Virtual currency transaction validation method based on block chain multi-factor cross-validation

A cross-validation and virtual currency technology, which is applied in the field of information security, can solve the problems of receiver B's loss and invalid records not being confirmed, and achieve the effect of avoiding loss

Inactive Publication Date: 2016-09-07
SICHUAN UNIV
View PDF2 Cites 109 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] In order to achieve double spending, such as figure 1 As shown, payer A needs to master the computing power exceeding 51% of the entire network (hence the name 51% attack). ->B's transaction record will be considered as an invalid record and will not be confirmed because it has the same source of funds as the record A->C in the new main chain, so that the receiver B will suffer losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual currency transaction validation method based on block chain multi-factor cross-validation
  • Virtual currency transaction validation method based on block chain multi-factor cross-validation
  • Virtual currency transaction validation method based on block chain multi-factor cross-validation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The specific method of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0028] figure 2 It is the workflow of the present invention.

[0029] figure 2 It is the working process of the present invention. First, the miner node periodically scans the block chain to find the newly generated branch blocks since the last scanning cycle; then reads the transaction information in the branch blocks, including the transaction source account number, transaction target account number, transaction amount, transaction time, transaction confirmation; insert the transaction information in the branch block into the hash list array; Factor cross-validation, including transaction legitimacy verification based on the main block chain and transaction legitimacy verification based on branch blocks; if the transaction record fails to pass the transaction legitimacy verification of the main block chain, the transaction record will be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a virtual currency transaction validation method based on block chain multi-factor cross-validation to solve the double-spending problem that virtual currency based on block chains are liable to 51% attacks and thus generates transactions. The method queries and backups a history block chain branch periodically, organizes confirmed transaction information into a hash chain list array which is easy for querying, and avoids branch transaction information losses induced by block chain evolution. During a virtual currency transaction, the method not only checks payer information, recipient information, a fund source, a currency transaction amount and the like recorded in a current main block chain, but also queries a backup branch block chain to check whether the current transaction and a history transaction on the branch block chain have the same fund source. If any transaction does not pass the check, a miner gives an alarm over the whole network about the transaction, so that the method can avoid the double-spending problem induced by illegal transactions.

Description

technical field [0001] The invention relates to a virtual currency transaction security verification method, which belongs to the field of information security. Background technique [0002] Since Bitcoin became the world's first widely used cryptocurrency in 2009, various types of virtual currencies have appeared in the network environment, such as Litecoin, Infinitecoin, Pennies, Ripple, etc. Due to its advantages of decentralization, strong privacy protection, and convenient transactions, virtual currency has quickly attracted worldwide attention and popularity. In 2014, California, the United States legislated to stipulate digital currency including Bitcoin as the legal currency of the state. In the same year, The IRS announced the legalization of encrypted digital assets. In February 2015, the European Central Bank released a research report on "Virtual Currency System", affirming the legal use of virtual currency. In 2014, the People's Bank of China (PBOC) specially ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40
CPCG06Q20/401
Inventor 陈文李涛董雪
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products