产凭证用于所述第二账户与区块链上的其他账户进行交易,且通过私密交易验证方法验证交易的正确性;监管方根据所述第二账户的账户证书及所述加密资产凭证,生成准入交易请求,所述准入交易请求用于将所述加密资产凭证加入至所述第二账户中;监管方向区块链上的节点发起所述准入交易请求,以使所述区块链上的节点验证所述准入交易请求;监管方若确定所述区块链上的节点对所述准入交易请求的验证通过,则将所述第二账户、所述第二账户的账户证书、及所述第二账户的加密资产凭证写入区块链。
上述技术方案,可以通过监管方将第一机构需上链的资产凭证加密,使得写入区块链的第一机构的第二账户中的资产凭证为加密资产凭证,使得第一机构在区块链上的交易从入资至交易都是加密的,保证了第一机构在区块链上的交易的私密性。另外,通过监管方 为第二账户生成账户证书,有效保证了区块链上的账户的有效性和安全性,增强了区块链在私密交易的安全性和私密性,扩大了区块链进行转账等私密交易的应用场景。
一种可能的实现方式,所述准入请求还包括所述第一机构的身份信息、所述第一机构对应的线下的第一账户的账户信息;所述监管方验证所述准入请求,包括:所述监管方验证所述第一机构的身份信息是否与所述第一机构的线下的第一账户的身份信息一致;所述监管方验证所述第一机构的所述第一账户的资产是否满足兑换所述准入请求需加入至区块链的资产凭证的条件;所述监管方将所述资产凭证加密为加密资产凭证后,还包括:所述监管方将所述第一机构的资产凭证记录于所述监管方的监管账户中,以根据所述第二账户在区块链上交易的加密资产凭证更新所述第一机构的线下账户的资产;所述监管方将所述第一账户中与所述资产凭证对应的资产冻结。
上述技术方案,通过监管方验证第一机构的身份信息及第一账户的账户信息,将第一账户与第二账户建立联系,并通过验证所述第一机构的所述第一账户的资产是否满足兑换所述准入请求需加入至区块链的资产凭证的条件,提高了对第一机构上链的第二账户的安全性,并且,有利于对第一机构在区块链上的第二账户进行监管。
一种可能的实现方式,所述方法还包括:所述监管方获取所述第一机构发送的第一交易请求;所述第一交易请求包括请求转出所述第一账户中的第一资产至第二机构;所述第二机构在所述区块链上的账户为第三账户,所述第二机构对应的线下账户为第四账户;所述监管方若验证所述第一交易请求通过,则根据所述第一交易请求,生成第二交易请求;所述第二交易请求用于将第一加密资产凭证从所述第二账户转入至所述第三账户;所述第一加密资产凭证为所述根据所述第一资产确定的;所述监管方向区块链上的节点发送所述第二交易请求,以通过私密交易验证方法验证所述第一加密资产凭证的交易的正确性;所述监管方若确定所述第二交易请求的验证通过,则通过记账节点将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第三账户。
上述技术方案,第一机构可以通过线下的第一账户向监管方发起对线下的第二机构的第一交易请求,监管方利用第一机构与第二机构各自在区块链上的账户,发起私密交易,完成交易,在交易过程中,保证了个账户的私密性,提高了交易的安全性,并且实现了线下无法实现的交易,扩展了区块链的私密交易的应用。
一种可能的实现方式,所述方法还包括:所述监管方获取所述第一机构发送的第三交易请求;所述第三交易请求包括请求转入第三机构的第二加密资产凭证至所述第一账户中;所述第三机构在所述区块链上的账户为第五账户,对应的线下账户为第六账户;所述监管方若验证所述第三交易请求通过,则根据所述第三交易请求,生成第四交易请求;所述第四交易请求用于将所述第二加密资产凭证从所述第五账户转入所述第二账户;所述监管方向区块链上的节点发送所述第四交易请求,以通过私密交易验证方法验证所述第二加密资产凭证的交易的正确性;所述第二加密资产凭证为所述根据所述第一资产确定的;所述监管方若确定所述第二交易请求的验证通过,则根据所述第二加密资产凭证,确定转入至所述第一账户的第二资产;所述监管方通过记账节点将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第五账户。
上述技术方案,第一机构可以通过监管方处理线下的第二机构向线下的第一机构发起的第二交易请求,监管方利用第一机构与第二机构各自在区块链上的账户,发起私密交易,完成交易,在交易过程中,保证了个账户的私密性,提高了交易的安全性,并且实现了线 下无法实现的交易,扩展了区块链的私密交易的应用。
一种可能的实现方式,所述方法还包括:所述监管方获取所述第一机构的针对所述第二账户的撤销请求;所述撤销请求包括请求撤销的第一加密资产凭证;所述监管方向区块链上的节点发送针对所述撤销请求的验证,以验证所述第二账户的账户证书、及通过私密交易验证方法验证所述请求撤销的第一加密资产凭证与所述第二账户的加密资产凭证是否满足撤销条件;所述监管方若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;所述监管方将所述第二账户中的加密资产凭证对应的所述第一机构的线下的第一账户中对应的资产解冻。
上述技术方案,监管方通过对第一机构的第二账户的加密资产凭证进行验证,实现了对区块链上的账户的撤销账户中的加密资产凭证的方案,并关联第一机构的线下账户,进而实现对区块链上的第二账户的安全撤销,保证了区块链上的账户的安全性。
一种可能的实现方式,所述方法还包括:所述监管方获取所述第一机构的针对所述第二账户的资产凭证转移请求;所述资产凭证转移请求包括请求撤销所述第二账户,及将所述第二账户中的加密资产凭证转入至所述第一机构的新入账户;所述监管方向区块链上的节点发送针对所述资产凭证转移请求的验证,以验证所述第二账户的账户证书及所述第一机构的新入账户的账户证书、及通过私密交易验证方法验证所述请求撤销的第一加密资产凭证与所述第二账户的加密资产凭证是否满足转移条件;所述监管方若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;所述第二账户中的加密资产凭证转入至所述第一机构的新入账户。
上述技术方案,监管方通过对第一机构的第二账户的加密资产凭证及第一机构的新入账户进行验证,实现了对区块链上的账户的撤销账户中的加密资产凭证的方案,并关联第一机构的线下账户,进而实现对区块链上的第二账户的安全撤销,保证了区块链上的账户的安全性。
一种可能的实现方式,所述方法还包括:所述监管方将所述第一机构的所述第二账户中的加密资产凭证转出至所述监管方的监管账户,并将所述第二账户的账户证书锁定;所述监管方根据转出至所述监管账户的所述第一机构的资产凭证,验证所述第二账户的加密资产凭证是否出现异常;若确定没有异常,则解锁所述第二账户的账户证书,并将存入所述监管账户中所述第一机构的资产凭证生成加密资产凭证转入所述第二账户;若确定存在异常,则根据区块链上各机构的私钥及区块链上存储的交易数据,查找异常交易。
上述技术方案,监管方将第一机构在区块链上的第二账户中的加密资产凭证转出至监管账户,以验证所述第一机构在区块链上的第二账户是否有异常,可以有效的对区块链上的账户进行监管,及时发现异常交易,并根据各账户的私钥,对区块链上的交易进行追溯,进而查明异常原因,有效的提高了监管的力度,以保证区块链上交易的正常有序的进行。
第二方面,本发明提供一种区块链的私密交易装置,该装置,包括:
收发单元,用于获取第一机构发送的准入请求;所述准入请求包括所述准入请求需加入至区块链的资产凭证;
处理单元,用于验证所述准入请求;若确定验证通过,则根据区块链为所述第一机构生成的第二账户,为所述第二账户生成账户证书;将所述资产凭证根据所述第一机构的公钥加密为加密资产凭证;所述加密资产凭证用于所述第二账户与区块链上的其他账户进行交易,且通过私密交易验证方法验证交易的正确性;所述监管方根据所述第二账户的账户 证书及所述加密资产凭证,生成准入交易请求,所述准入交易请求用于将所述加密资产凭证加入至所述第二账户中;若确定所述区块链上的节点对所述准入交易请求的验证通过,则将所述第二账户、所述第二账户的账户证书、及所述第二账户的加密资产凭证写入区块链;
所述收发单元用于向区块链上的节点发起所述准入交易请求,以使所述区块链上的节点验证所述准入交易请求。
一种可能的实现方式,所述准入请求还包括所述第一机构的身份信息、所述第一机构对应的线下的第一账户的账户信息;所述处理单元,具体用于:
验证所述第一机构的身份信息是否与所述第一机构的线下的第一账户的身份信息一致;验证所述第一机构的所述第一账户的资产是否满足兑换所述准入请求需加入至区块链的资产凭证的条件;将所述第一机构的资产凭证记录于所述监管方的监管账户中,以根据所述第二账户在区块链上交易的加密资产凭证更新所述第一机构的线下账户的资产;将所述第一账户中与所述资产凭证对应的资产冻结。
一种可能的实现方式,所述收发单元,还用于获取所述第一机构发送的第一交易请求;所述第一交易请求包括请求转出所述第一账户中的第一资产至第二机构;所述第二机构在所述区块链上的账户为第三账户,所述第二机构对应的线下账户为第四账户;向区块链上的节点发送第二交易请求,以通过私密交易验证方法验证所述第一加密资产凭证的交易的正确性;
所述处理单元,还用于若验证所述第一交易请求通过,则根据所述第一交易请求,生成第二交易请求;所述第二交易请求用于将第一加密资产凭证从所述第二账户转入至所述第三账户;所述第一加密资产凭证为所述根据所述第一资产确定的;若确定所述第二交易请求的验证通过,则将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第三账户。
一种可能的实现方式,所述收发单元,还用于获取所述第一机构发送的第三交易请求;所述第三交易请求包括请求转入第三机构的第二加密资产凭证至所述第一账户中;所述第三机构在所述区块链上的账户为第五账户,对应的线下账户为第六账户;向区块链上的节点发送第四交易请求,以通过私密交易验证方法验证所述第二加密资产凭证的交易的正确性;所述第二加密资产凭证为所述根据所述第一资产确定的;
所述处理单元,还用于:若验证所述第三交易请求通过,则根据所述第三交易请求,生成所述第四交易请求;所述第四交易请求用于将所述第二加密资产凭证从所述第五账户转入所述第二账户;若确定所述第二交易请求的验证通过,则根据所述第二加密资产凭证,确定转入至所述第一账户的第二资产;通过记账节点将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第五账户。
一种可能的实现方式,所述收发单元,还用于获取所述第一机构的针对所述第二账户的撤销请求;所述撤销请求包括请求撤销的第一加密资产凭证;向区块链上的节点发送针对所述撤销请求的验证,以验证所述第二账户的账户证书、及通过私密交易验证方法验证所述请求撤销的第一加密资产凭证与所述第二账户的加密资产凭证是否满足撤销条件;
所述处理单元,还用于:若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;将所述第二账户中的加密资产凭证对应的所述第一机构的线下的第一账户中对应的资产解冻。
一种可能的实现方式,所述收发单元,还用于获取所述第一机构的针对所述第二账户的资产凭证转移请求;所述资产凭证转移请求包括请求撤销所述第二账户,及将所述第二账户中的加密资产凭证转入至所述第一机构的新入账户;向区块链上的节点发送针对所述资产凭证转移请求的验证,以验证所述第二账户的账户证书及所述第一机构的新入账户的账户证书、及通过私密交易验证方法验证所述请求撤销的第一加密资产凭证与所述第二账户的加密资产凭证是否满足转移条件;
所述处理单元,还用于:若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;所述第二账户中的加密资产凭证转入至所述第一机构的新入账户。
一种可能的实现方式,所述处理单元,还用于:
将所述第一机构的所述第二账户中的加密资产凭证转出至所述监管方的监管账户,并将所述第二账户的账户证书锁定;根据转出至所述监管账户的所述第一机构的资产凭证,验证所述第二账户的加密资产凭证是否出现异常;若确定没有异常,则解锁所述第二账户的账户证书,并将存入所述监管账户中所述第一机构的资产凭证生成加密资产凭证转入所述第二账户;若确定存在异常,则根据区块链上各机构的私钥及区块链上存储的交易数据,查找异常交易。
第三方面,本发明提供一种服务器,该服务器,包括:
存储器,用于存储至少一个处理器所执行的指令;
处理器,用于执行存储器中存储的指令执行第一方面所述的方法。
第四方面,本发明提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机指令,当所述计算机指令在计算机上运行时,使得计算机执行第一方面所述的方法。
附图说明
图1为本发明实施例所提供的一种区块链网络系统的结构示意图;
图2为本发明实施例所提供的一种区块链的私密交易方法的流程图;
图3为本发明实施例所提供的一种验证的方法的流程图;
图4为本发明实施例所提供的一种区块链的私密交易装置的结构示意图;
图5为本发明实施例所提供的一种服务器的结构示意图。
具体实施方式
本发明实施例提供的方案中,所描述的实施例仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。
为了更好的理解上述技术方案,下面通过附图以及具体实施例对本发明技术方案做详细的说明,应当理解本发明实施例以及实施例中的具体特征是对本发明技术方案的详细的说明,而不是对本发明技术方案的限定,在不冲突的情况下,本发明实施例以及实施例中的技术特征可以相互组合。
下面对本发明涉及的缩略语和关键术语进行说明。
区块链:区块链是由一系列区块组成的一条链,每个块上除了记录本块的数据还会记录上一块的Hash值,通过这种方式组成一条链。区块链的核心有两个,一个是密码学技术,另一个是去中心化思想,基于这两个理念做到区块链上的历史信息无法被篡改。一个 区块由块头和块体组成,其中块头定义包括该区块高度h,上一个区块的hash指prevHash等重要字段,而块体主要存储交易数据。
联盟链:联盟链只针对特定某个群体的成员和有限的第三方,内部指定多个预选的节点为记账人,每个块的生成由所有的预选节点共同决定,其他接入节点可以参与交易,但不过问记账过程,其他第三方可以通过该区块链开放的接口API进行限定查询。为了获得更好的性能,联盟链对于共识或验证节点的配置和网络环境有一定要求。通过准入机制,可以使得交易性能更容易提高,避免一些由参与方的资质产生的安全性问题。
私密交易:机密交易是一种在区块链中账户之间进行转账等操作时,完全隐匿交易金额,例如,可以通过加密的方式,将交易金额通过同态加密的方式转换为密文;进而,区块链节点可以根据同态加密的方式对交易数据的正确性进行验证。如一笔从账户A转出金额a的交易,可以拆分为从账户A转出金额b和从张A转出金额c;节点在验证时,并不清楚该笔转出交易转出的a、b、c的具体金额,但是可以在节点上验证a=b+c,且b>0,c>0,以实现私密交易的验证。
现有区块链的私密交易,如门罗币,Zcash等,采用了不同的技术实现。在这些方案中,每一笔交易的金额都和前一笔交易强绑定,挖矿费用是透明的,才能保证账本的一致性和正确性,导致每笔交易的私密性不高,交易的关联性很强。如Zcash使用的ZKSNARK,门罗币采用的bulletproofs,都仅考虑了交易之间的连续性,导致交易可通过追溯,获取账户的信息,另外,由于账户的初始资金可以查看,无法实现账户的私密性。
基于上述问题,本发明提供一种区块链网络系统架构,如图1所示,在该区块链网络系统中包括监管方101、第一机构102、第二机构104、区块链103,区块链103中可以包括多个节点,例如节点0,节点1,节点2,节点3。其中,监管方101用于管理区块链的机构、网络状态的监控以及区块链上交易的监管,第一机构102、第二机构104,用于与监管方101或区块链103的节点之间进行数据交互,监管方101用于对加入区块链的机构的身份信息进行验证,和区块链103的节点用于对加入区块链的机构的加密资产凭证进行验证,及机构在区块链上发起的私密交易,可以通过私密交易验证的方法进行验证。需要说明的是,私密交易的验证方法可以是零知识证明中的任一方法,例如,使用perdenser commitent和bulletproofs来实现私密交易,本发明并不对此进行限制。监管方101可包括多个服务器,也可包括一个服务器,在此不做限制。
以下结合说明书附图对本发明实施例所提供的一种区块链的私密交易方法做进一步详细的说明,该方法具体实现方式可以包括以下步骤(方法流程如图2所示):
步骤201,监管方获取第一机构发送的准入请求;所述准入请求包括所述准入请求需加入至区块链的资产凭证;
其中,资产凭证可以以押金的形式记录与监管方的监管账户中,以便监管方监管第一机构的线下的第一账户及区块链上的第二账户。
一种可能的实现方式,所述准入请求还包括所述第一机构的身份信息、所述第一机构对应的线下的第一账户的账户信息;所述身份信息包括所述第一机构的名称、所述第一机构的类型以及所述第一机构发明证书的统一资源定位符(Uniform Resource Locator,URL)地址。
在具体实施过程中,所述监管方验证所述准入请求,包括:
监管方验证所述第一机构的身份信息是否与所述第一机构的线下的第一账户的身份 信息一致;
具体的,基于接收的准入请求可获取第一机构的名称,第一机构的类型,第一机构发明证书的URL地址以及第一机构的标识(如机构代码)等身份信息,还可获取第一机构发送准入请求的服务器的IP地址以及信誉等级,其中,信誉等级包括优、良以及差。
监管方验证所述第一机构的所述第一账户的资产是否满足兑换所述准入请求需加入至区块链的资产凭证的条件。
具体的,监管方验证所述第一账户的资产根据预设比例转为区块链的资源凭证是否大于或等于所述准入请求中请求的资产凭证。
步骤202,监管方验证所述准入请求,若确定验证通过,则根据区块链为所述第一机构生成的第二账户,为所述第二账户生成账户证书;
在具体实施过程中,账户证书可以根据区块链的账户证书的要求,设定有效期、密码算法等,通过具有颁发账户证书的机构生成。在具体实施时,可以为监管方生成的,也可以为第三方具有颁发账户证书,在此不做限定。生成的账户证书还可以通过监管机构的私钥进行签名;为增强安全性,账户证书中还可以包括第一机构的签名。该签名可以为第一机构确认第二账户后,为其签名的,也可以在发送准入请求是生成的,在此不做限定。
步骤203,监管方将所述资产凭证根据所述第一机构的公钥加密为加密资产凭证;所述加密资产凭证用于所述第二账户与区块链上的其他账户进行交易,且通过私密交易验证方法验证交易的正确性。
进而,第一机构可以通过第一机构的私钥解密所述加密资产凭证,以使第一机构可以通过建立的第二账户,直接向区块链发起私密交易请求,如图3所示,具体包括:
步骤一、第一机构向区块链上的节点发送第一交易请求;
其中,第一交易请求包括请求转出所述第二账户中的第一加密资产凭证至第二机构;还可以包括第一机构转出后所述第二账户中的剩余加密资产凭证;所述第二机构在所述区块链上的账户为第三账户;
步骤二、区块链上的节点通过私密交易验证方法验证所述第一加密资产凭证的交易的正确性;
具体的,可以通过第一加密资产凭证,及当前第二账户中的加密资产凭证,确定从第二账户扣除后的第二账户的预计的剩余加密资产凭证是否与所述第一交易请求中的剩余加密资产凭证相等,且第一加密资产凭证、预计的剩余加密资产凭证及第一交易请求中的剩余加密资产凭证是否不为0,来进行验证该交易请求是否为正确的私密交易。
步骤三、区块链上的节点若验证所述第一交易请求通过,则将所述第一交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第三账户。
同理,所述方法还可以包括:
步骤一、第二机构向区块链发送第三交易请求;
其中,所述第三交易请求包括请求转入第三机构的第五账户中的第二加密资产凭证至第二账户中;所述第三机构在所述区块链上的账户为第五账户,对应的线下账户为第六账户;
步骤二、区块链上的节点通过私密交易验证方法验证所述第二加密资产凭证的交易的正确性;
步骤三、记账节点若确定所述第二交易请求的验证通过,将所述第二交易记录在所述 区块链上,并更新所述第二账户及所述第五账户。
上述技术方案,通过第一机构登录区块链对应的第二账户直接发起交易,且通过加密资产凭证进行交易,保证了区块链上的账户交易的私密性。
为保证账户安全,所述监管方通过第一机构的公钥将所述资产凭证加密为加密资产凭证后,还包括:
所述监管方将所述第一机构的资产凭证记录于所述监管方的监管账户中,以根据所述第二账户在区块链上交易的加密资产凭证更新所述第一机构的线下账户的资产;
所述监管方将所述第一账户中与所述资产凭证对应的资产冻结。
上述技术方案,通过监管方验证第一机构的身份信息及第一账户的账户信息,将第一账户与第二账户建立联系,并通过验证所述第一机构的所述第一账户的资产是否满足兑换所述准入请求需加入至区块链的资产凭证的条件,提高了对第一机构上链的第二账户的安全性,并且,有利于对第一机构在区块链上的第二账户进行监管。
步骤204,监管方根据所述第二账户的账户证书及所述加密资产凭证,生成准入交易请求,所述准入交易请求用于将所述加密资产凭证加入至所述第二账户中;
步骤205,监管方向区块链上的节点发起所述准入交易请求,以使所述区块链上的节点验证所述准入交易请求;
在具体实施过程中,监管方可以将所述准入交易请求发送给区块链中每个可信任的第三方,并接收所述每个可信任的第三方基于所述准入交易请求反馈的验证信息。
服务器将接收到的第一机构的准入交易请求发送给区块链中每个可信任的第三方,其中,区块链可包括多个可信任的第三方,所述可信任的第三方可以是证书授权中心(Certificate Authority,CA),多个可信任的第三方可对应一个服务器,也可每个可信任的第三方对应一个服务器。
区块链中的多个可信任的第三方可以根据接收到第一机构的准入交易请求,对准入交易请求中的第二账户的账户证书、第一机构及加密资产凭证进行验证。
具体的,可以包括:
步骤一、验证监管签名是否为监管机构签发;
步骤二、验证第一机构的账户证书是否是经过有效的证书签发机构签发,是否满足区块链的账户证书的要求,同时证书格式(有效期,密码算法)是否合法;
其中,有效的证书签发机构可以为监管方,也可以为预先确认的第三方,在此不做限定。
步骤二、验证第一机构的签名是否合法。
需要说明的是,对加密资产凭证的验证可以根据私密交易的验证方式进行验证。例如,验证第二账户初始额度a0、加密资产凭证、及第二账户加入所述加密资产凭证后的第二账户的额度a1,是否满足私密交易的验证,即三笔金额(初始额度a0、加密资产凭证、加入所述加密资产凭证后的第二账户的额度a1)是否大于0,通过初始额度a0、加密资产凭证确定的预计第二账户的额度a2是否与第二账户的额度a1相等。
步骤206,监管方若确定所述区块链上的节点对所述准入交易请求的验证通过,则将所述第二账户、所述第二账户的账户证书、及所述第二账户的加密资产凭证写入区块链。
具体的,当验证第一机构身份信息及账户证书、加密资产凭证合法之后,区块链中的机构需要通过共识机制来确定是否允许第一机构的第二账户及加密资产凭证加入区块链 中。所述共识机制,包括:基于投票算法,确定所述区块链的机构中同意所述第一机构加入的数量,若所述数量超过预设阈值,则允许所述第一机构加入所述区块链;或,若确定区块链中预设的机构同意所述第一机构加入,则允许所述第一机构加入所述区块链,其中,所述预设的机构至少包括一个所述区块链中的机构。
在具体实施过程中,可以将第二账户的账户证书、及所述第二账户的加密资产凭证写入区块链对应的智能合约中。
本发明实施例,可以通过监管方将第一机构需上链的资产凭证加密,使得写入区块链的第一机构的第二账户中的资产凭证为加密资产凭证,使得第一机构在区块链上的交易从入资至交易都是加密的,保证了第一机构在区块链上的交易的私密性。另外,通过监管方为第二账户生成账户证书,有效保证了区块链上的账户的有效性和安全性,增强了区块链在私密交易的安全性和私密性,扩大了区块链进行转账等私密交易的应用场景。
针对第二账户的撤销的场景,一种可能的实现方式,包括:
步骤一、监管方获取所述第一机构的针对所述第二账户的撤销请求;所述撤销请求包括请求撤销的第一加密资产凭证;
步骤二、监管方向区块链上的节点发送针对所述撤销请求的验证,以验证所述第二账户的账户证书、及通过私密交易验证方法验证所述请求撤销的第一加密资产凭证与所述第二账户的加密资产凭证是否满足撤销条件;
具体的,撤销条件可以根据私密交易验证的方法确定。
步骤三、监管方若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;
具体的,可以将账户证书加入节点的证书吊销列表中,并将第一机构对应的所有账户置为无效。也可以只针对第二账户设置无效,可以根据具体需要确定。
步骤四、监管方将所述第二账户中的加密资产凭证对应的所述第一机构的线下的第一账户中对应的资产解冻。
上述技术方案,监管方通过对第一机构的第二账户的加密资产凭证进行验证,实现了对区块链上的账户的撤销账户中的加密资产凭证的方案,并关联第一机构的线下账户,进而实现对区块链上的第二账户的安全撤销,保证了区块链上的账户的安全性。
针对第一机构在区块链上进行部分撤资的场景,一种可能的实现方式,所述方法还包括:
步骤一、监管方获取所述第一机构的针对所述第二账户的资产凭证转移请求;所述资产凭证转移请求包括请求撤销所述第二账户,及将所述第二账户中的加密资产凭证转入至所述第一机构的新入账户;
步骤二、监管方向区块链上的节点发送针对所述资产凭证转移请求的验证,以验证所述第二账户的账户证书及所述第一机构的新入账户的账户证书、及通过私密交易验证方法验证所述请求撤销的第一加密资产凭证与所述第二账户的加密资产凭证是否满足转移条件;
具体的,节点可以验证监管签名是否为监管机构签发,验证第一机构(资产凭证转移请求发送方)的数字签名,同时验证该请求中的账户证书和签名的公钥是否匹配。具体实施过程可以参考准入请求中的验证过程,在此不再赘述。需要说明的是,转移条件可以根据私密交易验证的方法确定,在此不做限定。
步骤三、监管方若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;所述第二账户中的加密资产凭证转入至所述第一机构的新入账户。
具体的,可以参考上述撤消请求和准入请求中的实施例,监管方发起向新入账户进行转账的准入交易请求,以使加密资产凭证转入新入账户,可以参考上述准入请求中的实施例,在此不再赘述。
上述技术方案,监管方通过对第一机构的第二账户的加密资产凭证及第一机构的新入账户进行验证,实现了对区块链上的账户的撤销账户中的加密资产凭证的方案,并关联第一机构的线下账户,进而实现对区块链上的第二账户的安全撤销,保证了区块链上的账户的安全性。
针对第一机构直接向区块链发起交易请求的场景,监管方可以根据以下方式对第一机构的第二账户进行监管,具体的可以包括:
步骤一、监管方将所述第一机构的所述第二账户中的加密资产凭证转出至所述监管方的监管账户,并将所述第二账户的账户证书锁定;
步骤二、监管方根据转出至所述监管账户的所述第一机构的资产凭证,验证所述第二账户的加密资产凭证是否出现异常;若存在异常,则执行步骤四,若否,则执行步骤三;
步骤三、解锁所述第二账户的账户证书,并将存入所述监管账户中所述第一机构的资产凭证生成加密资产凭证转入所述第二账户;
步骤四、根据区块链上各机构的私钥及区块链上存储的交易数据,查找异常交易。
需要说明的是,监管方执行监管的操作可以为预设时间进行,例如可以选择交易比较少的时间进行,避免影响区块链上的交易的正常进行。
上述技术方案,监管方将第一机构在区块链上的第二账户中的加密资产凭证转出至监管账户,以验证所述第一机构在区块链上的第二账户是否有异常,可以有效的对区块链上的账户进行监管,及时发现异常交易,并根据各账户的私钥,对区块链上的交易进行追溯,进而查明异常原因,有效的提高了监管的力度,以保证区块链上交易的正常有序的进行。
为进一步加强监管机构的监管职能,本发明实施例还提供一种区块链的私密交易方法,可以包括:
步骤一、监管方获取所述第一机构发送的第一交易请求;其中,第一交易请求包括请求转出所述第二账户中的第一加密资产凭证至第二机构;所述第二机构在所述区块链上的账户为第三账户;
步骤二、监管方若验证所述第一交易请求通过,则向区块链上的节点转发所述第一交易请求,以通过私密交易验证方法验证所述第一加密资产凭证的交易的正确性;
步骤三、节点若确定所述第二交易请求的验证通过,则通过记账节点将所述第一交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第三账户。
步骤四、监管方记录所述第一交易记录,并更新所述第一机构在所述监管账户中的资产凭证;
进一步的,监管方还可以根据所述第一加密资产凭证,及第一机构的私钥,确定第一账户在第一交易请求中变更所述第一账户中的资产,进而向第一账户的第一机构发起针对第一交易的结算,以更新所述第一账户。同理,还可以更新所述第二机构的第四账户。当然,也可以根据需要,在设定时间发起结算,在此不做限定。
通过上述方法,监管方可以监管每次的交易,可以更容易发现交易的异常行为,提高 监控效力。
为进一步提高第一机构发起交易的便捷性及监管的能效,第一机构可以通过监管机构,发起交易请求,无需登录区块链上的账户,在具体实施过程中,可以包括:
步骤一、监管方获取所述第一机构发送的第一交易请求;所述第一交易请求包括请求转出所述第一账户中的第一资产至第二机构;所述第二机构在所述区块链上的账户为第三账户,所述第二机构对应的线下账户为第四账户;
步骤二、监管方若验证所述第一交易请求通过,则根据所述第一交易请求,生成第二交易请求;所述第二交易请求用于将第一加密资产凭证从所述第二账户转入至所述第三账户;所述第一加密资产凭证为根据所述第一资产确定的;
步骤三、监管方向区块链上的节点发送所述第二交易请求,以通过私密交易验证方法验证所述第一加密资产凭证的交易的正确性;
步骤四、监管方若确定所述第二交易请求的验证通过,则通过记账节点将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第三账户。
通过上述方案,第一机构可以通过线下的第一账户向监管方发起对线下的第二机构的第一交易请求,监管方利用第一机构与第二机构各自在区块链上的账户,发起私密交易,完成交易,在交易过程中,保证了个账户的私密性,提高了交易的安全性,并且实现了线下无法实现的交易,扩展了区块链的私密交易的应用。
基于相同的原理,一种可能的实现方式,所述方法还包括:
步骤一、监管方获取所述第一机构发送的第三交易请求;所述第三交易请求包括请求转入第三机构的第二加密资产凭证至所述第一账户中;所述第三机构在所述区块链上的账户为第五账户,对应的线下账户为第六账户;
步骤二、监管方若验证所述第三交易请求通过,则根据所述第三交易请求,生成第四交易请求;所述第四交易请求用于将所述第二加密资产凭证从所述第五账户转入所述第二账户;
步骤三、监管方向区块链上的节点发送所述第四交易请求,以通过私密交易验证方法验证所述第二加密资产凭证的交易的正确性;所述第二加密资产凭证为所述根据所述第一资产确定的;
步骤四、监管方若确定所述第二交易请求的验证通过,则根据所述第二加密资产凭证,确定转入至所述第一账户的第二资产;
步骤五、监管方将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第五账户。
上述技术方案,第一机构可以通过监管方处理线下的第二机构向线下的第一机构发起的第二交易请求,监管方利用第一机构与第二机构各自在区块链上的账户,发起私密交易,完成交易,在交易过程中,保证了个账户的私密性,提高了交易的安全性,并且实现了线下无法实现的交易,扩展了区块链的私密交易的应用。
基于相同的发明构思,本发明提供一种区块链的私密交易装置,如图4所示,该装置,包括:
收发单元401,用于获取第一机构发送的准入请求;所述准入请求包括所述准入请求需加入至区块链的资产凭证;
处理单元402,用于验证所述准入请求;若确定验证通过,则根据区块链为所述第一 机构生成的第二账户,为所述第二账户生成账户证书;将所述资产凭证根据所述第一机构的公钥加密为加密资产凭证;所述加密资产凭证用于所述第二账户与区块链上的其他账户进行交易,且通过私密交易验证方法验证交易的正确性;所述监管方根据所述第二账户的账户证书及所述加密资产凭证,生成准入交易请求,所述准入交易请求用于将所述加密资产凭证加入至所述第二账户中;若确定所述区块链上的节点对所述准入交易请求的验证通过,则将所述第二账户、所述第二账户的账户证书、及所述第二账户的加密资产凭证写入区块链;
所述收发单元401,用于向区块链上的节点发起所述准入交易请求,以使所述区块链上的节点验证所述准入交易请求。
一种可能的实现方式,所述准入请求还包括所述第一机构的身份信息、所述第一机构对应的线下的第一账户的账户信息;所述处理单元402,具体用于:
验证所述第一机构的身份信息是否与所述第一机构的线下的第一账户的身份信息一致;验证所述第一机构的所述第一账户的资产是否满足兑换所述准入请求需加入至区块链的资产凭证的条件;将所述第一机构的资产凭证记录于所述监管方的监管账户中,以根据所述第二账户在区块链上交易的加密资产凭证更新所述第一机构的线下账户的资产;将所述第一账户中与所述资产凭证对应的资产冻结。
一种可能的实现方式,所述收发单元401,还用于获取所述第一机构发送的第一交易请求;所述第一交易请求包括请求转出所述第一账户中的第一资产至第二机构;所述第二机构在所述区块链上的账户为第三账户,所述第二机构对应的线下账户为第四账户;向区块链上的节点发送第二交易请求,以通过私密交易验证方法验证所述第一加密资产凭证的交易的正确性;
所述处理单元402,还用于若验证所述第一交易请求通过,则根据所述第一交易请求,生成第二交易请求;所述第二交易请求用于将第一加密资产凭证从所述第二账户转入至所述第三账户;所述第一加密资产凭证为所述根据所述第一资产确定的;若确定所述第二交易请求的验证通过,则将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第三账户。
一种可能的实现方式,所述收发单元401,还用于获取所述第一机构发送的第三交易请求;所述第三交易请求包括请求转入第三机构的第二加密资产凭证至所述第一账户中;所述第三机构在所述区块链上的账户为第五账户,对应的线下账户为第六账户;向区块链上的节点发送第四交易请求,以通过私密交易验证方法验证所述第二加密资产凭证的交易的正确性;所述第二加密资产凭证为所述根据所述第一资产确定的;
所述处理单元402,还用于:若验证所述第三交易请求通过,则根据所述第三交易请求,生成所述第四交易请求;所述第四交易请求用于将所述第二加密资产凭证从所述第五账户转入所述第二账户;若确定所述第二交易请求的验证通过,则根据所述第二加密资产凭证,确定转入至所述第一账户的第二资产;将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第五账户。
一种可能的实现方式,所述收发单元401,还用于获取所述第一机构的针对所述第二账户的撤销请求;所述撤销请求包括请求撤销的第一加密资产凭证;向区块链上的节点发送针对所述撤销请求的验证,以验证所述第二账户的账户证书、及通过私密交易验证方法验证所述请求撤销的第一加密资产凭证与所述第二账户的加密资产凭证是否满足撤销条 件;
所述处理单元402,还用于:若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;将所述第二账户中的加密资产凭证对应的所述第一机构的线下的第一账户中对应的资产解冻。
一种可能的实现方式,所述收发单元401,还用于获取所述第一机构的针对所述第二账户的资产凭证转移请求;所述资产凭证转移请求包括请求撤销所述第二账户,及将所述第二账户中的加密资产凭证转入至所述第一机构的新入账户;向区块链上的节点发送针对所述资产凭证转移请求的验证,以验证所述第二账户的账户证书及所述第一机构的新入账户的账户证书、及通过私密交易验证方法验证所述请求撤销的第一加密资产凭证与所述第二账户的加密资产凭证是否满足转移条件;
所述处理单元402,还用于:若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;所述第二账户中的加密资产凭证转入至所述第一机构的新入账户。
一种可能的实现方式,所述处理单元402,还用于:
将所述第一机构的所述第二账户中的加密资产凭证转出至所述监管方的监管账户,并将所述第二账户的账户证书锁定;根据转出至所述监管账户的所述第一机构的资产凭证,验证所述第二账户的加密资产凭证是否出现异常;若确定没有异常,则解锁所述第二账户的账户证书,并将存入所述监管账户中所述第一机构的资产凭证生成加密资产凭证转入所述第二账户;若确定存在异常,则根据区块链上各机构的私钥及区块链上存储的交易数据,查找异常交易。
本发明提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机指令,当所述计算机指令在计算机上运行时,使得计算机执行实施例一所述的方法。
本发明实施例提供了一种服务器,如图5所示,该服务器可以包括:处理器1001,例如CPU,网络接口1004,用户接口1003,存储器1005,通信总线1002。其中,通信总线1002用于实现这些组件之间的连接通信。用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储装置。
本领域技术人员可以理解,图5中示出的结构并不构成对计算机设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
作为一种计算机存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及区块链的私密交易的程序。其中,操作系统是监管方获取系统硬件和软件资源的程序,支持区块链的私密交易的程序以及其它软件或程序的运行。
用户接口1003主要用于连接、第二服务器和第三服务器等,与各个服务器进行数据通信;网络接口1004主要用于连接后台服务器,与后台服务器进行数据通信;而处理器1001可以用于调用存储器1005中存储的区块链的私密交易的程序,并执行以下操作:
验证所述准入请求;若确定验证通过,则根据区块链为所述第一机构生成的第二账户,为所述第二账户生成账户证书;将所述资产凭证根据所述第一机构的公钥加密为加密资产凭证;所述加密资产凭证用于所述第二账户与区块链上的其他账户进行交易,且通过私密 交易验证方法验证交易的正确性;所述监管方根据所述第二账户的账户证书及所述加密资产凭证,生成准入交易请求,所述准入交易请求用于将所述加密资产凭证加入至所述第二账户中;若确定所述区块链上的节点对所述准入交易请求的验证通过,则将所述第二账户、所述第二账户的账户证书、及所述第二账户的加密资产凭证写入区块链。
一种可能的实现方式,所述准入请求还包括所述第一机构的身份信息、所述第一机构对应的线下的第一账户的账户信息;处理器1001,具体用于:
验证所述第一机构的身份信息是否与所述第一机构的线下的第一账户的身份信息一致;验证所述第一机构的所述第一账户的资产是否满足兑换所述准入请求需加入至区块链的资产凭证的条件;将所述第一机构的资产凭证记录于所述监管方的监管账户中,以根据所述第二账户在区块链上交易的加密资产凭证更新所述第一机构的线下账户的资产;将所述第一账户中与所述资产凭证对应的资产冻结。
一种可能的实现方式,处理器1001,还用于若验证所述第一交易请求通过,则根据所述第一交易请求,生成第二交易请求;所述第二交易请求用于将第一加密资产凭证从所述第二账户转入至所述第三账户;所述第一加密资产凭证为所述根据所述第一资产确定的;若确定所述第二交易请求的验证通过,则将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第三账户。
一种可能的实现方式,处理器1001,还用于:若验证所述第三交易请求通过,则根据所述第三交易请求,生成所述第四交易请求;所述第四交易请求用于将所述第二加密资产凭证从所述第五账户转入所述第二账户;若确定所述第二交易请求的验证通过,则根据所述第二加密资产凭证,确定转入至所述第一账户的第二资产;将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第五账户。
一种可能的实现方式,处理器1001,还用于:若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;将所述第二账户中的加密资产凭证对应的所述第一机构的线下的第一账户中对应的资产解冻。
一种可能的实现方式,所述处理单元402,还用于:若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;所述第二账户中的加密资产凭证转入至所述第一机构的新入账户。
一种可能的实现方式,所述处理单元402,还用于:
将所述第一机构的所述第二账户中的加密资产凭证转出至所述监管方的监管账户,并将所述第二账户的账户证书锁定;根据转出至所述监管账户的所述第一机构的资产凭证,验证所述第二账户的加密资产凭证是否出现异常;若确定没有异常,则解锁所述第二账户的账户证书,并将存入所述监管账户中所述第一机构的资产凭证生成加密资产凭证转入所述第二账户;若确定存在异常,则根据区块链上各机构的私钥及区块链上存储的交易数据,查找异常交易。
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图 和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。

Claims (16)

  1. 一种区块链的私密交易方法,其特征在于,包括
    监管方获取第一机构发送的准入请求;所述准入请求包括所述准入请求需加入至区块链的资产凭证;
    所述监管方验证所述准入请求,若确定验证通过,则根据区块链为所述第一机构生成的第二账户,为所述第二账户生成账户证书;
    所述监管方将所述资产凭证根据所述第一机构的公钥加密为加密资产凭证;所述加密资产凭证用于所述第二账户与区块链上的其他账户进行交易,且通过私密交易验证方法验证交易的正确性;
    所述监管方根据所述第二账户的账户证书及所述加密资产凭证,生成准入交易请求,所述准入交易请求用于将所述加密资产凭证加入至所述第二账户中;
    所述监管方向区块链上的节点发起所述准入交易请求,以使所述区块链上的节点验证所述准入交易请求;
    所述监管方若确定所述区块链上的节点对所述准入交易请求的验证通过,则将所述第二账户、所述第二账户的账户证书、及所述第二账户的加密资产凭证写入区块链。
  2. 如权利要求1所述的方法,其特征在于,所述准入请求还包括所述第一机构的身份信息、所述第一机构对应的线下的第一账户的账户信息;所述监管方验证所述准入请求,包括:
    所述监管方验证所述第一机构的身份信息是否与所述第一机构的线下的第一账户的身份信息一致;
    所述监管方验证所述第一机构的所述第一账户的资产是否满足兑换所述准入请求需加入至区块链的资产凭证的条件;
    所述监管方将所述资产凭证加密为加密资产凭证后,还包括:
    所述监管方将所述第一机构的资产凭证记录于所述监管方的监管账户中,以根据所述第二账户在区块链上交易的加密资产凭证更新所述第一机构的线下账户的资产;
    所述监管方将所述第一账户中与所述资产凭证对应的资产冻结。
  3. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    所述监管方获取所述第一机构发送的第一交易请求;所述第一交易请求包括请求转出所述第一账户中的第一资产至第二机构;所述第二机构在所述区块链上的账户为第三账户,所述第二机构对应的线下账户为第四账户;
    所述监管方若验证所述第一交易请求通过,则根据所述第一交易请求,生成第二交易请求;所述第二交易请求用于将第一加密资产凭证从所述第二账户转入至所述第三账户;所述第一加密资产凭证为根据所述第一资产确定的;
    所述监管方向区块链上的节点发送所述第二交易请求,以通过私密交易验证方法验证所述第一加密资产凭证的交易的正确性;
    所述监管方若确定所述第二交易请求的验证通过,则通过记账节点将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第三账户。
  4. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    所述监管方获取所述第一机构发送的第三交易请求;所述第三交易请求包括请求转入 第三机构的第二加密资产凭证至所述第一账户中;所述第三机构在所述区块链上的账户为第五账户,对应的线下账户为第六账户;
    所述监管方若验证所述第三交易请求通过,则根据所述第三交易请求,生成第四交易请求;所述第四交易请求用于将所述第二加密资产凭证从所述第五账户转入所述第二账户;
    所述监管方向区块链上的节点发送所述第四交易请求,以通过私密交易验证方法验证所述第二加密资产凭证的交易的正确性;所述第二加密资产凭证为所述根据所述第一资产确定的;
    所述监管方若确定所述第二交易请求的验证通过,则根据所述第二加密资产凭证,确定转入至所述第一账户的第二资产;
    所述监管方通过记账节点将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第五账户。
  5. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    所述监管方获取所述第一机构的针对所述第二账户的撤销请求;所述撤销请求包括请求撤销的第一加密资产凭证;
    所述监管方向区块链上的节点发送针对所述撤销请求的验证,以验证所述第二账户的账户证书、及通过私密交易验证方法验证所述请求撤销的第一加密资产凭证与所述第二账户的加密资产凭证是否满足撤销条件;
    所述监管方若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;
    所述监管方将所述第二账户中的加密资产凭证对应的所述第一机构的线下的第一账户中对应的资产解冻。
  6. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    所述监管方获取所述第一机构的针对所述第二账户的资产凭证转移请求;所述资产凭证转移请求包括请求撤销所述第二账户,及将所述第二账户中的加密资产凭证转入至所述第一机构的新入账户;
    所述监管方向区块链上的节点发送针对所述资产凭证转移请求的验证,以验证所述第二账户的账户证书及所述第一机构的新入账户的账户证书、及通过私密交易验证方法验证所述请求撤销的第一加密资产凭证与所述第二账户的加密资产凭证是否满足转移条件;
    所述监管方若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;所述第二账户中的加密资产凭证转入至所述第一机构的新入账户。
  7. 如权利要求1-6任一项所述的方法,其特征在于,所述方法还包括:
    所述监管方将所述第一机构的所述第二账户中的加密资产凭证转出至所述监管方的监管账户,并将所述第二账户的账户证书锁定;
    所述监管方根据转出至所述监管账户的所述第一机构的资产凭证,验证所述第二账户的加密资产凭证是否出现异常;
    若确定没有异常,则解锁所述第二账户的账户证书,并将存入所述监管账户中所述第一机构的资产凭证生成加密资产凭证转入所述第二账户;
    若确定存在异常,则根据区块链上各机构的私钥及区块链上存储的交易数据,查找异常交易。
  8. 一种区块链的私密交易装置,其特征在于,包括:
    收发单元,用于获取第一机构发送的准入请求;所述准入请求包括所述准入请求需加入至区块链的资产凭证;
    处理单元,用于验证所述准入请求;若确定验证通过,则根据区块链为所述第一机构生成的第二账户,为所述第二账户生成账户证书;将所述资产凭证根据所述第一机构的公钥加密为加密资产凭证;所述加密资产凭证用于所述第二账户与区块链上的其他账户进行交易,且通过私密交易验证方法验证交易的正确性;所述监管方根据所述第二账户的账户证书及所述加密资产凭证,生成准入交易请求,所述准入交易请求用于将所述加密资产凭证加入至所述第二账户中;若确定所述区块链上的节点对所述准入交易请求的验证通过,则将所述第二账户、所述第二账户的账户证书、及所述第二账户的加密资产凭证写入区块链;
    所述收发单元用于向区块链上的节点发起所述准入交易请求,以使所述区块链上的节点验证所述准入交易请求。
  9. 如权利要求8所述的装置,其特征在于,所述准入请求还包括所述第一机构的身份信息、所述第一机构对应的线下的第一账户的账户信息;所述处理单元,具体用于:
    验证所述第一机构的身份信息是否与所述第一机构的线下的第一账户的身份信息一致;验证所述第一机构的所述第一账户的资产是否满足兑换所述准入请求需加入至区块链的资产凭证的条件;将所述第一机构的资产凭证记录于所述监管方的监管账户中,以根据所述第二账户在区块链上交易的加密资产凭证更新所述第一机构的线下账户的资产;将所述第一账户中与所述资产凭证对应的资产冻结。
  10. 如权利要求8所述的装置,其特征在于,
    所述收发单元,还用于获取所述第一机构发送的第一交易请求;所述第一交易请求包括请求转出所述第一账户中的第一资产至第二机构;所述第二机构在所述区块链上的账户为第三账户,所述第二机构对应的线下账户为第四账户;向区块链上的节点发送第二交易请求,以通过私密交易验证方法验证所述第一加密资产凭证的交易的正确性;
    所述处理单元,还用于若验证所述第一交易请求通过,则根据所述第一交易请求,生成第二交易请求;所述第二交易请求用于将第一加密资产凭证从所述第二账户转入至所述第三账户;所述第一加密资产凭证为所述根据所述第一资产确定的;若确定所述第二交易请求的验证通过,则通过记账节点将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第三账户。
  11. 如权利要求8所述的装置,其特征在于,
    所述收发单元,还用于获取所述第一机构发送的第三交易请求;所述第三交易请求包括请求转入第三机构的第二加密资产凭证至所述第一账户中;所述第三机构在所述区块链上的账户为第五账户,对应的线下账户为第六账户;向区块链上的节点发送第四交易请求,以通过私密交易验证方法验证所述第二加密资产凭证的交易的正确性;所述第二加密资产凭证为所述根据所述第一资产确定的;
    所述处理单元,还用于:若验证所述第三交易请求通过,则根据所述第三交易请求,生成所述第四交易请求;所述第四交易请求用于将所述第二加密资产凭证从所述第五账户转入所述第二账户;若确定所述第二交易请求的验证通过,则根据所述第二加密资产凭证,确定转入至所述第一账户的第二资产;通过记账节点将所述第二交易记录在所述区块链上,并通过区块链上的记账节点更新所述第二账户及所述第五账户。
  12. 如权利要求8所述的装置,其特征在于,
    所述收发单元,还用于获取所述第一机构的针对所述第二账户的撤销请求;所述撤销请求包括请求撤销的第一加密资产凭证;向区块链上的节点发送针对所述撤销请求的验证,以验证所述第二账户的账户证书、及通过私密交易验证方法验证所述请求撤销的第一加密资产凭证与所述第二账户的加密资产凭证是否满足撤销条件;
    所述处理单元,还用于:若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;将所述第二账户中的加密资产凭证对应的所述第一机构的线下的第一账户中对应的资产解冻。
  13. 如权利要求8所述的装置,其特征在于,
    所述收发单元,还用于获取所述第一机构的针对所述第二账户的资产凭证转移请求;所述资产凭证转移请求包括请求撤销所述第二账户,及将所述第二账户中的加密资产凭证转入至所述第一机构的新入账户;向区块链上的节点发送针对所述资产凭证转移请求的验证,以验证所述第二账户的账户证书及所述第一机构的新入账户的账户证书、及通过私密交易验证方法验证所述请求撤销的第一加密资产凭证与所述第二账户的加密资产凭证是否满足转移条件;
    所述处理单元,还用于:若确定验证通过,则撤销所述第二账户的账户证书,并将所述第二账户设置为无效;所述第二账户中的加密资产凭证转入至所述第一机构的新入账户。
  14. 如权利要求8-13任一项所述的装置,其特征在于,所述处理单元,还用于:
    将所述第一机构的所述第二账户中的加密资产凭证转出至所述监管方的监管账户,并将所述第二账户的账户证书锁定;根据转出至所述监管账户的所述第一机构的资产凭证,验证所述第二账户的加密资产凭证是否出现异常;若确定没有异常,则解锁所述第二账户的账户证书,并将存入所述监管账户中所述第一机构的资产凭证生成加密资产凭证转入所述第二账户;若确定存在异常,则根据区块链上各机构的私钥及区块链上存储的交易数据,查找异常交易。
  15. 一种服务器,其特征在于,包括:
    存储器,用于存储至少一个处理器所执行的指令;
    处理器,用于执行存储器中存储的指令执行权利要求1-7中任一项所述的方法。
  16. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机指令,当所述计算机指令在计算机上运行时,使得计算机执行权利要求1-7中任一项所述的方法。
PCT/CN2020/091933 2019-06-28 2020-05-22 一种区块链的私密交易方法及装置 WO2020259156A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910579322.9A CN110288480B (zh) 2019-06-28 2019-06-28 一种区块链的私密交易方法及装置
CN201910579322.9 2019-06-28

Publications (1)

Publication Number Publication Date
WO2020259156A1 true WO2020259156A1 (zh) 2020-12-30

Family

ID=68019800

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/091933 WO2020259156A1 (zh) 2019-06-28 2020-05-22 一种区块链的私密交易方法及装置

Country Status (2)

Country Link
CN (1) CN110288480B (zh)
WO (1) WO2020259156A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112765622A (zh) * 2021-01-13 2021-05-07 中国外运股份有限公司 一种电子提单的数字证书管理方法、装置、设备及介质
CN116825264A (zh) * 2023-08-30 2023-09-29 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) 基于互联网的妇产科信息处理方法及系统

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110288480B (zh) * 2019-06-28 2023-06-09 深圳前海微众银行股份有限公司 一种区块链的私密交易方法及装置
CN110751556A (zh) * 2019-09-28 2020-02-04 北京瑞卓喜投科技发展有限公司 资产发行监管方法、设备及系统
WO2021134473A1 (zh) * 2019-12-31 2021-07-08 深圳市网心科技有限公司 一种区块链信息监管方法、系统、装置及计算机存储介质
CN111311258B (zh) * 2020-01-20 2023-07-21 布比(北京)网络技术有限公司 基于区块链的可信交易方法、装置、系统、设备及介质
CN111275406B (zh) * 2020-02-13 2023-07-28 布比(北京)网络技术有限公司 区块链交易合约审计方法、装置、计算机设备和存储介质
CN111556160B (zh) * 2020-05-09 2023-03-24 支付宝(杭州)信息技术有限公司 一种数据资产准入的方法和装置
CN111915308A (zh) * 2020-07-04 2020-11-10 中信银行股份有限公司 一种区块链网络的交易处理方法及区块链网络
CN112651742B (zh) * 2020-12-14 2022-11-25 山东大学 一种可监管的分布式机密交易系统及方法
CN112990925B (zh) * 2021-04-21 2021-08-10 支付宝(杭州)信息技术有限公司 资产凭证的管理方法及装置
CN115187250B (zh) * 2022-09-09 2022-11-29 南方科技大学 一种以太坊隐私交易的探测方法、终端及存储介质
CN116915793B (zh) * 2023-09-12 2024-03-08 哈尔滨工程大学三亚南海创新发展基地 一种基于数字凭证的数据流转控制方法、系统及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106920080A (zh) * 2017-02-15 2017-07-04 捷德(中国)信息科技有限公司 数字货币的账户管理方法和系统
CN107483198A (zh) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 一种可监管的区块链系统及方法
CN108898483A (zh) * 2018-05-29 2018-11-27 阿里巴巴集团控股有限公司 区块链资产的发布、兑换方法及其装置、电子设备
CN109002729A (zh) * 2018-07-09 2018-12-14 福建省农村信用社联合社 一种基于金融区块链的客户隐私数据管理方法
US20190188711A1 (en) * 2017-12-19 2019-06-20 Tbcasoft, Inc. Cross-ledger transfers between distributed ledgers
CN110288480A (zh) * 2019-06-28 2019-09-27 深圳前海微众银行股份有限公司 一种区块链的私密交易方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106548330B (zh) * 2016-10-27 2018-03-16 上海亿账通区块链科技有限公司 基于区块链的交易验证方法及系统
CN106845960B (zh) * 2017-01-24 2018-03-20 上海壹账通区块链科技有限公司 基于区块链的安全交易方法及系统
CN107911216B (zh) * 2017-10-26 2020-07-14 矩阵元技术(深圳)有限公司 一种区块链交易隐私保护方法及系统
CN110383311A (zh) * 2018-11-07 2019-10-25 阿里巴巴集团控股有限公司 监管区块链机密交易
CN109840771A (zh) * 2019-04-01 2019-06-04 西安电子科技大学 一种基于同态加密的区块链隐私保护系统及其方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106920080A (zh) * 2017-02-15 2017-07-04 捷德(中国)信息科技有限公司 数字货币的账户管理方法和系统
CN107483198A (zh) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 一种可监管的区块链系统及方法
US20190188711A1 (en) * 2017-12-19 2019-06-20 Tbcasoft, Inc. Cross-ledger transfers between distributed ledgers
CN108898483A (zh) * 2018-05-29 2018-11-27 阿里巴巴集团控股有限公司 区块链资产的发布、兑换方法及其装置、电子设备
CN109002729A (zh) * 2018-07-09 2018-12-14 福建省农村信用社联合社 一种基于金融区块链的客户隐私数据管理方法
CN110288480A (zh) * 2019-06-28 2019-09-27 深圳前海微众银行股份有限公司 一种区块链的私密交易方法及装置

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112765622A (zh) * 2021-01-13 2021-05-07 中国外运股份有限公司 一种电子提单的数字证书管理方法、装置、设备及介质
CN112765622B (zh) * 2021-01-13 2024-04-16 中国外运股份有限公司 一种电子提单的数字证书管理方法、装置、设备及介质
CN116825264A (zh) * 2023-08-30 2023-09-29 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) 基于互联网的妇产科信息处理方法及系统
CN116825264B (zh) * 2023-08-30 2023-11-21 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) 基于互联网的妇产科信息处理方法及系统

Also Published As

Publication number Publication date
CN110288480B (zh) 2023-06-09
CN110288480A (zh) 2019-09-27

Similar Documents

Publication Publication Date Title
WO2020259156A1 (zh) 一种区块链的私密交易方法及装置
US11038670B2 (en) System and method for blockchain-based cross-entity authentication
US10917246B2 (en) System and method for blockchain-based cross-entity authentication
WO2021184963A1 (zh) 调用合约的方法及装置
CN108418680B (zh) 一种基于安全多方计算技术的区块链密钥恢复方法、介质
US20200145209A1 (en) System and method for decentralized-identifier creation
US11422981B2 (en) Information management and access control in a database
US11159307B2 (en) Ad-hoc trusted groups on a blockchain
WO2019174430A1 (zh) 区块链数据处理方法、管理端、用户端、转换装置及介质
JP7208930B2 (ja) 制御された暗号化秘密鍵の開放
WO2021209052A1 (zh) 基于区块链的数据处理
US11164165B1 (en) Multi-asset blockchain network platform
CN110769035B (zh) 一种区块链资产发行方法、平台、业务节点及存储介质
CN117640099A (zh) 用于避免或减少区块链网络上的加密滞留资源的系统和方法
CN110537355A (zh) 基于安全区块链的共识
US20210226800A1 (en) Preserving privacy of linked cross-network transactions
CN110494875A (zh) 用于动态节点群组的私钥的安全再使用
CN110572262A (zh) 区块链联盟链构建方法、装置及系统
CN111461712B (zh) 区块链供应链金融场景下的交易隐私保护和分层监管
WO2021228239A1 (zh) 资产类型一致性证据生成、交易、交易验证方法及系统
WO2022193984A1 (zh) 跨链进行数据传输的方法、装置、计算机设备、存储介质和计算机程序产品
CN113850599B (zh) 一种应用于联盟链的跨链交易方法及系统
KR20220027809A (ko) 가상 분산 원장 네트워크를 위한 시스템 및 방법
US11924348B2 (en) Honest behavior enforcement via blockchain
CN109167771B (zh) 基于联盟链的鉴权方法、装置、设备及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20832814

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19.04.2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20832814

Country of ref document: EP

Kind code of ref document: A1