[go: up one dir, main page]

CN114615033B - Online financial transaction management system based on blockchain and big data - Google Patents

Online financial transaction management system based on blockchain and big data

Info

Publication number
CN114615033B
CN114615033B CN202210191123.2A CN202210191123A CN114615033B CN 114615033 B CN114615033 B CN 114615033B CN 202210191123 A CN202210191123 A CN 202210191123A CN 114615033 B CN114615033 B CN 114615033B
Authority
CN
China
Prior art keywords
transaction
verification
blockchain
unit
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210191123.2A
Other languages
Chinese (zh)
Other versions
CN114615033A (en
Inventor
张锦蓉
宁冬冬
孙英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Weiyi Information Technology Co ltd
Original Assignee
Shaanxi Weiyi Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Weiyi Information Technology Co ltd filed Critical Shaanxi Weiyi Information Technology Co ltd
Priority to CN202210191123.2A priority Critical patent/CN114615033B/en
Publication of CN114615033A publication Critical patent/CN114615033A/en
Application granted granted Critical
Publication of CN114615033B publication Critical patent/CN114615033B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Environmental & Geological Engineering (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明公开了一种基于区块链和大数据的在线金融交易管理系统,包括:在线交易验证模块、验证漏洞分析模块、用户信息库、漏洞紧急处理模块和交易资产交换模块,通过在线交易验证模块请求交易并支付自动验证成本费用,在去中心化交易的激励机制下,通过验证漏洞分析模块对交易延迟、拥塞现象进行监测,在监测到异常时通过调取用户信息库中的交易方信息判断交易是否存在潜在攻击并分析攻击模式,通过漏洞紧急处理模块依据历史交易数据分析对当前交易进行攻击的交易方是否有滥用攻击行为,对其采取警告和短时限制交易措施,有效地改善了去中心化在线金融交易拥塞、延迟现象,在激励机制下实现了去中心化在线金融交易的良性公平竞争。

The present invention discloses an online financial transaction management system based on blockchain and big data, comprising: an online transaction verification module, a verification vulnerability analysis module, a user information database, a vulnerability emergency processing module and a transaction asset exchange module. Transaction requests are made and automatic verification costs are paid through the online transaction verification module. Under the incentive mechanism of decentralized transactions, transaction delays and congestion are monitored through the verification vulnerability analysis module. When an anomaly is detected, information about the transaction parties in the user information database is retrieved to determine whether potential attacks exist in the transaction and the attack mode is analyzed. The vulnerability emergency processing module analyzes historical transaction data to determine whether the transaction parties attacking the current transaction have engaged in abusive attack behavior, and takes warning and short-term transaction restriction measures against them. This effectively improves the congestion and delay of decentralized online financial transactions, and realizes healthy and fair competition in decentralized online financial transactions under the incentive mechanism.

Description

Online financial transaction management system based on blockchain and big data
Technical Field
The invention relates to the technical field of financial transaction management, in particular to an online financial transaction management system based on blockchain and big data.
Background
For centralized online financial transaction, a third party is needed to intervene in the transaction process, the transaction party needs to hold own assets by a third party (exchange) and store the assets into a holding account, the transaction party can suffer potential loss, the reasons of the potential loss are that the third party steals the assets or the transaction exchange operator is mishandled accidentally, the interests of the transaction party cannot be effectively guaranteed, the third party intervention is removed from the centralized financial transaction, the user stores the assets by himself, safer selection is brought to investors, the centralized transaction is realized by using a block chain technology, the transaction distribution is realized, the asset transfer is free, the user grasps public keys and private keys, the centralized attack of the exchange by the congratulations is effectively avoided, the transaction mode is mostly operated on the public chains, and the transaction process needs to be managed.
Therefore, there is a need for an online financial transaction management system based on blockchains and big data to solve the above problems.
Disclosure of Invention
The invention aims to provide an online financial transaction management system based on blockchain and big data, so as to solve the problems in the background art.
In order to solve the technical problems, the invention provides the technical scheme that the online financial transaction management system based on the blockchain and the big data is characterized by comprising an online transaction verification module, a verification vulnerability analysis module, a user information base, a vulnerability emergency processing module and a transaction asset exchange module;
The user requests the transaction through the online transaction verification module and pays the automatic verification cost, the transaction request is placed in an order queue to wait for verification, the priority of the verification transaction is confirmed, the transaction is bound into a data block and then added into a blockchain, in the online transaction verification process, the transaction delay and network congestion conditions are monitored through the verification vulnerability analysis module, when abnormality is monitored, all transaction party information on blockchain nodes is collected, the transaction party information comprises the automatic verification cost of payment, the distributed position information of the transaction party on the blockchain and the line information generated by the transaction, the historical application transaction information of all transaction parties is collected, all the collected information is transmitted to the user information library, the mode of the current interfered transaction is analyzed and judged through the collected information, the historical transaction information of the attacker is searched, whether the corresponding attacker has misuse attack to cause network transaction congestion and delay actions is judged, the judgment result is transmitted to the emergency processing module, the position information of the user distributed on the blockchain is inquired through the emergency processing module, the corresponding user address of the misuse vulnerability has misuse attack action is converted into the corresponding address, the address of the corresponding user account is registered on the blockchain, the account is temporarily confirmed after the account is verified, the corresponding address is converted into the account, the corresponding address is registered by the user account, the corresponding address is blocked, the address is verified, the corresponding to be blocked, the corresponding to the transaction is blocked, the transaction is completely is blocked, and the transaction is completely is blocked, judging the potential attack mode of the current transaction is beneficial to timely taking measures, processing transaction parties with abusive attack behaviors, and reducing the network congestion phenomenon maintenance time.
Further, the online transaction verification module comprises a transaction order generation unit, a transaction order verification unit and a transaction block binding unit, a user requests transaction through the transaction order generation unit and pays automatic verification cost, the transaction order verification unit places the transaction request in an order queue for verification, the order of verification transaction is determined according to the paid automatic verification cost, the transaction block binding unit binds the transaction into a data block and then adds the data block into a blockchain, and transaction process information is transmitted to the verification vulnerability analysis module.
Further, the verification vulnerability analysis module comprises a network congestion monitoring unit, a transaction party information acquisition unit, a behavior data acquisition unit and an attack mode analysis unit, wherein the network congestion monitoring unit is used for monitoring network congestion, when monitoring network abnormal congestion, the transaction party information acquisition unit is used for acquiring automatic verification cost fees paid by all transaction parties in transaction, angle and distance information of corresponding transaction parties and a blockchain center and line information generated by the transaction, the behavior data acquisition unit is used for acquiring historical transaction behavior data of all transaction parties, all acquired data is transmitted to the attack mode analysis unit through the user information base, and the attack mode analysis unit is used for judging the currently interfered transaction attacked mode according to the acquired data analysis.
Further, the attack mode analysis unit judges the mode of the currently interfered transaction being attacked, specifically, the method inquires that the cost of automatic verification paid by the current transaction is a, when the transaction order waits for verification, a third party, namely an attacker submits the same transaction order, the cost of automatic verification paid is A, A > a judges the current attack mode to be a replacement attack, the random transaction party is acquired to request the transaction times to be m, m >1, the value set of m transactions is W= { W 1,W2,...,Wm }, the cost set of automatic verification paid is b= { b 1,b2,...,bm }, and the transaction value threshold value is calculated according to the following formula respectivelyAutomatic verification of cost and expense thresholds:
Wherein Wi represents a random transaction value, bi represents an automatic verification cost paid by the corresponding transaction, and the priority completion value of the transaction party is inquired to be larger thanAnd the cost of automatic verification is greater thanSimultaneously injecting all value less thanAnd the cost of automatic verification is greater thanThe current attack mode is judged to be the suppression attack, and the purpose of comparing the value of the transaction request and the automatic verification cost of payment with the threshold value through the transaction party requesting for multiple transactions is to judge whether the corresponding transaction party currently has the suppression attack behavior, so that the method is favorable for accurately judging whether the transaction party has the abuse attack behavior.
Further, the collection of times of historical transaction completion of the transaction party is collected by the behavior data collection unit to be k= { K1, K2, the number of times of transaction completion by the attack mode is k= { K1, K2, the number of times of transaction completion by the transaction party is Kn, wherein n represents the number of transaction parties, if Ki > Ki/2, ki represents the number of times of transaction completion by one transaction party at random, ki represents the number of times of transaction completion by the corresponding transaction party by the attack mode, network transaction congestion behaviors caused by abuse attack of the corresponding transaction party are judged, and a judgment result is transmitted to the vulnerability emergency processing module.
Further, the vulnerability emergency processing module comprises a location information inquiry unit, an IP address conversion unit, an abuse attack suppression unit and a bad transaction limiting unit, wherein the location information inquiry unit inquires the location information of transaction parties with abuse attack on a blockchain, models the center of the blockchain as an origin, confirms the address of a corresponding user, converts the address into the IP address through the IP address conversion unit, pauses or delays the transaction verification process participated by the abuse attack suppression unit, temporarily deletes the address of the transaction party from the blockchain through the bad transaction limiting unit, gives warning and carries out short-time transaction limiting on the address of the transaction party. Further, all transaction parties with abusive attack behaviors are screened out through the position information inquiry unit, and the user information base inquires that the included angle set between the connecting line of the node where the corresponding transaction party is located and the blockchain center and the horizontal direction is={,,...,The distance set to the blockchain center is l= { L1, L2,..once., LJ }, where J represents the number of transactors of the abuse attack, the position abscissa xi and the total coordinate yi of a random transaction party are calculated according to the following formulas:
Where Li represents the distance from the node where the corresponding transaction party is located to the blockchain center, The method comprises the steps of representing the included angle between the connecting line of a node where a corresponding transaction party is located and the center of a blockchain and the horizontal direction, obtaining a transaction location coordinate set of abuse attack, wherein the transaction location coordinate set is (x, y) = { (x 1, y 1), (x 2, y 2),. The address where the transaction party is located is mapped by the location coordinate, the address is converted into an IP address through an IP address conversion unit, the transaction verification process participated by the corresponding transaction party is suspended or delayed through an abuse attack suppression unit, the address of the transaction party is temporarily deleted from the blockchain through a bad transaction limiting unit, warning is given and short-term transaction limiting is carried out, modeling is carried out on the transaction blockchain, and the purpose of calculating the location coordinate of the transaction party is to improve the address of the transaction party according to the distance and angle data of the node where the abuse attack is located and the blockchain, so that the address of the transaction party is located on the blockchain is improved, the address of the transaction party is favorably deleted from the blockchain temporarily, the accuracy of finding the warning giving objects is improved, and the congestion delay phenomenon of the decentralization online financial transaction is improved.
Further, the transaction asset exchange module comprises a binding transaction registration unit and an online asset exchange unit, wherein after the network congestion problem is solved, the binding transaction registration unit registers binding transaction in a blockchain, transaction information is recorded and visible to transaction parties, and after the transaction is completed, the transaction parties automatically perform asset exchange through the online asset exchange unit.
Compared with the prior art, the invention has the following beneficial effects:
1. According to the invention, the anti-centralized online financial transaction delay and network congestion situation is monitored through the verification vulnerability analysis module, when abnormality is monitored, transaction party information is collected to judge whether the current transaction is potentially attacked, an attack mode is analyzed, whether the current transaction is abused and attacked is judged according to transaction party historical transaction information, so that network transaction congestion and delay phenomena are caused, a transaction party with corresponding actions is screened out through the vulnerability emergency processing module, the relative position of a node where the transaction party is located and a blockchain center is inquired, the distribution position information of the transaction party on the blockchain is confirmed, the IP address of the transaction party is mapped, the transaction party information is confirmed through the IP address, the current participating transaction verification process is delayed or interrupted, and warning is carried out in a mode of temporarily limiting the transaction, so that network transaction congestion and delay phenomena caused by the abuse attack are accurately and effectively improved, and benign and fair competition of the anti-centralized online financial transaction is realized under the incentive mechanism.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
FIG. 1 is a block diagram of an online financial transaction management system based on blockchain and big data in accordance with the present invention.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, it being understood that the preferred embodiments described herein are for illustration and explanation of the present invention only, and are not intended to limit the present invention.
Referring to FIG. 1, the invention provides a technical scheme that an online financial transaction management system based on blockchain and big data is characterized in that the system comprises an online transaction verification module, a verification vulnerability analysis module, a user information base, a vulnerability emergency processing module and a transaction asset exchange module;
The user requests the transaction through the online transaction verification module, pays automatic verification cost, places the transaction request in an order queue for verification, confirms the priority of the verification transaction, binds the transaction into a data block and then adds the data block into a blockchain, monitors the transaction delay and the network congestion condition through the verification vulnerability analysis module in the online transaction verification process, and when abnormality is detected, acquires all transaction party information on a blockchain node, wherein the method comprises the following steps: the payment automatic verification cost, the distribution position information of the transaction party on the blockchain and the line information generated by the transaction are simultaneously collected, all the collected information is transmitted to a user information base, the mode of the current interfered transaction being attacked is judged by collecting the collected information analysis, the historical transaction information of the attacking party is searched, whether the abuse attack of the corresponding attacking party causes network transaction congestion and delay action is judged, the judgment result is transmitted to a vulnerability emergency processing module, the position information of the user with abuse attack on the blockchain is inquired through the vulnerability emergency processing module, the whole blockchain is modeled, the address of the corresponding user is confirmed, the address is converted into an IP address, the real address of the corresponding user is confirmed, the bad transaction verification of the corresponding user is delayed or interrupted, temporary limiting transaction measures are taken for the bad transaction verification, after the network congestion problem is solved, the binding transaction is registered in the blockchain through a transaction asset exchange module, the transaction information is recorded, the correlation of the transaction party is visible, the two parties automatically execute asset exchange after the transaction is completed, the potential mode of the current transaction is judged to be favorable, the transaction party with abuse attack behavior is processed, so that the network congestion phenomenon maintaining time can be effectively reduced.
The online transaction verification module comprises a transaction order generation unit, a transaction order verification unit and a transaction block binding unit, wherein a user requests transaction and pays automatic verification cost through the transaction order generation unit, the transaction request is placed in an order queue through the transaction order verification unit to wait for verification, the order of verification transaction is determined according to the paid automatic verification cost, the transaction is bound into a data block through the transaction block binding unit and then added into a block chain, and transaction process information is transmitted to the verification vulnerability analysis module.
The verification vulnerability analysis module comprises a network congestion monitoring unit, a transaction party information acquisition unit, a behavior data acquisition unit and an attack mode analysis unit, wherein the network congestion condition is monitored through the network congestion monitoring unit, when abnormal congestion of the network is monitored, the transaction party information acquisition unit is used for acquiring automatic verification cost fees paid by all transaction parties in transaction, angle and distance information corresponding to the transaction parties and the block chain center and line information generated by the transaction, the behavior data acquisition unit is used for acquiring historical transaction behavior data of all the transaction parties, all the acquired data is transmitted to the attack mode analysis unit through a user information base, and the attack mode analysis unit is used for judging the currently interfered transaction attacked mode according to the acquired data analysis.
Inquiring that the automatic verification cost paid by the current transaction is a, and judging that the current attack mode is a substitution attack when the transaction order waits for verification, wherein a third party, namely an attacker submits the same transaction order, the paid automatic verification cost is A, and A is more than a; collecting that the number of times of requesting a transaction by a random transaction party is m & gt 1, the value set of m transactions is W= { W1, W2, & gt, wm }, the automatic verification cost set of payment is b= { b1, b2, & gt, bm }, and calculating the transaction value threshold value according to the following formulas respectivelyAutomatic verification of cost and expense thresholds:
Wherein Wi represents a random transaction value, bi represents an automatic verification cost paid by the corresponding transaction, and the priority completion value of the transaction party is inquired to be larger thanAnd the cost of automatic verification is greater thanSimultaneously injecting all value less thanAnd the cost of automatic verification is greater thanThe current attack mode is judged to be the suppression attack, and the aim of comparing the value of the transaction request and the automatic verification cost of payment with the threshold value is to judge whether the corresponding transaction party currently has the suppression attack behavior or not, so that whether the transaction party has the abuse attack behavior or not can be accurately judged.
The method comprises the steps that a behavior data acquisition unit acquires the number of times of historical transaction completion of a transaction party as k= { K1, K2, & gt, kn }, the number of times of transaction completion of an attack mode as k= { K1, K2, & gt, kn }, wherein n represents the number of transaction parties, if Ki > Ki/2, ki represents the number of times of transaction completion of a random transaction party history, ki represents the number of times of transaction completion of a corresponding transaction party through the attack mode, misuse attack of the corresponding transaction party is judged to cause network transaction congestion, and a judgment result is transmitted to a vulnerability emergency processing module.
The vulnerability emergency processing module comprises a position information inquiry unit, an IP address conversion unit, an abuse attack suppression unit and a bad transaction limiting unit, wherein the position information inquiry unit inquires position information of transaction parties with abuse attack on a blockchain, modeling is carried out by taking the center of the blockchain as an origin, the address of a corresponding user is confirmed, the address is converted into the IP address by the IP address conversion unit, the transaction verification process participated by the transaction party is suspended or delayed by the abuse attack suppression unit, the address of the transaction party is temporarily deleted from the blockchain by the bad transaction limiting unit, and warning is given and short-time transaction limitation is carried out on the address.
All transaction parties with abusive attack behaviors are screened out through a position information inquiry unit, and the included angles between the connecting line of the node where the corresponding transaction party is located and the blockchain center and the horizontal direction are inquired in a user information base to be set as={,,...,The distance set to the blockchain center is l= { L1, L2,..once., LJ }, where J represents the number of transactors of the abuse attack, the position abscissa xi and the total coordinate yi of a random transaction party are calculated according to the following formulas:
Where Li represents the distance from the node where the corresponding transaction party is located to the blockchain center, The method comprises the steps of representing the included angle between the connecting line of a node where a corresponding transaction party is located and the center of a blockchain and the horizontal direction, obtaining a transaction position coordinate set of abuse attack, wherein the transaction position coordinate set is (x, y) = { (x 1, y 1), (x 2, y 2),. The address where the transaction party is located is mapped by the position coordinate, the address is converted into an IP address through an IP address conversion unit, the transaction party address is temporarily deleted from the blockchain through an abuse attack suppression unit or delayed in a transaction verification process where the corresponding transaction party participates, warning is given and short-term transaction restriction is carried out through a bad transaction restriction unit, modeling is carried out on the transaction blockchain, and the purpose of calculating the position coordinate of the transaction party according to the distance and angle data of the node where the transaction party with abuse attack acts and the blockchain is to improve the distribution information of the address where the transaction party is located on the blockchain, so that the address of the transaction party is temporarily deleted from the blockchain, the accuracy of finding the object is improved, and the congestion delay phenomenon of the decentralized online financial transaction is improved.
The transaction asset exchange module comprises a binding transaction registration unit and an online asset exchange unit, wherein after the network congestion problem is solved, the binding transaction is registered in a blockchain through the binding transaction registration unit, transaction information is recorded and visible to transaction parties, and after the transaction is completed, the transaction parties automatically perform asset exchange through the online asset exchange unit.
The first embodiment is that 3 transaction parties with abusive attack actions are screened by a position information inquiry unit, and the included angle set between the connection line of the node of the corresponding transaction party and the blockchain center and the horizontal direction is inquired in a user information base to be={,,}={,,The distance set to the blockchain center is l= { L1, L2, L3} = {100,60,80}, according to the formulaAndCalculating the position abscissa of the transaction party,,Ordinate (vertical coordinate),,The set of transaction location coordinates from which the abuse attack is derived is (x, y) = { (x 1, y 1), (x 2, y 2), (x 3, y 3) } = { { (x 1, y 1),),(,),(,) And mapping the address of the transaction party from the position coordinates, converting the address into an IP address through an IP address conversion unit, suspending or delaying the transaction verification process participated by the corresponding transaction party through an abuse attack suppression unit, temporarily deleting the address of the transaction party from the blockchain through a bad transaction restriction unit, giving a warning and performing short-time transaction restriction.
It should be noted that the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited to the foregoing embodiments, but may be modified or substituted for some of the features described in the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (5)

1. The online financial transaction management system based on the blockchain and the big data is characterized by comprising an online transaction verification module, a verification vulnerability analysis module, a user information base, a vulnerability emergency processing module and a transaction asset exchange module;
The user requests the transaction through the online transaction verification module, pays automatic verification cost, places the transaction request in an order queue for verification, confirms the priority of verification transaction, binds the transaction into a data block and then adds the data block into a blockchain, monitors the transaction delay and network congestion condition through the verification vulnerability analysis module in the online transaction verification process, and when abnormality is detected, acquires all transaction party information on a blockchain node, wherein the method comprises the following steps: the method comprises the steps of automatically verifying cost fees, distributing position information of transaction parties on a blockchain and line information generated by transactions, collecting historical application transaction information of all transaction parties, transmitting all collected information to a user information base, analyzing and judging the mode of currently interfered transactions being attacked by the collected information, searching historical transaction information of the attacking parties, judging whether abuse attacks cause network transaction congestion and delay actions of the corresponding attacking parties, transmitting judgment results to a vulnerability emergency processing module, inquiring position information of users with abuse attacks on the blockchain through the vulnerability emergency processing module, modeling the whole blockchain, confirming addresses of the corresponding users, converting the addresses into IP addresses, confirming real addresses of the corresponding users, delaying or interrupting bad transaction verification of the participation of the corresponding users, taking temporary limitation transaction measures, registering binding transaction in the blockchain through a transaction asset exchange module after the network congestion problem is solved, recording transaction information and making correlation to the transaction parties visible, and automatically executing exchange of assets by the transaction after the transaction is completed;
The verification vulnerability analysis module comprises a network congestion monitoring unit, a transaction party information acquisition unit, a behavior data acquisition unit and an attack mode analysis unit, wherein the network congestion monitoring unit is used for monitoring network congestion, when monitoring network abnormal congestion, the transaction party information acquisition unit is used for acquiring automatic verification cost fees paid by all transaction parties in transaction, angle and distance information of corresponding transaction parties and a blockchain center and line information generated by the transaction, the behavior data acquisition unit is used for acquiring historical transaction behavior data of all transaction parties, all acquired data are transmitted to the attack mode analysis unit through the user information base, and the attack mode analysis unit is used for judging the currently interfered transaction attacked mode according to the acquired data analysis;
the method comprises the steps of judging the mode of a currently interfered transaction being attacked by an attack mode analysis unit, namely inquiring that the cost of automatic verification paid by the current transaction is a, when a transaction order waits for verification, submitting the same transaction order by a third party, namely an attacker, wherein the cost of automatic verification paid is A, A > a, judging that the current attack mode is a substitution attack, acquiring that the number of times of requesting the transaction by a random transaction party is m, m >1, the value set of m transactions is W= { W 1,W2,...,Wm }, the cost set of automatic verification paid is b= { b 1,b2,...,bm }, and respectively calculating the transaction value threshold according to the following formula Automatic verification of cost and expense thresholds:
;
;
Wherein W i represents the transaction value of random one time, b i represents the automatic verification cost of corresponding transaction payment, and the priority completion value of the transaction party is greater than that of the transaction partyAnd the cost of automatic verification is greater thanSimultaneously injecting all value less thanAnd the cost of automatic verification is greater thanJudging the current attack mode as the suppression attack;
The collection of times of transaction completion of transaction party history is collected by the behavior data collection unit to be k= { K 1,k2,...,kn }, the collection of times of transaction completion of transaction by an attack mode is k= { K 1,K2,...,Kn }, wherein n represents the number of transaction parties, if K i>ki/2, K i represents the times of transaction completion of transaction of random transaction party history, K i represents the times of transaction completion of transaction of corresponding transaction party by the attack mode, network transaction congestion behavior caused by abuse attack of the corresponding transaction party is judged, and a judgment result is transmitted to the vulnerability emergency processing module.
2. The online financial transaction management system based on blockchain and big data according to claim 1, wherein the online transaction verification module comprises a transaction order generation unit, a transaction order verification unit and a transaction block binding unit, a user requests a transaction and pays automatic verification cost fees through the transaction order generation unit, the transaction request is placed in an order queue for waiting verification through the transaction order verification unit, the order of verification transactions is determined according to the paid automatic verification cost fees, the transaction is bound into a data block through the transaction block binding unit and then added into a blockchain, and transaction process information is transmitted to the verification vulnerability analysis module.
3. The online financial transaction management system based on blockchain and big data according to claim 1, wherein the vulnerability emergency processing module comprises a location information inquiry unit, an IP address conversion unit, an abuse attack suppression unit and a bad transaction limiting unit, wherein the location information inquiry unit inquires location information of transaction parties with abuse attack on the blockchain, models the center of the blockchain as an origin, confirms the address of a corresponding user, converts the address into the IP address through the IP address conversion unit, pauses or delays the transaction verification process of the participation of the transaction parties through the abuse attack suppression unit, temporarily deletes the address of the transaction party from the blockchain through the bad transaction limiting unit, gives a warning and carries out short-time transaction limiting on the address.
4. The online financial transaction management system based on blockchain and big data according to claim 3, wherein all transaction parties with abuse attack are screened out by the position information inquiry unit, and the included angle set between the connecting line of the node where the corresponding transaction party is located and the center of the blockchain and the horizontal direction is inquired in the user information base as follows={,,...,The distance set to the blockchain center is l= { L 1,L2,...,LJ }, where J represents the number of transactors of the abuse attack, the position abscissa x i and the total coordinate y i of one transactor at random are calculated according to the following formula, respectively:
;
;
wherein L i represents the distance from the node where the corresponding transaction party is located to the blockchain center, And representing the included angle between the connecting line of the node of the corresponding transaction party and the center of the blockchain and the horizontal direction, obtaining a transaction position coordinate set of misuse attack as (x, y) = { (x 1,y1),(x2,y2),...,(xJ,yJ) }, mapping the position coordinate to the address of the transaction party, converting the address into an IP address by an IP address conversion unit, suspending or delaying the transaction verification process participated by the corresponding transaction party by the misuse attack suppression unit, temporarily deleting the address of the transaction party from the blockchain by the bad transaction restriction unit, giving warning and performing short-time transaction restriction.
5. The online financial transaction management system based on blockchain and big data of claim 4, wherein the transaction asset exchange module comprises a binding transaction registration unit and an online asset exchange unit, wherein after the network congestion problem is solved, the binding transaction registration unit registers the binding transaction in the blockchain, records transaction information and is visible to transaction parties, and the transaction parties automatically perform asset exchange through the online asset exchange unit after the transaction is completed.
CN202210191123.2A 2022-03-01 2022-03-01 Online financial transaction management system based on blockchain and big data Active CN114615033B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210191123.2A CN114615033B (en) 2022-03-01 2022-03-01 Online financial transaction management system based on blockchain and big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210191123.2A CN114615033B (en) 2022-03-01 2022-03-01 Online financial transaction management system based on blockchain and big data

Publications (2)

Publication Number Publication Date
CN114615033A CN114615033A (en) 2022-06-10
CN114615033B true CN114615033B (en) 2025-09-09

Family

ID=81858441

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210191123.2A Active CN114615033B (en) 2022-03-01 2022-03-01 Online financial transaction management system based on blockchain and big data

Country Status (1)

Country Link
CN (1) CN114615033B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118316710B (en) * 2024-05-06 2024-11-12 娄底职业技术学院 A financial transaction security monitoring platform based on blockchain
CN120181790B (en) * 2025-03-12 2025-10-03 北京华软世纪科技有限公司 Digital asset load early warning management method and system based on machine learning

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112907321A (en) * 2021-02-03 2021-06-04 珠海市鸿瑞信息技术股份有限公司 Big data-based information security anomaly sensing platform for data mining and analysis

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2571721C2 (en) * 2014-03-20 2015-12-20 Закрытое акционерное общество "Лаборатория Касперского" System and method of detecting fraudulent online transactions
CN113222590B (en) * 2020-01-21 2023-10-31 富联精密电子(天津)有限公司 Method, apparatus and computer readable storage medium for preventing double-flower attack
CN112751915B (en) * 2020-12-23 2022-05-03 重庆邮电大学 Blockchain Security Computing Method Based on Distributed Coordinated Communication Mechanism
CN113763168A (en) * 2021-08-25 2021-12-07 甘肃同兴智能科技发展有限责任公司 Block chain-based carbon asset transaction method and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112907321A (en) * 2021-02-03 2021-06-04 珠海市鸿瑞信息技术股份有限公司 Big data-based information security anomaly sensing platform for data mining and analysis

Also Published As

Publication number Publication date
CN114615033A (en) 2022-06-10

Similar Documents

Publication Publication Date Title
AU2025200776A1 (en) Decentralized safeguard against fraud
AU2025201930A1 (en) Blockchain transaction safety using smart contracts
CN109246211B (en) A resource upload and resource request method in blockchain
CN106934611B (en) A method and device for data processing
CN119477317A (en) Blockchain transaction security
JP2020505799A (en) System and method for replay attack detection
CN114615033B (en) Online financial transaction management system based on blockchain and big data
CN111325581B (en) Data processing method and device, electronic equipment and computer readable storage medium
CN110599331B (en) Liability collection system, method, equipment and storage medium based on blockchain
JP2003523578A (en) System and method for determining the validity of an interaction on a network
JP2020505663A (en) System and method for replay attack detection
CN113709037B (en) A method and device for selecting routing nodes for cross-chain transactions
CN108830710B (en) Block chain transaction platform and implementation method
CN111899100A (en) Service control method, device and equipment and computer storage medium
CN110009759A (en) Work attendance method, attendance checking system and Work attendance device based on block chain
WO2019052469A1 (en) Network request processing method and apparatus, electronic device, and storage medium
CN106126629A (en) A kind of master data management method and system based on live industry
CN106874371A (en) A kind of data processing method and device
CN109859001A (en) A kind of method and device carrying out source of houses update based on block chain
KR101658064B1 (en) System for preventing financial fraud transaction
CN112039893A (en) Private transaction processing method and device, electronic equipment and readable storage medium
KR102097995B1 (en) Electronic payment system for protection of double spending and payment method therefor
CN111339567A (en) Accounting method and accounting system based on block chain
CN112488562B (en) Service realization method and device
KR20200031857A (en) A method of operating Advertising services system based on Blockchain and a system for implementing the service environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20221202

Address after: 710000 11602, Building 1, Yicui Garden, No. 11, Tangyan South Road, Hi tech Zone, Xi'an, Shaanxi

Applicant after: Xi'an Yufeng Yunxiang Network Technology Co.,Ltd.

Address before: 223100 Building 2, Wanda Plaza, qingjiangpu District, Huai'an City, Jiangsu Province

Applicant before: Ning Dongdong

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230516

Address after: 710000, Room 62305, Building 1, Hesheng Jingguang, No. 11 Tangyan Road, High tech Zone, Xi'an City, Shaanxi Province

Applicant after: Shaanxi Weiyi Information Technology Co.,Ltd.

Address before: 710000 11602, Building 1, Yicui Garden, No. 11, Tangyan South Road, Hi tech Zone, Xi'an, Shaanxi

Applicant before: Xi'an Yufeng Yunxiang Network Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant