CN-121981724-A - Transaction chaining method, system, server and program product
Abstract
The embodiment of the application is suitable for the technical field of blockchain and provides a transaction uplink method, a transaction uplink system, a transaction uplink server and a transaction uplink program product, wherein the method comprises the steps of receiving a transaction submitted by client equipment; the method comprises the steps of obtaining a trusted verifier node list of a blockchain, determining trusted time for submitting the transaction to the blockchain based on the trusted verifier node list, and submitting the transaction to the trusted verifier node of the blockchain at the trusted time. By the method, the security of transaction information can be improved, so that the probability of being attacked by the transaction is reduced.
Inventors
- Xie Difan
- HUI CHAO
- WANG QI
- Qin Qirui
- DAI WEIWEI
Assignees
- 杭州高新区(滨江)区块链与数据安全研究院
Dates
- Publication Date
- 20260505
- Application Date
- 20251229
Claims (10)
- 1. A transaction chaining method, comprising: receiving a transaction submitted by a client device; Acquiring a trusted verifier node list of a blockchain; determining, based on the list of trusted verifier nodes, a trusted time to submit the transaction to the blockchain; At the trusted time, submitting the transaction to a trusted verifier node of the blockchain.
- 2. The method of claim 1, wherein the determining a trusted time to submit the transaction to the blockchain based on the list of trusted verifier nodes comprises: Determining a target continuous time length nearest to the current time, wherein leader nodes in the target continuous time length are all trusted verifier nodes, the leader nodes are used for block generation and block verification, and the initial time of the target continuous time length is the current time or after the current time; And determining the initial time of the target continuous duration as the trusted time.
- 3. The method of claim 2, wherein the target continuous length of time comprises a preset number of outgoing time slots, and wherein the determining the target continuous length of time closest to the current time comprises: The method comprises the steps that a leader node scheduling table of the block chain in the current period is obtained, wherein the leader node scheduling table comprises leader nodes corresponding to all block-out time slots respectively, and the leader nodes are used for performing block generation and block verification in the corresponding block-out time slots; And determining the nearest target continuous block-out time slot according to the leader node scheduling table and the trusted verifier node list, wherein the leader nodes of a plurality of block-out time slots in the target continuous block-out time slot are trusted verifier nodes, and the initial block-out time slot of the target continuous block-out time slot is the current block-out time slot or is after the current block-out time slot.
- 4. The method of claim 3, wherein said determining the most recent target contiguous out block time slot based on the leader node shift table and the list of trusted verifier nodes comprises: determining a leader node list of a preset number of block-out time slots from a target block-out time slot according to the leader node scheduling table, wherein the target block-out time slot is a current block-out time slot or a block-out time slot after the current block-out time slot; determining whether each node in the list of leader nodes is in the list of trusted verifier nodes; if all nodes in the leader node list are in the trusted verifier node list, determining that a preset number of block-out time slots from the target block-out time slot form the target continuous block-out time slot; And if any node in the leader node list is not in the trusted verifier node list, taking the next block outlet time slot of the target block outlet time slot as a new target block outlet time slot, and determining the nearest target continuous block outlet time slot according to the new target block outlet time slot.
- 5. The method of any of claims 1-4, wherein the transaction has a client signature, prior to submitting the transaction to a trusted verifier node of the blockchain at the trusted time, further comprising: signing the transaction to obtain a transit signature; And based on the transfer signature and the client signature, forming a uplink signature of the transaction, wherein the trusted verifier node is used for verifying the transaction according to the uplink signature.
- 6. The method of claim 5, wherein the obtaining a list of trusted verifier nodes for a blockchain includes: receiving a list of trusted verifier nodes sent from a blockchain node, or And acquiring transaction execution information of each node in the last period in the blockchain, and generating or updating the trusted verifier node list according to the transaction execution information, wherein the transaction execution information comprises the probability of being attacked of the transaction executed in the block generated by each node.
- 7. The method of claim 1, wherein prior to receiving the transaction submitted by the client device, the method further comprises: Establishing a private link with the client device, the private link for receiving a transaction from the client device; Establishing an encryption channel with each trusted verifier node, wherein the encryption channel is used for sending the transaction to the trusted verifier node.
- 8. A transaction chaining system, comprising: a client device for submitting a transaction to a server; The system comprises a client device, a server, a trusted verifier node list, a trusted time and a trusted time, wherein the client device is used for receiving a transaction submitted by the client device; and the blockchain node device is used for receiving the transaction sent by the server and generating a block based on the received transaction, and the blockchain node device is used for deploying the trusted verifier node of the blockchain.
- 9. A server comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the method according to any of claims 1-7 when executing the computer program.
- 10. A computer program product, characterized in that the computer program product, when run on a server, causes the server to perform the method according to any of claims 1-7.
Description
Transaction chaining method, system, server and program product Technical Field The application belongs to the technical field of blockchain, and particularly relates to a transaction uplink method, a transaction uplink system, a transaction uplink server and a transaction uplink program product. Background When in transaction uplink, a user submits transaction information to nodes of a blockchain, and the uplink transaction information is broadcast and spread through a public eight diagrams (gossip) network by default, so that the content of the uplink transaction information can be known by all the nodes in a very short time. After the transaction information is disclosed, the transaction is easily attacked. For example, an attacker may insert own transactions before and after a transaction based on published transaction information, resulting in increased transaction costs for the user. In order to avoid transaction attack caused by transaction information disclosure, a user can directly send the transaction information to the block-out node of the blockchain through a private channel, so that the probability of interception in advance in the process of propagation of the transaction is reduced. However, the out-block nodes may view the transaction content and reorder within the block, and may reveal transaction information to external policers, thereby coordinating the benefits under the chain. This results in a still higher risk of the transaction being attacked. Disclosure of Invention In view of the above, the embodiments of the present application provide a transaction uplink method, system, server and program product for improving security of transaction information and reducing risk of transaction attack. A first aspect of an embodiment of the present application provides a transaction uplink method, including: receiving a transaction submitted by a client device; Acquiring a trusted verifier node list of a blockchain; determining, based on the list of trusted verifier nodes, a trusted time to submit the transaction to the blockchain; At the trusted time, submitting the transaction to a trusted verifier node of the blockchain. In one possible implementation, the determining, based on the list of trusted verifier nodes, a trusted time to commit the transaction to the blockchain includes: Determining a target continuous time length nearest to the current time, wherein leader nodes in the target continuous time length are all trusted verifier nodes, the leader nodes are used for block generation and block verification, and the initial time of the target continuous time length is the current time or after the current time; And determining the initial time of the target continuous duration as the trusted time. In one possible implementation manner, the target continuous duration includes a preset number of block-out time slots, and the determining the target continuous duration closest to the current time includes: The method comprises the steps that a leader node scheduling table of the block chain in the current period is obtained, wherein the leader node scheduling table comprises leader nodes corresponding to all block-out time slots respectively, and the leader nodes are used for performing block generation and block verification in the corresponding block-out time slots; And determining the nearest target continuous block-out time slot according to the leader node scheduling table and the trusted verifier node list, wherein the leader nodes of a plurality of block-out time slots in the target continuous block-out time slot are trusted verifier nodes, and the initial block-out time slot of the target continuous block-out time slot is the current block-out time slot or is after the current block-out time slot. In one possible implementation manner, the determining the nearest target consecutive out-block time slot according to the leader node shift table and the trusted verifier node list includes: determining a leader node list of a preset number of block-out time slots from a target block-out time slot according to the leader node scheduling table, wherein the target block-out time slot is a current block-out time slot or a block-out time slot after the current block-out time slot; determining whether each node in the list of leader nodes is in the list of trusted verifier nodes; if all nodes in the leader node list are in the trusted verifier node list, determining that a preset number of block-out time slots from the target block-out time slot form the target continuous block-out time slot; And if any node in the leader node list is not in the trusted verifier node list, taking the next block outlet time slot of the target block outlet time slot as a new target block outlet time slot, and determining the nearest target continuous block outlet time slot according to the new target block outlet time slot. In one possible implementation, the transaction has a client signature, and before submittin