[go: up one dir, main page]

CN114615033A - Online financial transaction management system based on block chain and big data - Google Patents

Online financial transaction management system based on block chain and big data Download PDF

Info

Publication number
CN114615033A
CN114615033A CN202210191123.2A CN202210191123A CN114615033A CN 114615033 A CN114615033 A CN 114615033A CN 202210191123 A CN202210191123 A CN 202210191123A CN 114615033 A CN114615033 A CN 114615033A
Authority
CN
China
Prior art keywords
transaction
party
unit
verification
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210191123.2A
Other languages
Chinese (zh)
Inventor
张锦蓉
宁冬冬
孙英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Weiyi Information Technology Co.,Ltd.
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202210191123.2A priority Critical patent/CN114615033A/en
Publication of CN114615033A publication Critical patent/CN114615033A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Environmental & Geological Engineering (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses an online financial transaction management system based on a block chain and big data, which comprises: an online transaction verification module, a verification vulnerability analysis module, a user information base, a vulnerability emergency processing module and a transaction asset exchange module, wherein the online transaction verification module requests transaction and pays automatic verification cost, under the incentive mechanism of decentralized transaction, the transaction delay and congestion phenomenon are monitored by a verification vulnerability analysis module, when the abnormity is monitored, the information of the transaction party in the user information base is called to judge whether the transaction has potential attack and analyze an attack mode, whether a transaction party attacking the current transaction has abuse attack behaviors or not is analyzed through the vulnerability emergency processing module according to historical transaction data, warning and short-time limit transaction measures are taken for the financial transaction system, so that the phenomena of congestion and delay of decentralized online financial transactions are effectively improved, and benign fair competition of decentralized online financial transactions is realized under an incentive mechanism.

Description

Online financial transaction management system based on block chain and big data
Technical Field
The invention relates to the technical field of financial transaction management, in particular to an online financial transaction management system based on a block chain and big data.
Background
For centralized online financial transactions, third party intervention is required during the transaction, the transaction party needs to transfer its own assets to a third party (exchange) and deposit the assets into an escrow account, the transaction party may suffer potential loss, the reasons for this may be theft of a third party, appropriation of assets by an exchange operator, or mishandling by accident, etc., the interests of the exchange party cannot be effectively secured, the decentralized financial transaction removes the intervention of a third party, the user keeps the assets by himself, a safer choice is brought to investors, the decentralized transaction utilizes the block chain technology to distribute the transactions, the asset transfer is free, the user masters the public key and the private key, the centralized attack of congratulatory guests to the exchange is effectively avoided, most of the transaction modes run on the public chain, and because the transaction modes have certain limitations, the transaction process needs to be managed: the method is characterized in that an incentive mechanism is arranged in a transaction verification process, so that the participant can easily be attacked, the existence of the incentive mechanism enables the participant to catch a leak in the transaction process and game the transaction sequence, the participant abuses an attack mode for a long time to conduct transaction, which can cause serious transaction network congestion and long transaction delay time, monitors the transaction verification process, and utilizes a big data technology to fetch transaction party behavior data when the transaction is abnormal, identifies the transaction party with abusive attack behavior, warns the transaction party and temporarily limits the transaction behavior, so that the network transaction congestion condition can be effectively improved.
Therefore, there is a need for an online financial transaction management system based on blockchains and big data to solve the above problems.
Disclosure of Invention
The present invention is directed to an online financial transaction management system based on blockchains and big data, so as to solve the problems mentioned in the background art.
In order to solve the technical problems, the invention provides the following technical scheme: an online financial transaction management system based on blockchains and big data, characterized in that: the system comprises: the online transaction verification module, the verification vulnerability analysis module, the user information base, the vulnerability emergency processing module and the transaction asset exchange module;
the method comprises the following steps that a user requests for transaction through the online transaction verification module, pays automatic verification cost, places transaction requests in an order queue to be verified, confirms the priority of verification transaction, binds the transaction into a data block and then adds the data block to a block chain, monitors transaction delay and network congestion conditions through the verification vulnerability analysis module in the online transaction verification process, and acquires all transaction party information on a block chain node when monitoring abnormality, and comprises the following steps: the method comprises the steps of automatically verifying cost and cost of payment, position information of transaction parties distributed on a block chain and line information generated by transaction, collecting historical applied transaction information of all transaction parties, transmitting all the collected information to a user information base, analyzing and judging a mode of attacking the current interfered transaction by calling the collected information, searching historical transaction information of the attacking party, judging whether the corresponding attacking party has behaviors of network transaction congestion and delay caused by abuse attack, transmitting a judgment result to a vulnerability emergency processing module, inquiring position information of users with abuse attack behaviors distributed on the block chain through the vulnerability emergency processing module, modeling the whole block chain, confirming the address of the corresponding user, converting the address into an IP address, confirming the real address of the corresponding user, and delaying or interrupting bad transaction verification of participation of the corresponding user, and adopt temporary limit transaction measure to it, after solving the network congestion problem, register the binding transaction in the block chain through the exchange module of the said trade assets, record the transaction information and visible to the trade side, after the trade is finished, carry out the asset exchange automatically by both sides of trade, judge the potential attack mode that the present trade receives is favorable to taking measures in time, process the trade side with abusing the attack behavior, have reduced the holding time of the phenomenon of network congestion.
Furthermore, the online transaction verification module comprises a transaction order generation unit, a transaction order verification unit and a transaction block binding unit, a user requests for transaction through the transaction order generation unit and pays an automatic verification cost, the transaction request is placed in an order queue through the transaction order verification unit to be verified, the sequence of verification transactions is determined according to the paid automatic verification cost, the transaction is bound into a data block through the transaction block binding unit and then added into a block chain, and transaction process information is transmitted to the verification vulnerability analysis module.
Furthermore, the verification vulnerability analysis module comprises a network congestion monitoring unit, a transaction party information acquisition unit, a behavior data acquisition unit and an attack mode analysis unit, the network congestion condition is monitored through the network congestion monitoring unit, when abnormal network congestion is monitored, automatic verification cost paid by all transaction parties in transaction, angle and distance information of the corresponding transaction parties and a block chain center and line information generated by transaction are acquired through the transaction party information acquisition unit, historical transaction behavior data of all transaction parties are acquired through the behavior data acquisition unit, all acquired data are transmitted to the attack mode analysis unit through the user information base, and the attack mode analysis unit analyzes and judges the attack mode of the current interfered transaction according to the acquired data.
Further, the attack mode analyzing unit is used for judging the attack mode of the current interfered transaction, and the judgment specifically comprises the following steps: inquiring that the automatic verification cost paid by the current transaction is a, when the transaction order is waited to be verified, a third party, namely an attacker submits the same transaction order, the paid automatic verification cost is A, and A>a, judging that the current attack mode is a displacement attack; the number of times of transaction requested by one transaction party is m, m>The value set of 1, m transactions is W = { W = { (W)1,W2,...,WmThe paid automatic verification cost set is b = { b = }1,b2,...,bmIs divided according to the following formulaSeparately calculating transaction value thresholds
Figure 202249DEST_PATH_IMAGE001
And automatically verifying a cost fee threshold
Figure 3983DEST_PATH_IMAGE002
Figure 349513DEST_PATH_IMAGE003
Figure 844080DEST_PATH_IMAGE004
Wherein, Wi represents the transaction value of one random transaction, bi represents the automatic verification cost paid by the corresponding transaction, and the priority completion value of the transaction party is higher than that of the transaction party when the transaction party is inquired
Figure 642272DEST_PATH_IMAGE005
And the cost of automatic verification is more than
Figure 247696DEST_PATH_IMAGE002
While injecting all value less than
Figure 182154DEST_PATH_IMAGE006
And the cost of automatic verification is more than
Figure 847622DEST_PATH_IMAGE002
The current attack mode is judged to be suppression attack, the value of transaction request of a transaction party requesting for multiple transactions and the paid automatic verification cost are compared with a threshold value, so that whether the corresponding transaction party has suppression attack behaviors or not is judged, and whether abuse attack behaviors exist in the transaction party or not is judged accurately.
Furthermore, the action data acquisition unit acquires that the number of times of historical transaction completion of transaction parties is K = { K1, K2.. and Kn }, the number of times of transaction completion through the attack mode is K = { K1, K2.. and Kn }, wherein n represents the number of transaction parties, and if Ki is greater than Ki/2, Ki represents the number of times of historical transaction completion of a random transaction party, and Ki represents the number of times of transaction completion of a corresponding transaction party through the attack mode, network transaction congestion caused by abuse attack of the corresponding transaction party is judged, and the judgment result is transmitted to the vulnerability emergency processing module.
Further, the vulnerability emergency processing module comprises a position information query unit, an IP address conversion unit, an abuse attack suppression unit and a bad transaction limiting unit, wherein the position information query unit is used for querying the position information distributed on the block chain of the transaction party with abuse attack behaviors, the block chain center is used as an origin point for modeling, the address where the corresponding user is located is confirmed, the IP address conversion unit is used for converting the address into the IP address, the abuse attack suppression unit is used for suspending or delaying the transaction verification process participated by the transaction party, the bad transaction limiting unit is used for temporarily deleting the transaction party address from the block chain, and warning is given and short-time transaction limitation is carried out on the transaction party. Further, all transaction parties with abuse attack behaviors are screened out through the position information inquiry unit, and the angle set of the connecting line of the node where the corresponding transaction party is located and the center of the block chain and the horizontal direction is inquired in the user information base to be the angle set
Figure 336372DEST_PATH_IMAGE007
={
Figure 604542DEST_PATH_IMAGE008
Figure 534452DEST_PATH_IMAGE009
,...,
Figure 495455DEST_PATH_IMAGE010
And the distance set from the center of the blockchain is L = { L1, L2., LJ }, wherein J represents the number of transaction parties abusive attacks, and the position abscissa xi and the total coordinate yi of a random transaction party are respectively calculated according to the following formula:
Figure 878026DEST_PATH_IMAGE011
Figure 215466DEST_PATH_IMAGE012
wherein Li represents the distance from the node where the corresponding transaction party is located to the center of the blockchain,
Figure 999883DEST_PATH_IMAGE013
the method comprises the steps of representing an included angle between a connecting line of a node where a corresponding transaction party is located and the center of a block chain and the horizontal direction, obtaining a transaction position coordinate set of abuse attack, wherein the transaction position coordinate set is (x, y) = { (x 1, y 1), (x 2, y 2),. · xJ, yJ) }, mapping the address where the transaction party is located by the position coordinate, converting the address into an IP address by an IP address conversion unit, suspending or delaying a transaction verification process involving the corresponding transaction party by the abuse attack suppression unit, temporarily deleting the address of the transaction party from the block chain by the bad transaction limitation unit, giving an alarm and carrying out short-time transaction limitation, modeling the transaction block chain, calculating the position coordinate of the transaction party according to the distance and angle data between the node where the transaction party with abuse attack acts and the block chain, and aiming at improving the mapping address of distribution information of the transaction party on the block chain, the method is favorable for accurately and temporarily deleting the address of the transaction party from the block chain, improves the accuracy of searching the warning for the object, and improves the congestion delay phenomenon of decentralized online financial transaction.
Furthermore, the transaction asset exchange module comprises a binding transaction registration unit and an online asset exchange unit, after the problem of network congestion is solved, the binding transaction is registered in a block chain through the binding transaction registration unit, transaction information is recorded and is visible to a transaction party, and after the transaction is finished, the asset exchange is automatically executed by the transaction parties through the online asset exchange unit.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention monitors decentralized online financial transaction delay and network congestion conditions through a verification vulnerability analysis module, collects transaction party information to judge whether the current transaction is under potential attack when abnormity is monitored, analyzes an attack mode, judges whether the transaction party has abuse attack behavior according to the historical transaction information of the transaction party to cause congestion and delay phenomena of network transaction, screens out transaction parties with corresponding behaviors through a vulnerability emergency processing module, inquires the relative position of a node where the transaction party is located and a block chain center, confirms the distribution position information of the transaction party on a block chain, maps an IP address of the transaction party, confirms the transaction party information through the IP address, delays or interrupts the currently involved transaction verification process, warns in a mode of temporarily limiting the transaction, and accurately and effectively improves network transaction congestion and network congestion caused by abuse attack, The delay phenomenon realizes benign fair competition of decentralized online financial transactions under an incentive mechanism.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a block diagram of an online financial transaction management system based on a blockchain and big data according to the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Referring to fig. 1, the present invention provides the following technical solutions: an online financial transaction management system based on blockchains and big data, characterized in that: the system comprises: the online transaction verification module, the verification vulnerability analysis module, the user information base, the vulnerability emergency processing module and the transaction asset exchange module;
the method comprises the following steps that a user requests for transaction through an online transaction verification module, pays automatic verification cost, places a transaction request in an order queue to be verified, confirms the priority of verification transaction, binds the transaction into a data block and then adds the data block to a block chain, monitors transaction delay and network congestion conditions through a verification vulnerability analysis module in the online transaction verification process, and acquires all transaction party information on a block chain node when monitoring abnormality, and the method comprises the following steps: the method comprises the steps of automatically verifying cost and expense for payment, distributing position information of transaction parties on a block chain and line information generated by transaction, collecting historical applied transaction information of all transaction parties, transmitting all the collected information to a user information base, analyzing and judging a mode of attacking the current interfered transaction by calling the collected information, searching historical transaction information of the attacking party, judging whether the corresponding attacking party has behaviors of network transaction congestion and delay caused by abuse attack, transmitting a judgment result to a vulnerability emergency processing module, inquiring position information distributed on the block chain by a user with abuse attack behaviors through the emergency processing module, modeling the whole block chain, confirming an address of the corresponding user, converting the address into an IP address, confirming a real address of the corresponding user, and delaying or interrupting bad transaction verification participated by the corresponding user, and adopt temporary limit transaction measure to it, after solving the network congestion problem, register the binding transaction in the block chain through trading the asset exchange module, record the transaction information and visible to the transaction side, after the transaction is finished, carry out the asset exchange automatically by both sides of transaction, judge the potential attack mode that the present transaction receives is favorable to taking measures in time, deal with the transaction side that has abuse attack behavior, can reduce the network congestion phenomenon holding time effectively.
The online transaction verification module comprises a transaction order generation unit, a transaction order verification unit and a transaction block binding unit, a user requests for transaction through the transaction order generation unit and pays automatic verification cost fees, the transaction request is placed in an order queue through the transaction order verification unit and waits for verification, the sequence of verification transaction is determined according to the paid automatic verification cost fees, the transaction is bound into a data block through the transaction block binding unit and then added into a block chain, and transaction process information is transmitted to the verification vulnerability analysis module.
The verification vulnerability analysis module comprises a network congestion monitoring unit, a transaction party information acquisition unit, a behavior data acquisition unit and an attack mode analysis unit, the network congestion condition is monitored through the network congestion monitoring unit, when abnormal network congestion is monitored, automatic verification cost paid by all transaction parties in transaction, angle and distance information of the corresponding transaction parties and a block chain center and line information generated by transaction are acquired through the transaction party information acquisition unit, historical transaction behavior data of all transaction parties are acquired through the behavior data acquisition unit, all acquired data are transmitted to the attack mode analysis unit through a user information base, and the attack mode analysis unit analyzes and judges the mode of the current interfered transaction.
The attack mode analysis unit is used for judging the mode of the current interfered transaction, and the method specifically comprises the following steps: inquiring that the automatic verification cost paid by the current transaction is a, when the transaction order is waited to be verified, a third party, namely an attacker submits the same transaction order, the paid automatic verification cost is A, and A>a, judging that the current attack mode is a displacement attack; the number of times of transaction requested by one transaction party is m, m>The value set of 1, m transactions is W = { W1, W2., Wm }, the value set of paid auto-verification cost is b = { b1, b 2., bm }, and the transaction value threshold is calculated according to the following formula respectively
Figure 131787DEST_PATH_IMAGE005
And automatically verifying a cost charge threshold
Figure 1654DEST_PATH_IMAGE002
Figure 283731DEST_PATH_IMAGE014
Figure 312867DEST_PATH_IMAGE004
Wherein Wi represents a random one timeThe transaction value bi represents the cost of automatic verification corresponding to the transaction payment, and the priority completion value of the transaction party is higher than that of the transaction party when the transaction party is inquired
Figure 225459DEST_PATH_IMAGE005
And the cost of automatic verification is more than
Figure 972835DEST_PATH_IMAGE002
While injecting into the market all values less than
Figure 589761DEST_PATH_IMAGE006
And the cost of automatic verification is more than
Figure 342910DEST_PATH_IMAGE002
The purpose of comparing the value of the transaction request of a transaction party requesting for multiple transactions and the paid automatic verification cost with the threshold value is to judge whether the corresponding transaction party has the suppression attack behavior currently, so that whether the transaction party has the abuse attack behavior can be accurately judged.
The historical transaction completion times of transaction parties collected by the behavior data collection unit are K = { K1, K2.,. Kn }, the historical transaction completion times of transaction parties through the attack mode are K = { K1, K2.,. Kn }, wherein n represents the number of transaction parties, if Ki is larger than Ki/2, Ki represents the historical transaction completion times of a random transaction party, Ki represents the transaction completion times of a corresponding transaction party through the attack mode, network transaction congestion caused by abuse attack of the corresponding transaction party is judged, and the judgment result is transmitted to the vulnerability emergency processing module.
The vulnerability emergency processing module comprises a position information query unit, an IP address conversion unit, an abuse attack inhibiting unit and a bad transaction limiting unit, wherein the position information distributed on a block chain by a transaction party with an abuse attack behavior is queried through the position information query unit, modeling is carried out by taking the center of the block chain as an origin, the address of a corresponding user is confirmed, the address is converted into the IP address through the IP address conversion unit, the transaction verification process participated by the transaction party is suspended or delayed through the abuse attack inhibiting unit, the address of the transaction party is temporarily deleted from the block chain through the bad transaction limiting unit, warning is given, and short-time transaction limitation is carried out on the address.
All transaction parties with abuse attack behaviors are screened out through the position information query unit, and the included angle set of the connecting line of the node where the corresponding transaction party is located and the block chain center and the horizontal direction is queried in the user information base
Figure 816617DEST_PATH_IMAGE007
={
Figure 661076DEST_PATH_IMAGE008
Figure 612852DEST_PATH_IMAGE009
,...,
Figure 491946DEST_PATH_IMAGE015
And the distance set from the center of the blockchain is L = { L1, L2., LJ }, wherein J represents the number of transaction parties abusive attacks, and the position abscissa xi and the total coordinate yi of a random transaction party are respectively calculated according to the following formula:
Figure 870975DEST_PATH_IMAGE011
Figure 202730DEST_PATH_IMAGE012
wherein Li represents the distance from the node where the corresponding transaction party is located to the center of the blockchain,
Figure 223776DEST_PATH_IMAGE013
the included angle between the connecting line of the node where the corresponding transaction party is located and the center of the block chain and the horizontal direction is represented, the transaction position coordinate set for obtaining the abuse attack is (x, y) = { (x 1, y 1), (x 2, y 2),... -, (xJ, yJ) }, the address where the transaction party is located is mapped by the position coordinate, the address is converted into an IP address through an IP address conversion unit,the transaction verification process of participation of a corresponding transaction party is suspended or delayed through the abuse attack inhibiting unit, the address of the transaction party is temporarily deleted from the block chain through the bad transaction limiting unit, warning is given and short-time transaction limitation is carried out, modeling is carried out on the transaction block chain, and the position coordinate of the transaction party is calculated according to the distance and angle data between the node where the transaction party with abuse attack behaviors is located and the block chain, so that the purpose of improving the distribution information of the transaction party on the block chain to map the address where the transaction party is located is achieved, the address of the transaction party is conveniently and accurately temporarily deleted from the block chain, the accuracy of finding a warning given object is improved, and the congestion delay phenomenon of decentralized online financial transaction is improved.
The transaction asset exchange module comprises a binding transaction registration unit and an online asset exchange unit, after the problem of network congestion is solved, the binding transaction is registered in a block chain through the binding transaction registration unit, transaction information is recorded and is visible to a transaction party, and after the transaction is completed, the asset exchange is automatically executed by the transaction parties through the online asset exchange unit.
The first embodiment is as follows: 3 transaction parties with abuse attack behaviors are screened out through the position information query unit, and the included angle set of the connecting line of the node where the corresponding transaction party is located and the block chain center and the horizontal direction is queried in the user information base
Figure 957377DEST_PATH_IMAGE007
={
Figure 772886DEST_PATH_IMAGE008
Figure 591937DEST_PATH_IMAGE009
Figure 885515DEST_PATH_IMAGE016
}={
Figure 473623DEST_PATH_IMAGE017
Figure 460033DEST_PATH_IMAGE018
Figure 94277DEST_PATH_IMAGE019
Set of distances to the center of the blockchain is L = { L1, L2, L3} = {100, 60, 80}, according to the formula
Figure 66912DEST_PATH_IMAGE020
And
Figure 634160DEST_PATH_IMAGE021
calculating the position abscissa of the transaction part respectively
Figure 666838DEST_PATH_IMAGE022
Figure 585115DEST_PATH_IMAGE023
Figure 95862DEST_PATH_IMAGE024
(ii) a Ordinate of the curve
Figure 48775DEST_PATH_IMAGE025
Figure 252354DEST_PATH_IMAGE026
Figure 392348DEST_PATH_IMAGE027
The set of position coordinates of the transaction location for which an abuse attack is derived is (x, y) = { (x 1, y 1), (x 2, y 2), (x 3, y 3) } { (
Figure 972365DEST_PATH_IMAGE028
Figure 514205DEST_PATH_IMAGE028
),(
Figure 888686DEST_PATH_IMAGE029
Figure 719239DEST_PATH_IMAGE030
),(
Figure 696422DEST_PATH_IMAGE031
Figure 233714DEST_PATH_IMAGE032
) Mapping the address of the trading party by the position coordinate, converting the address into an IP address by an IP address conversion unit, suspending or delaying the trading verification process participated by the corresponding trading party by an abuse attack suppression unit, temporarily deleting the address of the trading party from a block chain by a bad trading limitation unit, giving a warning and carrying out short-time trading limitation.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described above, or equivalents may be substituted for elements thereof. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. An online financial transaction management system based on blockchains and big data, characterized in that: the system comprises: the online transaction verification module, the verification vulnerability analysis module, the user information base, the vulnerability emergency processing module and the transaction asset exchange module;
the method comprises the following steps that a user requests for transaction through the online transaction verification module, pays automatic verification cost, places transaction requests in an order queue to be verified, confirms the priority of verification transaction, binds the transaction into a data block and then adds the data block to a block chain, monitors transaction delay and network congestion conditions through the verification vulnerability analysis module in the online transaction verification process, and acquires all transaction party information on a block chain node when monitoring abnormality, and comprises the following steps: the method comprises the steps of automatically verifying cost fee, distributed position information of transaction parties on a block chain and line information generated by transaction, collecting historical transaction application information of all transaction parties, transmitting all the collected information to a user information base, analyzing and judging a mode that the current interfered transaction is attacked by calling the collected information, searching historical transaction information of the attack parties, judging whether the corresponding attack parties have behaviors of network transaction congestion and delay caused by abuse attack, transmitting a judgment result to a vulnerability emergency processing module, inquiring position information distributed on the block chain by users with abuse attack behaviors through the vulnerability emergency processing module, modeling the whole block chain, confirming the address of the corresponding user, converting the address into an IP address, confirming the real address of the corresponding user, and delaying or interrupting poor transaction verification of participation of the corresponding user, and adopt temporary limit transaction measure to it, after solving the network congestion problem, register the binding transaction in the block chain through the exchange module of the said trade assets, record the transaction information and visible to the trade side, after the trade is finished, the exchange of assets is carried out automatically by the trade side.
2. The system for managing online financial transactions based on blockchains and big data according to claim 1, wherein: the online transaction verification module comprises a transaction order generation unit, a transaction order verification unit and a transaction block binding unit, a user requests for transaction through the transaction order generation unit and pays automatic verification cost, the transaction request is placed in an order queue through the transaction order verification unit to be verified, the sequence of verification of the transaction is determined according to the paid automatic verification cost, the transaction is bound into a data block through the transaction block binding unit and then added into a block chain, and transaction process information is transmitted to the verification vulnerability analysis module.
3. The system for managing online financial transactions based on blockchains and big data according to claim 1, wherein: the verification vulnerability analysis module comprises a network congestion monitoring unit, a transaction party information acquisition unit, a behavior data acquisition unit and an attack mode analysis unit, the network congestion monitoring unit monitors the network congestion condition, when abnormal network congestion is monitored, the transaction party information acquisition unit acquires automatic verification cost paid by all transaction parties in transaction, angle and distance information of corresponding transaction parties and a block chain center and line information generated by transaction, the behavior data acquisition unit acquires historical transaction behavior data of all transaction parties, all acquired data are transmitted to the attack mode analysis unit through the user information base, and the attack mode analysis unit analyzes and judges the mode of the current interfered transaction being attacked according to the acquired data.
4. The system for managing online financial transactions according to claim 3, wherein: the attack mode analysis unit is used for judging the mode of the current interfered transaction, and the method specifically comprises the following steps: inquiring that the automatic verification cost paid by the current transaction is a, when the transaction order is waited to be verified, a third party, namely an attacker submits the same transaction order, the paid automatic verification cost is A, and A>a, judging that the current attack mode is a displacement attack; the number of times of transaction requested by one transaction party is m, m>The value set of 1, m transactions is W = { W1, W2., Wm }, the automatic verification cost set paid is b = { b1, b 2., bm }, and the transaction value threshold is calculated according to the following formula respectively
Figure 724027DEST_PATH_IMAGE001
And automatically verifying a cost charge threshold
Figure 573034DEST_PATH_IMAGE002
Figure 26012DEST_PATH_IMAGE003
Figure 417810DEST_PATH_IMAGE004
Wherein, Wi represents the transaction value of one random transaction, bi represents the automatic verification cost paid by the corresponding transaction, and the priority completion value of the transaction party is higher than that of the transaction party when the transaction party is inquired
Figure 727569DEST_PATH_IMAGE001
And the cost of automatic verification is more than
Figure 63872DEST_PATH_IMAGE002
While injecting into the market all values less than
Figure 523803DEST_PATH_IMAGE005
And the cost of automatic verification is more than
Figure 566846DEST_PATH_IMAGE002
And (4) judging the current attack mode to be suppression attack.
5. The system for managing online financial transactions according to claim 4, wherein: the behavior data acquisition unit acquires the number of times that transaction parties complete transactions historically, wherein the number of times is K = { K1, K2., Kn }, the number of times that transactions are completed historically through the attack mode is K = { K1, K2., Kn }, wherein n represents the number of transaction parties, and if Ki is larger than Ki/2, Ki represents the number of times that transactions are completed historically by one transaction party, Ki represents the number of times that transactions are completed by the corresponding transaction party through the attack mode, network transaction congestion caused by abuse attacks on the corresponding transaction party is judged, and a judgment result is transmitted to the vulnerability emergency processing module.
6. The system for managing online financial transactions based on blockchains and big data according to claim 1, wherein: the vulnerability emergency processing module comprises a position information query unit, an IP address conversion unit, an abuse attack suppression unit and a bad transaction limiting unit, wherein the position information query unit is used for querying the position information distributed on a block chain by transaction parties with abuse attack behaviors, modeling is carried out by taking the block chain center as an origin, the address where a corresponding user is located is confirmed, the IP address conversion unit is used for converting the address into the IP address, the abuse attack suppression unit is used for suspending or delaying the transaction verification process participated by the transaction parties, the bad transaction limiting unit is used for temporarily deleting the transaction party address from the block chain, and warning is given and short-time transaction limitation is carried out on the transaction party.
7. The system of claim 6, wherein the system comprises: screening out all transaction parties with abuse attack behaviors through the position information query unit, and querying a set of included angles between a connecting line of a node where the corresponding transaction party is located and a block chain center and the horizontal direction in the user information base to obtain
Figure 47506DEST_PATH_IMAGE006
={
Figure 871105DEST_PATH_IMAGE007
Figure 869148DEST_PATH_IMAGE008
,...,
Figure 563435DEST_PATH_IMAGE009
And the distance set from the center of the blockchain is L = { L1, L2., LJ }, wherein J represents the number of transaction parties abusive attacks, and the position abscissa xi and the total coordinate yi of a random transaction party are respectively calculated according to the following formula:
Figure 746154DEST_PATH_IMAGE010
Figure 994733DEST_PATH_IMAGE011
wherein Li represents the distance from the node where the corresponding transaction party is located to the center of the blockchain,
Figure 389942DEST_PATH_IMAGE012
the method comprises the steps of representing an included angle between a connecting line of a node where a corresponding transaction party is located and the center of a block chain and the horizontal direction, obtaining a transaction position coordinate set of abuse attack, wherein the transaction position coordinate set is (x, y) = { (x 1, y 1), (x 2, y 2),. · and (xJ, yJ) }, mapping an address where the transaction party is located by using a position coordinate, converting the address into an IP address by using an IP address conversion unit, suspending or delaying a transaction verification process where the corresponding transaction party participates by using an abuse attack suppression unit, temporarily deleting the address of the transaction party from the block chain by using a bad transaction limiting unit, giving an alarm and performing short-time transaction limitation.
8. The system for managing online financial transactions according to claim 7, wherein: the transaction asset exchange module comprises a binding transaction registration unit and an online asset exchange unit, after the problem of network congestion is solved, the binding transaction is registered in a block chain through the binding transaction registration unit, transaction information is recorded and is visible to a transaction party, and after the transaction is completed, the asset exchange is automatically executed by the transaction parties through the online asset exchange unit.
CN202210191123.2A 2022-03-01 2022-03-01 Online financial transaction management system based on block chain and big data Pending CN114615033A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210191123.2A CN114615033A (en) 2022-03-01 2022-03-01 Online financial transaction management system based on block chain and big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210191123.2A CN114615033A (en) 2022-03-01 2022-03-01 Online financial transaction management system based on block chain and big data

Publications (1)

Publication Number Publication Date
CN114615033A true CN114615033A (en) 2022-06-10

Family

ID=81858441

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210191123.2A Pending CN114615033A (en) 2022-03-01 2022-03-01 Online financial transaction management system based on block chain and big data

Country Status (1)

Country Link
CN (1) CN114615033A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118316710A (en) * 2024-05-06 2024-07-09 娄底职业技术学院 A financial transaction security monitoring platform based on blockchain

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118316710A (en) * 2024-05-06 2024-07-09 娄底职业技术学院 A financial transaction security monitoring platform based on blockchain

Similar Documents

Publication Publication Date Title
US20220165098A1 (en) System and Method for Toll Transactions Utilizing a Distributed Ledger
CN109246211B (en) A resource upload and resource request method in blockchain
CN106934611B (en) A method and device for data processing
CN108764870A (en) Transaction processing method and device, electronic equipment based on block chain
CN110599331B (en) Liability collection system, method, equipment and storage medium based on blockchain
CN109088722B (en) Block chain node evolution method and block chain node
CN111612452A (en) Intellectual property management system and method based on block chain
CN108717659A (en) A kind of measures of tax collection and framework based on block chain
CN110163691A (en) Invoice creation method and device, electronic equipment based on block chain
EP2756478A1 (en) An intermediation server for cross-jurisdictional internet enforcement
CN111899100A (en) Service control method, device and equipment and computer storage medium
CN110163634A (en) Withdrawing method and device, electronic equipment based on block chain
CN111507815A (en) Block chain based information acquisition method, device, equipment and storage medium
CN110648534A (en) Traffic data chaining method and device of Internet of things based on block chain
CN114615033A (en) Online financial transaction management system based on block chain and big data
CN113709037A (en) Cross-chain transaction routing node selection method and device
CN110297824B (en) Data recording method, device, equipment and storage medium based on resource transfer
KR20160046161A (en) System for preventing financial fraud transaction
KR102291341B1 (en) Method, system and program for create virtual account for each cryptocurrency for financial transactions
CN111339567A (en) Accounting method and accounting system based on block chain
CN112862984A (en) Intelligent parking fee distribution method and block chain platform
CN116029825B (en) Block chain transaction method, device and system, electronic equipment and storage medium
CN117579693A (en) A method to build a cross-chain data security sharing mechanism based on oracles
KR20170093517A (en) System and method for trading over-the-counter using asking price interface
CN112785299B (en) Method and device for roaming transaction based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20221202

Address after: 710000 11602, Building 1, Yicui Garden, No. 11, Tangyan South Road, Hi tech Zone, Xi'an, Shaanxi

Applicant after: Xi'an Yufeng Yunxiang Network Technology Co.,Ltd.

Address before: 223100 Building 2, Wanda Plaza, qingjiangpu District, Huai'an City, Jiangsu Province

Applicant before: Ning Dongdong

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230516

Address after: 710000, Room 62305, Building 1, Hesheng Jingguang, No. 11 Tangyan Road, High tech Zone, Xi'an City, Shaanxi Province

Applicant after: Shaanxi Weiyi Information Technology Co.,Ltd.

Address before: 710000 11602, Building 1, Yicui Garden, No. 11, Tangyan South Road, Hi tech Zone, Xi'an, Shaanxi

Applicant before: Xi'an Yufeng Yunxiang Network Technology Co.,Ltd.