Online financial transaction management system based on blockchain and big data
Technical Field
The invention relates to the technical field of financial transaction management, in particular to an online financial transaction management system based on blockchain and big data.
Background
For centralized online financial transaction, a third party is needed to intervene in the transaction process, the transaction party needs to hold own assets by a third party (exchange) and store the assets into a holding account, the transaction party can suffer potential loss, the reasons of the potential loss are that the third party steals the assets or the transaction exchange operator is mishandled accidentally, the interests of the transaction party cannot be effectively guaranteed, the third party intervention is removed from the centralized financial transaction, the user stores the assets by himself, safer selection is brought to investors, the centralized transaction is realized by using a block chain technology, the transaction distribution is realized, the asset transfer is free, the user grasps public keys and private keys, the centralized attack of the exchange by the congratulations is effectively avoided, the transaction mode is mostly operated on the public chains, and the transaction process needs to be managed.
Therefore, there is a need for an online financial transaction management system based on blockchains and big data to solve the above problems.
Disclosure of Invention
The invention aims to provide an online financial transaction management system based on blockchain and big data, so as to solve the problems in the background art.
In order to solve the technical problems, the invention provides the technical scheme that the online financial transaction management system based on the blockchain and the big data is characterized by comprising an online transaction verification module, a verification vulnerability analysis module, a user information base, a vulnerability emergency processing module and a transaction asset exchange module;
The user requests the transaction through the online transaction verification module and pays the automatic verification cost, the transaction request is placed in an order queue to wait for verification, the priority of the verification transaction is confirmed, the transaction is bound into a data block and then added into a blockchain, in the online transaction verification process, the transaction delay and network congestion conditions are monitored through the verification vulnerability analysis module, when abnormality is monitored, all transaction party information on blockchain nodes is collected, the transaction party information comprises the automatic verification cost of payment, the distributed position information of the transaction party on the blockchain and the line information generated by the transaction, the historical application transaction information of all transaction parties is collected, all the collected information is transmitted to the user information library, the mode of the current interfered transaction is analyzed and judged through the collected information, the historical transaction information of the attacker is searched, whether the corresponding attacker has misuse attack to cause network transaction congestion and delay actions is judged, the judgment result is transmitted to the emergency processing module, the position information of the user distributed on the blockchain is inquired through the emergency processing module, the corresponding user address of the misuse vulnerability has misuse attack action is converted into the corresponding address, the address of the corresponding user account is registered on the blockchain, the account is temporarily confirmed after the account is verified, the corresponding address is converted into the account, the corresponding address is registered by the user account, the corresponding address is blocked, the address is verified, the corresponding to be blocked, the corresponding to the transaction is blocked, the transaction is completely is blocked, and the transaction is completely is blocked, judging the potential attack mode of the current transaction is beneficial to timely taking measures, processing transaction parties with abusive attack behaviors, and reducing the network congestion phenomenon maintenance time.
Further, the online transaction verification module comprises a transaction order generation unit, a transaction order verification unit and a transaction block binding unit, a user requests transaction through the transaction order generation unit and pays automatic verification cost, the transaction order verification unit places the transaction request in an order queue for verification, the order of verification transaction is determined according to the paid automatic verification cost, the transaction block binding unit binds the transaction into a data block and then adds the data block into a blockchain, and transaction process information is transmitted to the verification vulnerability analysis module.
Further, the verification vulnerability analysis module comprises a network congestion monitoring unit, a transaction party information acquisition unit, a behavior data acquisition unit and an attack mode analysis unit, wherein the network congestion monitoring unit is used for monitoring network congestion, when monitoring network abnormal congestion, the transaction party information acquisition unit is used for acquiring automatic verification cost fees paid by all transaction parties in transaction, angle and distance information of corresponding transaction parties and a blockchain center and line information generated by the transaction, the behavior data acquisition unit is used for acquiring historical transaction behavior data of all transaction parties, all acquired data is transmitted to the attack mode analysis unit through the user information base, and the attack mode analysis unit is used for judging the currently interfered transaction attacked mode according to the acquired data analysis.
Further, the attack mode analysis unit judges the mode of the currently interfered transaction being attacked, specifically, the method inquires that the cost of automatic verification paid by the current transaction is a, when the transaction order waits for verification, a third party, namely an attacker submits the same transaction order, the cost of automatic verification paid is A, A > a judges the current attack mode to be a replacement attack, the random transaction party is acquired to request the transaction times to be m, m >1, the value set of m transactions is W= { W 1,W2,...,Wm }, the cost set of automatic verification paid is b= { b 1,b2,...,bm }, and the transaction value threshold value is calculated according to the following formula respectivelyAutomatic verification of cost and expense thresholds:
Wherein Wi represents a random transaction value, bi represents an automatic verification cost paid by the corresponding transaction, and the priority completion value of the transaction party is inquired to be larger thanAnd the cost of automatic verification is greater thanSimultaneously injecting all value less thanAnd the cost of automatic verification is greater thanThe current attack mode is judged to be the suppression attack, and the purpose of comparing the value of the transaction request and the automatic verification cost of payment with the threshold value through the transaction party requesting for multiple transactions is to judge whether the corresponding transaction party currently has the suppression attack behavior, so that the method is favorable for accurately judging whether the transaction party has the abuse attack behavior.
Further, the collection of times of historical transaction completion of the transaction party is collected by the behavior data collection unit to be k= { K1, K2, the number of times of transaction completion by the attack mode is k= { K1, K2, the number of times of transaction completion by the transaction party is Kn, wherein n represents the number of transaction parties, if Ki > Ki/2, ki represents the number of times of transaction completion by one transaction party at random, ki represents the number of times of transaction completion by the corresponding transaction party by the attack mode, network transaction congestion behaviors caused by abuse attack of the corresponding transaction party are judged, and a judgment result is transmitted to the vulnerability emergency processing module.
Further, the vulnerability emergency processing module comprises a location information inquiry unit, an IP address conversion unit, an abuse attack suppression unit and a bad transaction limiting unit, wherein the location information inquiry unit inquires the location information of transaction parties with abuse attack on a blockchain, models the center of the blockchain as an origin, confirms the address of a corresponding user, converts the address into the IP address through the IP address conversion unit, pauses or delays the transaction verification process participated by the abuse attack suppression unit, temporarily deletes the address of the transaction party from the blockchain through the bad transaction limiting unit, gives warning and carries out short-time transaction limiting on the address of the transaction party. Further, all transaction parties with abusive attack behaviors are screened out through the position information inquiry unit, and the user information base inquires that the included angle set between the connecting line of the node where the corresponding transaction party is located and the blockchain center and the horizontal direction is={,,...,The distance set to the blockchain center is l= { L1, L2,..once., LJ }, where J represents the number of transactors of the abuse attack, the position abscissa xi and the total coordinate yi of a random transaction party are calculated according to the following formulas:
Where Li represents the distance from the node where the corresponding transaction party is located to the blockchain center, The method comprises the steps of representing the included angle between the connecting line of a node where a corresponding transaction party is located and the center of a blockchain and the horizontal direction, obtaining a transaction location coordinate set of abuse attack, wherein the transaction location coordinate set is (x, y) = { (x 1, y 1), (x 2, y 2),. The address where the transaction party is located is mapped by the location coordinate, the address is converted into an IP address through an IP address conversion unit, the transaction verification process participated by the corresponding transaction party is suspended or delayed through an abuse attack suppression unit, the address of the transaction party is temporarily deleted from the blockchain through a bad transaction limiting unit, warning is given and short-term transaction limiting is carried out, modeling is carried out on the transaction blockchain, and the purpose of calculating the location coordinate of the transaction party is to improve the address of the transaction party according to the distance and angle data of the node where the abuse attack is located and the blockchain, so that the address of the transaction party is located on the blockchain is improved, the address of the transaction party is favorably deleted from the blockchain temporarily, the accuracy of finding the warning giving objects is improved, and the congestion delay phenomenon of the decentralization online financial transaction is improved.
Further, the transaction asset exchange module comprises a binding transaction registration unit and an online asset exchange unit, wherein after the network congestion problem is solved, the binding transaction registration unit registers binding transaction in a blockchain, transaction information is recorded and visible to transaction parties, and after the transaction is completed, the transaction parties automatically perform asset exchange through the online asset exchange unit.
Compared with the prior art, the invention has the following beneficial effects:
1. According to the invention, the anti-centralized online financial transaction delay and network congestion situation is monitored through the verification vulnerability analysis module, when abnormality is monitored, transaction party information is collected to judge whether the current transaction is potentially attacked, an attack mode is analyzed, whether the current transaction is abused and attacked is judged according to transaction party historical transaction information, so that network transaction congestion and delay phenomena are caused, a transaction party with corresponding actions is screened out through the vulnerability emergency processing module, the relative position of a node where the transaction party is located and a blockchain center is inquired, the distribution position information of the transaction party on the blockchain is confirmed, the IP address of the transaction party is mapped, the transaction party information is confirmed through the IP address, the current participating transaction verification process is delayed or interrupted, and warning is carried out in a mode of temporarily limiting the transaction, so that network transaction congestion and delay phenomena caused by the abuse attack are accurately and effectively improved, and benign and fair competition of the anti-centralized online financial transaction is realized under the incentive mechanism.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
FIG. 1 is a block diagram of an online financial transaction management system based on blockchain and big data in accordance with the present invention.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, it being understood that the preferred embodiments described herein are for illustration and explanation of the present invention only, and are not intended to limit the present invention.
Referring to FIG. 1, the invention provides a technical scheme that an online financial transaction management system based on blockchain and big data is characterized in that the system comprises an online transaction verification module, a verification vulnerability analysis module, a user information base, a vulnerability emergency processing module and a transaction asset exchange module;
The user requests the transaction through the online transaction verification module, pays automatic verification cost, places the transaction request in an order queue for verification, confirms the priority of the verification transaction, binds the transaction into a data block and then adds the data block into a blockchain, monitors the transaction delay and the network congestion condition through the verification vulnerability analysis module in the online transaction verification process, and when abnormality is detected, acquires all transaction party information on a blockchain node, wherein the method comprises the following steps: the payment automatic verification cost, the distribution position information of the transaction party on the blockchain and the line information generated by the transaction are simultaneously collected, all the collected information is transmitted to a user information base, the mode of the current interfered transaction being attacked is judged by collecting the collected information analysis, the historical transaction information of the attacking party is searched, whether the abuse attack of the corresponding attacking party causes network transaction congestion and delay action is judged, the judgment result is transmitted to a vulnerability emergency processing module, the position information of the user with abuse attack on the blockchain is inquired through the vulnerability emergency processing module, the whole blockchain is modeled, the address of the corresponding user is confirmed, the address is converted into an IP address, the real address of the corresponding user is confirmed, the bad transaction verification of the corresponding user is delayed or interrupted, temporary limiting transaction measures are taken for the bad transaction verification, after the network congestion problem is solved, the binding transaction is registered in the blockchain through a transaction asset exchange module, the transaction information is recorded, the correlation of the transaction party is visible, the two parties automatically execute asset exchange after the transaction is completed, the potential mode of the current transaction is judged to be favorable, the transaction party with abuse attack behavior is processed, so that the network congestion phenomenon maintaining time can be effectively reduced.
The online transaction verification module comprises a transaction order generation unit, a transaction order verification unit and a transaction block binding unit, wherein a user requests transaction and pays automatic verification cost through the transaction order generation unit, the transaction request is placed in an order queue through the transaction order verification unit to wait for verification, the order of verification transaction is determined according to the paid automatic verification cost, the transaction is bound into a data block through the transaction block binding unit and then added into a block chain, and transaction process information is transmitted to the verification vulnerability analysis module.
The verification vulnerability analysis module comprises a network congestion monitoring unit, a transaction party information acquisition unit, a behavior data acquisition unit and an attack mode analysis unit, wherein the network congestion condition is monitored through the network congestion monitoring unit, when abnormal congestion of the network is monitored, the transaction party information acquisition unit is used for acquiring automatic verification cost fees paid by all transaction parties in transaction, angle and distance information corresponding to the transaction parties and the block chain center and line information generated by the transaction, the behavior data acquisition unit is used for acquiring historical transaction behavior data of all the transaction parties, all the acquired data is transmitted to the attack mode analysis unit through a user information base, and the attack mode analysis unit is used for judging the currently interfered transaction attacked mode according to the acquired data analysis.
Inquiring that the automatic verification cost paid by the current transaction is a, and judging that the current attack mode is a substitution attack when the transaction order waits for verification, wherein a third party, namely an attacker submits the same transaction order, the paid automatic verification cost is A, and A is more than a; collecting that the number of times of requesting a transaction by a random transaction party is m & gt 1, the value set of m transactions is W= { W1, W2, & gt, wm }, the automatic verification cost set of payment is b= { b1, b2, & gt, bm }, and calculating the transaction value threshold value according to the following formulas respectivelyAutomatic verification of cost and expense thresholds:
Wherein Wi represents a random transaction value, bi represents an automatic verification cost paid by the corresponding transaction, and the priority completion value of the transaction party is inquired to be larger thanAnd the cost of automatic verification is greater thanSimultaneously injecting all value less thanAnd the cost of automatic verification is greater thanThe current attack mode is judged to be the suppression attack, and the aim of comparing the value of the transaction request and the automatic verification cost of payment with the threshold value is to judge whether the corresponding transaction party currently has the suppression attack behavior or not, so that whether the transaction party has the abuse attack behavior or not can be accurately judged.
The method comprises the steps that a behavior data acquisition unit acquires the number of times of historical transaction completion of a transaction party as k= { K1, K2, & gt, kn }, the number of times of transaction completion of an attack mode as k= { K1, K2, & gt, kn }, wherein n represents the number of transaction parties, if Ki > Ki/2, ki represents the number of times of transaction completion of a random transaction party history, ki represents the number of times of transaction completion of a corresponding transaction party through the attack mode, misuse attack of the corresponding transaction party is judged to cause network transaction congestion, and a judgment result is transmitted to a vulnerability emergency processing module.
The vulnerability emergency processing module comprises a position information inquiry unit, an IP address conversion unit, an abuse attack suppression unit and a bad transaction limiting unit, wherein the position information inquiry unit inquires position information of transaction parties with abuse attack on a blockchain, modeling is carried out by taking the center of the blockchain as an origin, the address of a corresponding user is confirmed, the address is converted into the IP address by the IP address conversion unit, the transaction verification process participated by the transaction party is suspended or delayed by the abuse attack suppression unit, the address of the transaction party is temporarily deleted from the blockchain by the bad transaction limiting unit, and warning is given and short-time transaction limitation is carried out on the address.
All transaction parties with abusive attack behaviors are screened out through a position information inquiry unit, and the included angles between the connecting line of the node where the corresponding transaction party is located and the blockchain center and the horizontal direction are inquired in a user information base to be set as={,,...,The distance set to the blockchain center is l= { L1, L2,..once., LJ }, where J represents the number of transactors of the abuse attack, the position abscissa xi and the total coordinate yi of a random transaction party are calculated according to the following formulas:
Where Li represents the distance from the node where the corresponding transaction party is located to the blockchain center, The method comprises the steps of representing the included angle between the connecting line of a node where a corresponding transaction party is located and the center of a blockchain and the horizontal direction, obtaining a transaction position coordinate set of abuse attack, wherein the transaction position coordinate set is (x, y) = { (x 1, y 1), (x 2, y 2),. The address where the transaction party is located is mapped by the position coordinate, the address is converted into an IP address through an IP address conversion unit, the transaction party address is temporarily deleted from the blockchain through an abuse attack suppression unit or delayed in a transaction verification process where the corresponding transaction party participates, warning is given and short-term transaction restriction is carried out through a bad transaction restriction unit, modeling is carried out on the transaction blockchain, and the purpose of calculating the position coordinate of the transaction party according to the distance and angle data of the node where the transaction party with abuse attack acts and the blockchain is to improve the distribution information of the address where the transaction party is located on the blockchain, so that the address of the transaction party is temporarily deleted from the blockchain, the accuracy of finding the object is improved, and the congestion delay phenomenon of the decentralized online financial transaction is improved.
The transaction asset exchange module comprises a binding transaction registration unit and an online asset exchange unit, wherein after the network congestion problem is solved, the binding transaction is registered in a blockchain through the binding transaction registration unit, transaction information is recorded and visible to transaction parties, and after the transaction is completed, the transaction parties automatically perform asset exchange through the online asset exchange unit.
The first embodiment is that 3 transaction parties with abusive attack actions are screened by a position information inquiry unit, and the included angle set between the connection line of the node of the corresponding transaction party and the blockchain center and the horizontal direction is inquired in a user information base to be={,,}={,,The distance set to the blockchain center is l= { L1, L2, L3} = {100,60,80}, according to the formulaAndCalculating the position abscissa of the transaction party,,Ordinate (vertical coordinate),,The set of transaction location coordinates from which the abuse attack is derived is (x, y) = { (x 1, y 1), (x 2, y 2), (x 3, y 3) } = { { (x 1, y 1),),(,),(,) And mapping the address of the transaction party from the position coordinates, converting the address into an IP address through an IP address conversion unit, suspending or delaying the transaction verification process participated by the corresponding transaction party through an abuse attack suppression unit, temporarily deleting the address of the transaction party from the blockchain through a bad transaction restriction unit, giving a warning and performing short-time transaction restriction.
It should be noted that the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited to the foregoing embodiments, but may be modified or substituted for some of the features described in the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.