WO2022078396A1 - Procédé de traitement d'attribut de compte basé sur une blockchain, dispositif et support d'enregistrement - Google Patents

Procédé de traitement d'attribut de compte basé sur une blockchain, dispositif et support d'enregistrement Download PDF

Info

Publication number
WO2022078396A1
WO2022078396A1 PCT/CN2021/123560 CN2021123560W WO2022078396A1 WO 2022078396 A1 WO2022078396 A1 WO 2022078396A1 CN 2021123560 W CN2021123560 W CN 2021123560W WO 2022078396 A1 WO2022078396 A1 WO 2022078396A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
transaction request
attribute
transaction
account
Prior art date
Application number
PCT/CN2021/123560
Other languages
English (en)
Chinese (zh)
Inventor
李宁
薄辰龙
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2022078396A1 publication Critical patent/WO2022078396A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Definitions

  • the present application relates to the technical field of blockchain, and relates to a method, device and storage medium for processing account attributes based on blockchain.
  • a private key corresponds to an account.
  • the transfer amount and the destination account address are signed with the private key, and the signature and the public key corresponding to the private key are carried in the transfer request.
  • the blockchain node decrypts the signature in the transfer request through the public key carried in the transfer request to obtain the transfer amount and the destination account address.
  • the public key is calculated by an asymmetric encryption algorithm to obtain the user's account address, and then the transfer amount is transferred from the user's account address, and the transfer amount is transferred to the destination account address.
  • the transfer request signed by the private key is decrypted by the public key, and then the amount in the account can be transferred out.
  • the inventor realizes that if the user's private key is stolen, the user's balance can easily be transferred away, causing huge losses to the user and low account security.
  • the present application proposes a blockchain-based account attribute processing method, device and storage medium.
  • the present application sets security attributes and corresponding security rules in a blockchain account to improve account security.
  • Single limit and single day limit can reduce the risk of account balance being transferred in full.
  • the embodiment of the first aspect of the present application proposes a blockchain-based account attribute processing method, which is applied to a blockchain node, including:
  • the security attribute includes one or more of a single limit attribute, a single daily limit attribute, and a notification threshold attribute;
  • a second aspect of the present application provides a computer device including a memory, a processor, and computer-readable instructions stored on the memory and executable on the processor, the processor executing the computer-readable instructions When implementing the following steps:
  • the security attribute includes one or more of a single limit attribute, a single daily limit attribute, and a notification threshold attribute;
  • a third aspect of the present application provides a computer-readable storage medium, where computer instructions are stored in the computer-readable storage medium, and when the computer instructions are executed on a computer, the computer is caused to perform the following steps:
  • the security attribute includes one or more of a single limit attribute, a single daily limit attribute, and a notification threshold attribute;
  • a fourth aspect of this application proposes a blockchain node device, which includes:
  • the receiving module is used to receive the transaction request of the user account sent by the terminal;
  • a judgment module configured to judge whether the transaction request complies with the security rules corresponding to the security attributes of the user account, and the security attributes include one or more of a single limit attribute, a single daily limit attribute, and a notification threshold attribute;
  • the notification sending module is configured to send a security prompt notification to the terminal according to the security rule and the transaction request if it is determined that the transaction request does not conform to the security rule corresponding to the security attribute, and the security prompt notification uses to prompt the user that the transaction request does not conform to the security rule.
  • security attributes and corresponding security rules are set in the blockchain account.
  • the security rule is executed.
  • the security action corresponding to the rule is improved through the security attributes and the corresponding security rules.
  • the single limit and single day limit can reduce the risk of the account balance being transferred in full.
  • the user identity confirmation of the destination account can enable the user to confirm the identity of the other party before the user transfers, so as to avoid losses caused by the wrong object.
  • the notification threshold attribute can notify the user when a higher amount of transfer is made, improving the security of the account. Freezing and standby accounts can freeze accounts when the private key is stolen to avoid loss of account balances, and can transfer all the balances in the stolen accounts to the standby accounts to improve the security of user property.
  • FIG. 1 shows a schematic flowchart of a blockchain-based account attribute processing method provided by an embodiment of the present application
  • FIG. 2 shows a schematic structural diagram of a blockchain node device provided by an embodiment of the present application
  • FIG. 3 shows a schematic structural diagram of a computer device provided by an embodiment of the present application
  • FIG. 4 shows a schematic diagram of a storage medium provided by an embodiment of the present application.
  • Some embodiments of the present application provide a blockchain-based account attribute processing method.
  • the method sets a single transaction limit, single-day limit, notification threshold and other security attributes in a blockchain account. To ensure the security of the user's account, if the private key of the account is stolen, the single limit and single-day limit can reduce the risk of the account balance being transferred in full.
  • the notification threshold attribute can notify the actual owner of the account when transferring a higher amount, improving the security of the account.
  • the method also provides the user with the service of confirming the identity of the other party before the user transfers money, so as to avoid losses caused by transferring the wrong object.
  • the method can also set up a backup account corresponding to the account. When the private key is stolen, the user can freeze the account to avoid loss of account balance, and can transfer all the balance in the stolen account to the backup account to improve the security of the user's property. .
  • the user When the user needs to transfer money from the user account to other accounts, the user enters the transfer amount and the destination account address in the transfer interface displayed on the terminal. After the terminal detects that the user has entered the address of the destination account, it performs the identity confirmation of the owner of the destination account through the operations of the following steps S1-S3, including:
  • Step S1 Receive an identity confirmation request sent by the terminal, where the identity confirmation request includes a destination account address.
  • the terminal When the terminal detects that the user has entered the destination account address in the transfer interface, the terminal sends an identity confirmation request to the blockchain node, and the identity confirmation request includes the destination account address entered by the user.
  • the blockchain node receives the identity confirmation request.
  • Step S2 Obtain the user identity information corresponding to the destination account address.
  • the blockchain node After receiving the identity confirmation request sent by the terminal, the blockchain node obtains the user identity information of the owner of the destination account from the account information of the destination account corresponding to the destination account address according to the destination account address included in the identity confirmation request,
  • the user identity information may be the name or nickname of the owner of the purpose account.
  • Step S3 Send the user identity information to the terminal.
  • the blockchain node sends the obtained user identity information to the terminal. After acquiring the user identity information, the terminal displays the user identity information to the user. The user further confirms whether the owner of the currently input destination account address is the person who wants to transfer money through the user identity information displayed on the terminal. If not, the user can re-enter the destination account address corresponding to the person who wants to transfer money. After the user confirms that the currently entered destination account address is the destination account address corresponding to the person he wants to transfer, the user can trigger the transfer operation by clicking the Confirm Transfer button in the transfer interface.
  • the identity of the owner corresponding to the destination account address is confirmed, which can avoid the situation of the wrong person being transferred due to the wrong input of the destination account address, and avoid the property loss caused by the wrong person for the user.
  • the terminal When the terminal detects that the confirm transfer button in the transfer interface is clicked by the user, the terminal obtains the transfer amount and destination account address entered by the user from the transfer interface, as well as the private key submitted by the user, and the pre-stored public key locally. The transfer amount and destination account address are signed by the user's private key, and the ciphertext of the transfer information is obtained. Then, a transaction request is generated according to the pre-stored public key and the generated ciphertext of the transfer information. The terminal sends the transaction request to the blockchain node. Then, as shown in Figure 1, based on the security attributes of the account, the blockchain node performs secure transaction processing on the transaction request of the account through the operations of the following steps S101-S103, including:
  • Step S101 Receive a transaction request of a user account sent by a terminal.
  • the blockchain node receives the transaction request of the user account sent by the terminal, and obtains the public key and the ciphertext of the transfer information from the transaction request.
  • the ciphertext of the transfer information is decrypted by the public key to obtain the transfer information, and the transfer information includes the transfer amount and the destination account address.
  • the public key is generated according to the user account address through a preset asymmetric encryption algorithm
  • the blockchain node can also perform a reverse operation on the public key through the preset asymmetric encryption algorithm to obtain the user account address.
  • the preset asymmetric encryption algorithm can be RSA (RSA algorithm), DSA (Digital Signature Algorithm, digital signature algorithm), ECC (Elliptic curve cryptography, elliptic encryption algorithm), etc.
  • the transaction request is processed securely through the operations of the following steps S102 and S103.
  • Step S102 Determine whether the transaction request conforms to the security rule corresponding to the security attribute of the user account.
  • the security attributes include one or more of a single transaction quota attribute, a single daily quota attribute, and a notification threshold attribute.
  • Step S103 If it is determined that the transaction request does not conform to the security rule corresponding to the security attribute, send a security prompt notification to the terminal according to the security rule and the transaction request, and the security prompt notification is used to prompt the user that the transaction request does not conform to the security rule.
  • the security attributes set in the blockchain account may include a single limit attribute
  • the security rule corresponding to the single limit attribute may be that the transfer operation is performed only when the transfer amount is less than or equal to the specified single limit.
  • the corresponding security operations are performed based on the single limit attribute through the operations of the following steps A1 and A2, including:
  • Step A1 Determine whether the transfer amount included in the transaction request is greater than the single limit specified by the security rule corresponding to the single limit attribute; if so, determine that the transaction request does not conform to the security rule corresponding to the single limit attribute.
  • the blockchain node compares the transfer amount included in the transaction request with the single limit specified by the security rule corresponding to the single limit attribute. If the transfer amount is greater than the single limit, it is determined that the transaction request does not conform to the security rule corresponding to the single limit attribute. , and then perform step A2. If the transfer amount is less than or equal to the single limit, it is determined that the transaction request complies with the security rules corresponding to the single limit attribute.
  • Step A2 According to the security rules and the transaction request, a first transaction failure notification is generated, and the first transaction failure notification is used to prompt that the transfer amount exceeds a single limit; the first transaction failure notification is sent to the terminal.
  • the blockchain node When the transaction request does not conform to the security rules corresponding to the single limit attribute, the blockchain node sends the first transaction failure notification to the terminal.
  • the first transaction failure notification includes the transfer amount and the single limit, which is used to prompt that the transfer amount is greater than the single transaction limit.
  • step A1 If it is determined in step A1 that the transfer amount is less than or equal to the single limit, normal transfer processing can be performed on the transaction request. Specifically, according to the transfer amount and the user account address, the transfer amount is subtracted from the current balance of the user account. And according to the transfer amount and the destination account address, add the transfer amount to the current balance of the destination account.
  • a successful transfer notification is generated according to the user account address, the transfer amount and the destination account address. Success message. Send a successful transfer notification to the terminal, so that the user can know the balance change of the user's account in real time.
  • a transfer record is also generated according to the transfer amount, destination account address, user account address, timestamp, etc.
  • the correspondence between user account addresses and transfer records is stored in each blockchain node.
  • the transfer records of the user accounts are stored in the blockchain nodes, which can ensure the authenticity of the transfer records of the user accounts and avoid account book fraud.
  • a single-day limit attribute is also set in the blockchain account, and the security rule corresponding to the single-day limit attribute may be that the total amount of transfers in a single day must be less than or equal to the specified single-day limit.
  • the following steps A3-A6 are used to perform corresponding security operations based on the single-day limit attribute, including:
  • Step A3 Obtain the total transfer amount of the day corresponding to the user account.
  • the blockchain node For each blockchain account, the blockchain node will record the total amount of transfers on the day corresponding to the account in the account information. According to the public key included in the transaction request, the blockchain node performs reverse operation through a preset asymmetric encryption algorithm to obtain the user account address corresponding to the user account. According to the user's account address, obtain the total transfer amount of the user's account on the day from the corresponding account information.
  • Step A4 Calculate the sum of the total transfer amount on the day and the transfer amount included in the transaction request.
  • Step A5 Determine whether the sum value is greater than the single-day limit specified by the security rule corresponding to the single-day limit attribute; if so, determine that the transaction request does not conform to the security rule corresponding to the single-day limit attribute.
  • the blockchain node compares the above calculated sum with the single-day limit specified by the security rule corresponding to the single-day limit attribute. If the sum is greater than the single-day limit, it is determined that the transaction request does not conform to the security rule corresponding to the single-day limit attribute. , and then perform step A6. If the sum value is less than or equal to the single-day limit, it is determined that the transaction request complies with the security rules corresponding to the single-day limit attribute.
  • Step A6 According to the security rules and the transaction request, a second transaction failure notification is generated, and the second transaction failure notification is used to prompt the transaction request that the total transfer amount on the day will exceed the single-day limit; send the second transaction failure notification to the terminal.
  • the blockchain node When the transaction request does not conform to the security rules corresponding to the single-day limit attribute, the blockchain node sends a second transaction failure notification to the terminal, and the second transaction failure notification includes the transfer amount and the single-day limit, which is used to remind that the transaction request will make the same day. The total amount of the transfer exceeds the daily limit.
  • step A5 If it is determined in step A5 that the calculated sum is less than or equal to the single-day limit, normal transfer processing can be performed on the transaction request.
  • the specific transfer process is the same as the transfer process described above, and will not be repeated here.
  • a notification of successful transfer is sent to the terminal through the relevant operations above, and the correspondence between the user account address and the transaction record corresponding to this transaction is stored in the blockchain node.
  • the above single limit attribute and single day limit attribute can be set in the blockchain node at the same time, and when it is determined through step A1 that the transfer amount included in the transaction request is less than or equal to the single limit, further Determine whether the transfer amount will exceed the single-day limit by the operation of steps A3-A5, and if so, discard the transaction request, and send a second transaction failure notification to the terminal through the operation of step A6. If not, transfer the transaction request.
  • a notification threshold attribute is also set in the blockchain account, and the security rule corresponding to the notification threshold attribute is when the transfer amount is less than the single limit and greater than the preset amount specified by the security rule corresponding to the notification threshold attribute Notify the user of the transfer amount. And specifically through the operations of the following steps A7-A9 to perform corresponding security operations based on the notification threshold attribute, including:
  • Step A7 Determine whether the transfer amount included in the transaction request is less than the single limit and greater than the preset amount specified by the security rule corresponding to the notification threshold attribute; if so, it is determined that the transaction request does not conform to the security rule corresponding to the notification threshold attribute.
  • step A1 if it is determined that the transfer amount is less than the single limit, the transfer amount is further compared with the preset amount specified in the security rule corresponding to the notification threshold attribute, and if the transfer amount is greater than the preset amount, it is determined that the transaction request does not meet the requirements The security rule corresponding to the threshold attribute is notified, and step A8 is subsequently performed. If the transfer amount is less than or equal to the preset amount, it is determined that the transaction request complies with the security rule corresponding to the notification threshold attribute.
  • Step A8 Obtain the user address corresponding to the user account according to the transaction request.
  • the reverse operation is performed through a preset asymmetric encryption algorithm to obtain the user account address corresponding to the user account.
  • the user address is obtained from the account information of the user account corresponding to the user account address, where the user address is the client URL of the actual owner of the user account.
  • Step A9 According to the security rules and the transaction request, a large-value transaction notification is generated, and the large-value transaction notification is used to prompt the owner of the user account that the transfer amount of the transaction request is greater than the preset amount; send the large-value transaction notification to the corresponding user address. user terminal.
  • the notification threshold attribute is set in the user account. If the transfer amount in the user's transaction request is greater than the preset amount specified by the notification threshold attribute, the actual owner of the user account will be notified that the transfer amount is greater than the preset amount, so that the user account is blocked. During theft, the actual owner of the user account can be prevented from being informed of the large-amount transfer in his user account in time, which can reduce the loss of the user account.
  • the transaction request is processed by transfer.
  • the user's account can be frozen through the operations of the following steps A10-A12, which specifically include:
  • Step A10 The receiving terminal sends an account freezing request of the user account.
  • the account freezing request is sent to the blockchain node through the terminal, and the account freezing request includes the user account address.
  • the blockchain node receives the account freezing request, and within the preset freezing time period starting from receiving the account freezing request, any transaction request for the received user account corresponding to the user account address, except for the operation of transferring money to the standby account , the blockchain nodes discard these transaction requests and do not respond.
  • Step A11 Within the preset freezing period, if a transaction request corresponding to the user account is received.
  • Step A12 Determine whether the destination account address included in the transaction request is an alternate account address of the user account; if so, perform transfer processing on the transaction request; if not, discard the transaction request.
  • a transaction request corresponding to the user account if a transaction request corresponding to the user account is received, first obtain the destination account address included in the transaction request, and then obtain the backup account corresponding to the user account from the account information of the user account address, compare whether the destination account address of the transaction request is consistent with the alternate account address, if so, perform transfer processing on the transaction request, if not, discard the transaction request.
  • the above-mentioned single limit attribute, single-day limit attribute, notification threshold attribute, etc. may not be set in the backup account, so that the user can transfer the account balance from the backup account to his own account with high security in time.
  • the user account may also be frozen repeatedly within the preset freezing period of the above-mentioned user account, and each time an account freezing request of the user account is received again, the freezing period of the user account is extended by the preset freezing period.
  • the user account When receiving the freezing request of the user account, the user account will be frozen for a preset freezing period. During the preset freezing period, any transaction request except the transfer to the standby account of the user account will be blocked. throw away. In this way, when the user learns that his user account has been stolen, he can avoid losses by freezing the account. Freeze the user account multiple times, and each time the user is requested to freeze, the user account freezing time will be extended by the preset freezing time period, so as to maximize the protection of the user account.
  • the security attributes and their corresponding security rules are set in the blockchain account.
  • When receiving a transaction request from the account first determine whether the transaction request conforms to the security rules corresponding to the security attributes, and if so, execute the security rules corresponding to the security rules. operate. In this way, the security of the user account is improved through the security attributes and the corresponding security rules.
  • the nickname confirmation attribute can enable the user to confirm the identity of the other party before the user transfers, so as to avoid losses caused by the wrong object.
  • the notification threshold can notify the user when a higher amount of transfer is made, improving the security of the account. Freezing and standby accounts can freeze accounts when the private key is stolen to avoid loss of account balances, and can transfer all the balances in the stolen accounts to the standby accounts to improve the security of user property.
  • security attributes and corresponding security rules are set in the blockchain account.
  • the security rule is executed.
  • the security action corresponding to the rule is improved through the security attributes and the corresponding security rules.
  • the single limit and single day limit can reduce the risk of the account balance being transferred in full.
  • the user identity confirmation of the destination account can enable the user to confirm the identity of the other party before the user transfers, so as to avoid losses caused by the wrong object.
  • the notification threshold attribute can notify the user when a higher amount of transfer is made, improving the security of the account. Freezing and standby accounts can freeze accounts when the private key is stolen to avoid loss of account balances, and can transfer all the balances in the stolen accounts to the standby accounts to improve the security of user property.
  • an embodiment of the present application provides a blockchain node device, which is used to execute the blockchain-based account attribute processing method provided by the above embodiment, and the blockchain node device includes:
  • the receiving module 201 is used for receiving the transaction request of the user account sent by the terminal;
  • the judgment module 202 is used for judging whether the transaction request conforms to the security rule corresponding to the security attribute of the user account, and the security attribute includes one or more of a single limit attribute, a single daily limit attribute, and a notification threshold attribute;
  • the notification sending module 203 is configured to send a security prompt notification to the terminal according to the security rule and the transaction request if it is determined that the transaction request does not conform to the security rule corresponding to the security attribute, and the security prompt notification is used to prompt the user that the transaction request does not conform to the security rule.
  • the security attribute includes a single limit attribute; the judgment module 202 is used to judge whether the transfer amount included in the transaction request is greater than the single limit specified by the security rule corresponding to the single limit attribute; if so, determine that the transaction request does not meet the single limit attribute the corresponding security rules;
  • the notification sending module 203 is configured to generate a first transaction failure notification according to the security rules and transaction requests, and the first transaction failure notification is used to prompt that the transfer amount is greater than the single limit; and send the first transaction failure notification to the terminal.
  • the security attributes include a single-day limit attribute; the judgment module 202 is used to obtain the total amount of transfers on the day corresponding to the user account; calculate the sum of the total amount of transfers on the current day and the transfer amount included in the transaction request; and determine whether the sum is greater than the safety value corresponding to the single-day limit attribute.
  • the single-day limit specified by the rules if so, it is determined that the transaction request does not comply with the security rules corresponding to the single-day limit attribute;
  • the notification sending module 203 is configured to generate a second transaction failure notification according to the security rules and the transaction request, and the second transaction failure notification is used to prompt that the transaction request will make the total transfer amount on the day exceed the single-day limit; send the second transaction failure notification to the terminal.
  • the security attribute includes a notification threshold attribute; the judgment module 202 is used to judge whether the transfer amount included in the transaction request is less than a single transaction limit and greater than the preset amount specified by the security rule corresponding to the notification threshold attribute; if so, determine that the transaction request does not meet the notification The security rule corresponding to the threshold attribute;
  • the notification sending module 203 is used to obtain the user address corresponding to the user account according to the transaction request; according to the security rules and the transaction request, generate a large-value transaction notification, and the large-value transaction notification is used to prompt the owner of the user account for the transaction request.
  • the transfer amount is greater than the preset amount; send a large transaction notification to the user terminal corresponding to the user address.
  • the blockchain node device further includes: an identity confirmation module for receiving an identity confirmation request sent by the terminal, where the identity confirmation request includes a destination account address; obtaining user identity information corresponding to the destination account address; and sending the user identity information to the terminal.
  • the blockchain node device further includes: a freezing module for receiving an account freezing request sent by the terminal to the user account; within a preset freezing period, if a transaction request corresponding to the user account is received; determining whether the destination account address included in the transaction request is not It is the alternate account address of the user account; if it is, the transaction request will be transferred; if not, the transaction request will be discarded.
  • a freezing module for receiving an account freezing request sent by the terminal to the user account; within a preset freezing period, if a transaction request corresponding to the user account is received; determining whether the destination account address included in the transaction request is not It is the alternate account address of the user account; if it is, the transaction request will be transferred; if not, the transaction request will be discarded.
  • the blockchain node device further includes: a freezing extension module for extending the freezing time of the user account by the preset freezing time every time an account freezing request of the user account is received again within the preset freezing period.
  • security attributes and corresponding security rules are set in the blockchain account.
  • the security rule is executed.
  • the security action corresponding to the rule is improved through the security attributes and the corresponding security rules.
  • the single limit and single day limit can reduce the risk of the account balance being transferred in full.
  • the user identity confirmation of the destination account can enable the user to confirm the identity of the other party before the user transfers, so as to avoid losses caused by the wrong object.
  • the notification threshold attribute can notify the user when a higher amount of transfer is made, improving the security of the account. Freezing and standby accounts can freeze accounts when the private key is stolen to avoid loss of account balances, and can transfer all the balances in the stolen accounts to the standby accounts to improve the security of user property.
  • An embodiment of the present application provides a computer device, and the computer device may be a blockchain node device.
  • the computer device includes a processor, a non-volatile storage medium, a memory, and a network interface connected through a system bus.
  • the non-volatile storage medium of the computer device stores an operating system, a database and computer-readable instructions
  • the database may store a sequence of control information.
  • the processor can realize a A blockchain-based account attribute processing method.
  • the processor of the computer device is used to provide computing and control capabilities and support the operation of the entire computer device.
  • Computer-readable instructions may be stored in the memory of the computer device, and when executed by the processor, the computer-readable instructions may cause the processor to execute a blockchain-based method for processing account attributes.
  • the network interface of the computer equipment is used for communication with the terminal connection.
  • the computer device includes a memory, a processor, and a computer program stored on the memory and running on the processor.
  • the processor executes the computer program, the processor implements the following steps: receiving a transaction request for a user account sent by a terminal; judging whether the transaction request is Comply with the security rules corresponding to the security attributes of the user account, the security attributes include one or more of a single limit attribute, a single day limit attribute, and a notification threshold attribute; if it is determined that the transaction request does not meet the security If the security rule corresponds to the attribute, a security prompt notification is sent to the terminal according to the security rule and the transaction request, where the security prompt notification is used to prompt the user that the transaction request does not conform to the security rule.
  • the processor may further implement the following steps: judging whether the transfer amount included in the transaction request is greater than the single limit specified by the security rule corresponding to the single limit attribute; if so, determining that the transaction request does not meet the The security rule corresponding to the single limit attribute; correspondingly, according to the security rule and the transaction request, a first transaction failure notification is generated, and the first transaction failure notification is used to prompt that the transfer amount is greater than the single transaction amount. pen limit; send the first transaction failure notification to the terminal.
  • the following steps may also be implemented: obtaining the total amount of transfers on the day corresponding to the user account; calculating the sum of the total amount of transfers on the day and the transfer amount included in the transaction request; judging whether the sum is greater than all The single-day limit specified by the security rule corresponding to the single-day limit attribute; if so, it is determined that the transaction request does not conform to the security rule corresponding to the single-day limit attribute; accordingly, according to the security rule and the transaction request , generating a second transaction failure notification, where the second transaction failure notification is used to prompt that the transaction request will make the total transfer amount on the day exceed the single-day limit; and send the second transaction failure notification to the terminal.
  • the processor may further implement the following steps: judging whether the transfer amount included in the transaction request is less than the single limit and greater than the preset amount specified by the security rule corresponding to the notification threshold attribute; if so, determining whether The transaction request does not conform to the security rule corresponding to the notification threshold attribute; accordingly, the user address corresponding to the user account is obtained according to the transaction request; a large-value transaction is generated according to the security rule and the transaction request The large-value transaction notification is used to prompt the owner of the user account that the transfer amount of the transaction request is greater than the preset amount; the large-value transaction notification is sent to the user terminal corresponding to the user address.
  • the following steps may also be implemented: receiving an identity confirmation request sent by the terminal, where the identity confirmation request includes a destination account address; acquiring user identity information corresponding to the destination account address; sending the user identity information to the described terminal.
  • the receiving terminal sends an account freezing request of the user account; within a preset freezing time period, if a transaction request corresponding to the user account is received; judging that the transaction request includes Whether the destination account address is the backup account address of the user account; if so, perform transfer processing on the transaction request; if not, discard the transaction request.
  • the processor executes the computer program, the following steps may be further implemented: every time an account freezing request of the user account is received again within the preset freezing period, the freezing period of the user account is extended by the preset freezing period.
  • An embodiment of the present application further provides a storage medium storing computer-readable instructions.
  • the one or more processors when the computer-readable instructions are executed by one or more processors, the one or more processors perform the following steps : Receive the transaction request of the user account sent by the terminal; determine whether the transaction request conforms to the security rule corresponding to the security attribute of the user account, and the security attribute includes a single limit attribute, a single day limit attribute, and a notification threshold attribute.
  • a security prompt notification is sent to the terminal, and the security prompt notification uses to prompt the user that the transaction request does not conform to the security rule.
  • the processor may also perform the following steps: judging whether the transfer amount included in the transaction request is greater than the single limit specified by the security rule corresponding to the single limit attribute; if so, determining that the transaction request does not meet the single limit
  • the security rule corresponding to the limit attribute correspondingly, according to the security rule and the transaction request, a first transaction failure notification is generated, and the first transaction failure notification is used to prompt that the transfer amount is greater than the single limit; send The first transaction failure is notified to the terminal.
  • the processor may also perform the following steps: obtaining the total amount of transfers on the day corresponding to the user account; calculating the sum of the total amount of transfers on the day and the transfer amount included in the transaction request; judging whether the sum is greater than the single-day limit The single-day limit specified by the security rule corresponding to the attribute; if so, it is determined that the transaction request does not conform to the security rule corresponding to the single-day limit attribute; accordingly, according to the security rule and the transaction request, a second A transaction failure notification, where the second transaction failure notification is used to prompt that the transaction request will make the total transfer amount on the day exceed the single-day limit; send the second transaction failure notification to the terminal.
  • the processor may also perform the following steps: judging whether the transfer amount included in the transaction request is less than the single limit and greater than the preset amount specified by the security rule corresponding to the notification threshold attribute; if so, determining the transaction request does not conform to the security rule corresponding to the notification threshold attribute; correspondingly, according to the transaction request, obtain the user address corresponding to the user account; according to the security rule and the transaction request, generate a large transaction notification, the The large-value transaction notification is used to prompt the owner of the user account that the transfer amount of the transaction request is greater than the preset amount; the large-value transaction notification is sent to the user terminal corresponding to the user address.
  • the processor may further perform the following steps: receiving an identity confirmation request sent by the terminal, where the identity confirmation request includes a destination account address; acquiring user identity information corresponding to the destination account address; and sending the user identity information to the terminal.
  • the processor may also perform the following steps: receiving an account freezing request of the user account sent by the receiving terminal; within a preset freezing period, if a transaction request corresponding to the user account is received; judging whether the destination account address included in the transaction request is not is the alternate account address of the user account; if yes, perform transfer processing on the transaction request; if not, discard the transaction request.
  • the processor may further perform the following step: every time an account freezing request of the user account is received again within the preset freezing period, the freezing period of the user account is extended by the preset freezing period.
  • the realization of all or part of the processes in the methods of the above embodiments can be accomplished by instructing relevant hardware through a computer program, and the computer program can be stored in a computer-readable storage medium, and the program is During execution, it may include the processes of the embodiments of the above-mentioned methods.
  • the aforementioned storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM), or a random access memory (Random Access Memory, RAM) or the like.

Abstract

L'invention concerne un procédé de traitement d'attribut de compte basé sur une blockchain, un dispositif et un support d'enregistrement. Le procédé consiste à : recevoir une demande de transaction d'un compte utilisateur envoyée par un terminal ; déterminer si la demande de transaction est conforme à une règle de sécurité correspondant à un attribut de sécurité du compte utilisateur ; et, s'il est déterminé que la demande de transaction n'est pas conforme à la règle de sécurité correspondant à l'attribut de sécurité, envoyer une notification d'alerte de sécurité au terminal selon la règle de sécurité et la demande de transaction. Dans la présente demande, un attribut de sécurité et une règle de sécurité correspondant à celui-ci sont définis dans un compte de blockchain, ce qui permet d'améliorer la sécurité du compte. Le risque de transfert total d'un solde de compte peut être réduit au moyen d'une limite unique et d'une limite quotidienne. Avant le transfert de compte, un utilisateur confirme l'identité de l'autre partie, et une perte due à un transfert vers un mauvais objet est évitée. Un utilisateur est notifié lorsqu'un montant relativement élevé est transféré, ce qui permet d'améliorer la sécurité d'un compte. Un compte est gelé lorsqu'une clé privée est volée, la perte d'un solde de compte est évitée, et le solde du compte volé est totalement transféré vers un compte de secours, ce qui permet d'améliorer la sécurité des biens d'un utilisateur.
PCT/CN2021/123560 2020-10-15 2021-10-13 Procédé de traitement d'attribut de compte basé sur une blockchain, dispositif et support d'enregistrement WO2022078396A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011105751.1 2020-10-15
CN202011105751.1A CN112069526A (zh) 2020-10-15 2020-10-15 基于区块链的账户属性处理方法、设备及存储介质

Publications (1)

Publication Number Publication Date
WO2022078396A1 true WO2022078396A1 (fr) 2022-04-21

Family

ID=73655161

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/123560 WO2022078396A1 (fr) 2020-10-15 2021-10-13 Procédé de traitement d'attribut de compte basé sur une blockchain, dispositif et support d'enregistrement

Country Status (2)

Country Link
CN (1) CN112069526A (fr)
WO (1) WO2022078396A1 (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112633895A (zh) * 2021-01-05 2021-04-09 交通银行股份有限公司 银行线上网点业务数字货币交易的风险控制方法及系统
CN113269642B (zh) * 2021-05-24 2023-03-28 深圳壹账通智能科技有限公司 基于区块链的交易处理方法、装置、设备及存储介质
CN113723944B (zh) * 2021-09-14 2024-03-26 中国银行股份有限公司 转账额度的设置方法、装置、电子设备及计算机存储介质
CN113570373B (zh) * 2021-09-23 2022-02-11 北京理工大学 一种基于区块链的可追责交易方法及系统
CN114020253A (zh) * 2021-10-28 2022-02-08 四川启睿克科技有限公司 检测eos区块链地址有效性的方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201143A (zh) * 2011-04-08 2011-09-28 张应刚 一种基于短信平台即时交互的银行卡交易系统及方法
CN108711105A (zh) * 2018-05-16 2018-10-26 四川吉鼎科技有限公司 一种基于区块链的安全交易验证方法及系统
CN110543781A (zh) * 2019-09-07 2019-12-06 刘付荣 基于区块链实现金融安全交易的方法
CN111626848A (zh) * 2020-06-04 2020-09-04 中国银行股份有限公司 一种数据处理方法及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201143A (zh) * 2011-04-08 2011-09-28 张应刚 一种基于短信平台即时交互的银行卡交易系统及方法
CN108711105A (zh) * 2018-05-16 2018-10-26 四川吉鼎科技有限公司 一种基于区块链的安全交易验证方法及系统
CN110543781A (zh) * 2019-09-07 2019-12-06 刘付荣 基于区块链实现金融安全交易的方法
CN111626848A (zh) * 2020-06-04 2020-09-04 中国银行股份有限公司 一种数据处理方法及系统

Also Published As

Publication number Publication date
CN112069526A (zh) 2020-12-11

Similar Documents

Publication Publication Date Title
WO2022078396A1 (fr) Procédé de traitement d'attribut de compte basé sur une blockchain, dispositif et support d'enregistrement
US11966916B2 (en) Resource transfer method and apparatus, storage medium, and computer device
JP6908700B2 (ja) 情報保護のためのシステム及び方法
EP3812992B1 (fr) Procédé et appareil de transaction de chaîne de blocs
EP3639469B1 (fr) Systèmes et procédés d'adressage de vulnérabilités liées à la sécurité provoquées par rapport à des canaux hors chaîne de bloc en cas de défaillances dans un réseau
JP6714156B2 (ja) 情報保護のためのシステム及び方法
CN110958110B (zh) 一种基于零知识证明的区块链隐私数据管理方法和系统
WO2022078398A1 (fr) Procédé et système de traitement de transaction de sous-compte à base de chaîne de blocs, dispositif et support
JP2020505799A (ja) リプレイ攻撃の検出のためのシステム及び方法
US11270029B2 (en) Data check methods, apparatuses, and devices
WO2021184878A1 (fr) Procédé de gestion de nœud pour système de chaîne de blocs, nœud et dispositif de calcul
EP3047449A1 (fr) Systèmes et procédés d'association de comptes
WO2020083112A1 (fr) Procédé, dispositif et système de transfert de valeur numérique
EP1815660A1 (fr) Mise a disposition de donnees personnelles dans un reseau de communication de donnees
US8423656B2 (en) Push gateway systems and methods
US20190251249A1 (en) Methods and Systems for Securing and Recovering a User Passphrase
CN110807209B (zh) 一种数据处理方法、设备及存储介质
WO2022206438A1 (fr) Procédé et appareil pour fournir un message inter-chaînes
CN111612591A (zh) 转网用户信用评级方法、装置、控制设备及存储介质
WO2019047345A1 (fr) Procédé de génération de politique d'envoi de mot de passe à usage unique, et procédé d'envoi de mot de passe à usage unique
US20190303935A1 (en) System and methods for preventing reverse transactions in a distributed environment
WO2022100381A1 (fr) Procédé de création de compte commun de financement participatif basé sur une chaîne de blocs, et dispositifs et support de stockage
CN110784318B (zh) 群密钥更新方法、装置、电子设备、存储介质及通信系统
WO2022095426A1 (fr) Procédé de création de compte commun basé sur une chaîne de blocs, système, dispositif et support d'enregistrement
CN115348082A (zh) 数据脱敏方法、装置、计算机设备和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21879439

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 18/07/2023)

122 Ep: pct application non-entry in european phase

Ref document number: 21879439

Country of ref document: EP

Kind code of ref document: A1