Blockchain anonymous user auditing method and system applied to blockchain server

A blockchain and server technology, applied in the blockchain field, can solve the problems of inability to guarantee the privacy of participants, slow efficiency, etc., to achieve the effect of ensuring supervision and auditing, and ensuring privacy

Pending Publication Date: 2021-06-08
HEFEI DAPPWORKS TECH CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this patent solution, the transaction user audit, transaction data audit, and transaction quantity audit are performed on the newly added transaction information to determine whether there is abnormal information. This method is inefficient and cannot guarantee the privacy of participants.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain anonymous user auditing method and system applied to blockchain server
  • Blockchain anonymous user auditing method and system applied to blockchain server
  • Blockchain anonymous user auditing method and system applied to blockchain server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] refer to figure 1 , figure 1 A schematic flow diagram of a blockchain anonymous user audit method provided in Embodiment 1 of the present invention, a blockchain anonymous user audit method, comprising the following steps:

[0050] S10, the block chain client responds to the registration instruction, performs real-name authentication on the user, and generates a block chain account corresponding to the xID mark;

[0051] S11. The blockchain client sends a transaction request to the blockchain server;

[0052] S12. The blockchain server executes the first instruction in response to the transaction request instruction, and judges whether the blockchain account has illegal operations.

[0053] In step S10, generating a one-to-one corresponding block chain account with the xID mark includes: the block chain client generates an eID (electronic IDentity, citizen network electronic identity mark) after the user passes the real-name authentication, and generates a block for t...

Embodiment 2

[0073] refer to figure 2 , figure 2 A schematic flow diagram of a blockchain anonymous user audit method applied to a blockchain client provided by Embodiment 2 of the present invention, a blockchain anonymous user audit method applied to a blockchain client, comprising the following steps:

[0074] S20, the blockchain client responds to the registration instruction, performs real-name authentication on the user, and generates a one-to-one corresponding blockchain account with the xID tag;

[0075] S21. The blockchain client sends a transaction request to the blockchain server.

[0076] In step S20, generating a block chain account corresponding to the xID mark includes: the block chain client generates an eID (electronic IDentity, citizen network electronic identity mark) after the user passes the real-name authentication, and generates a block for the user based on the eID chain account, the eID and block chain account are stored in the user information server.

[0077]...

Embodiment 3

[0086] refer to image 3 , image 3 It is a schematic flowchart of a blockchain anonymous user audit method applied to a blockchain server provided by Embodiment 3 of the present invention, a blockchain anonymous user audit method applied to a blockchain server, comprising the following steps

[0087] S30. Execute the first instruction in response to the transaction request instruction to determine whether the blockchain account has illegal operations.

[0088] In step S30, it also includes executing a second instruction in response to the periodic review instruction to determine whether there is any illegal operation in the blockchain account.

[0089] After the blockchain server receives the transaction request, the execution of the first instruction includes:

[0090] S301. Use the zero-knowledge proof of violation rules to verify whether the transaction violates the regulations. If the verification is passed, there is no violation;

[0091] If the verification cannot be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a blockchain anonymous user auditing method and system applied to a blockchain server, and the method comprises the steps: enabling the blockchain server to respond to a transaction request instruction, executing a first instruction, and judging whether a blockchain account has a violation operation behavior or not; enabling the blockchain server to respond to the regular review instruction to execute the second instruction and judge whether the blockchain account has a violation operation behavior or not, wherein the execution of the first instruction comprises the following steps: verifying whether the transaction is illegal or not by using an illegal rule zero-knowledge proof, and if the verification is passed, determining that no violation exists; if verification cannot be passed, obtaining the decrypted account data, wherein the decrypted account data are used for judging whether the transaction is illegal or not. In the invention, the blockchain client carries out real-name authentication on the user and generates the blockchain accounts in one-to-one correspondence with the xID marks, so that the encryption of the user data is realized, and the blockchain server can judge the operation behaviors of the blockchain accounts, thereby ensuring the supervision and auditing of the blockchain accounts of the user.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to a block chain anonymous user audit method and system applied to block chain servers. Background technique [0002] The xID marking technology system is a data de-identification technology system built by the Third Research Institute of the Ministry of Public Security based on cryptographic algorithms. It is committed to standardizing the de-identification processing and application of data subject IDs, and can generate different and irreversible IDs for data subject IDs of application organizations. xID labels information (xIDLabel), and implements controlled mapping. After the controlled mapping, the circulation of attribute data without the data subject ID can be realized, and in the controlled mapping, the generation and mapping logs and mapping records of the data subject ID can be checked at any time. [0003] Zero-Knowledge Proof (Zero-Knowledge Proof) was proposed by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3221H04L9/3226H04L63/0421H04L63/0876H04L63/126H04L67/1097
Inventor 张焱施逸杨东李汪红
Owner HEFEI DAPPWORKS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products