Secure transaction verification method and system based on blockchain

A technology of secure transactions and verification methods, applied in the payment system, payment system structure, protocol authorization, etc., can solve the problems of restricting the application of blockchain technology, high system operation overhead, and low efficiency, so as to ensure transaction processing speed and prevent The effect of balance leakage and security guarantee

Inactive Publication Date: 2018-10-26
四川吉鼎科技有限公司
View PDF2 Cites 62 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since there is no absolute authority node in this transaction method, it is necessary to collectively verify each transaction. The disadvantage is that the transactions of the transaction participants will have no privacy at all, and the account of an organization may be blocked by other nodes. Institutional tracking on the Internet, which poses a risk of information leakage
However, there are still deficiencies: for example, when the account balance of an account is protected by additive homomorphic encryption, only the owner of the homomorphic encryption key can know the actual balance of the account, making it difficult for regulators to supervise the liquidity of financial assets
If the asset owner is required to pass the homomorphic encryption key to the supervisor in some form, it will be prone to errors and / or security risks due to the complexity of the system processing steps, and the efficiency will be low
[0004] Although the industry currently adopts some blockchain transaction solutions to solve information leakage, the existing solutions either do not solve information leakage thoroughly, or have low computational efficiency and huge system operation overhead, which limits blockchain technology. Application in transaction scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure transaction verification method and system based on blockchain
  • Secure transaction verification method and system based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer and clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] The invention provides a blockchain-based transaction verification method.

[0036] refer to figure 1 , figure 1 It is a schematic flowchart of an embodiment of the blockchain-based transaction verification method of the present invention.

[0037] In one embodiment, the blockchain-based transaction verification method includes:

[0038] Step S1, the regulator writes the digital certificate into the smart contract of the block chain corresponding to the asset category to be supervised, so that all institutions with asset accounts under the ass...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure transaction verification method and a secure transaction verification system based on a blockchain. The secure transaction verification method comprises the steps that: when a transaction with a transaction type and a transaction amount is processed by a node on the blockchain, an original balance of each transaction party is decrypted through a first decryption parameter transmitted by the transaction party, calculation is performed on the each original balance to obtain a new balance, the new balance is encrypted through an encryption parameter transmitted bythe transaction party to obtain an encrypted new balance, and the each encrypted new balance is broadcast to each node on the blockchain; after the broadcast encrypted new balance of the each transaction party is received by the node on the blockchain, an intelligent contract is activated to perform composite number verification; if the each composite number verification is passed, update is performed based on the corresponding encrypted new balance respectively; an external minus balance verification system is called to perform minus balance verification on single account balance, if the each minus balance verification is passed, it is judged that the transaction verification is passed. The secure transaction verification method and the secure transaction verification system of the invention have the beneficial effects that: whether a transaction is normal can be verified, and transaction processing speed on the blockchain also can be ensured without occupying system overhead.

Description

technical field [0001] The invention belongs to the field of computer technology, in particular to a blockchain-based secure transaction verification method and system. Background technique [0002] Blockchain technology has the characteristics of decentralization and non-tamperable information. Using blockchain technology can realize transaction events involving multiple parties (for example, transfer transactions, payment transactions, etc.). If the transaction is performed on the blockchain, all other nodes on the blockchain will know the transaction, and other participants can participate in confirming the accuracy of the transaction to prevent information tampering. However, since there is no absolute authority node in this transaction method, it is necessary to collectively verify each transaction. The disadvantage is that the transactions of the transaction participants will have no privacy at all, and the account of an organization may be blocked by other nodes. Ins...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/04G06Q20/38G06Q20/40
CPCG06Q20/3829G06Q20/401G06Q40/04
Inventor 秦瑶
Owner 四川吉鼎科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products