Block chain anonymous user auditing method and system applied to block chain client

A blockchain and client-side technology, applied in the blockchain field, can solve problems such as the inability to protect the privacy of participants, and achieve the effect of ensuring supervision and auditing and ensuring privacy

Pending Publication Date: 2021-06-11
HEFEI DAPPWORKS TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention lies in the blockchain anonymous user audit method, applied to the blockchain client, how to overcome the problem of not being able to protect the privacy of participants when auditing user operation behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain anonymous user auditing method and system applied to block chain client
  • Block chain anonymous user auditing method and system applied to block chain client
  • Block chain anonymous user auditing method and system applied to block chain client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] See figure 1 , figure 1 A flow diagram of a block chain anonymous user auditing method provided in Example 1 of the present invention, a block chain anonymous user auditing method, including the following steps:

[0048] S10, block chain client in response to registration instructions, real-name authentication of the user, and generates a corresponding zone chain account with the XID tag;

[0049] S11, block chain client sends a transaction request to the block chain server by a zero knowledge certificate technology;

[0050] S12, the block chain server performs the first instruction in response to the transaction request instruction, and determines whether the area block chain account has illegal operation behavior.

[0051] In step S10, the generation and XID tag one-one correspondence block chain account includes: block chain client generates EID (Electronic Identity, Citizen Network Electronics Identity), and generates blocks based on EID based on EID Chain account, the...

Embodiment 2

[0072] See figure 2 , figure 2 For the block chain of the block chain of the block chain, the block chain of the block chain, a block chain is an anonymous user auditing method, which is applied to the block chain client, including the following steps:

[0073] S20, block chain client in response to the registration instruction, perform real-name authentication for the user, and generates a corresponding zone chain account with the XID tag;

[0074] S21, the block chain client sends a transaction request from a zero knowledge certificate to the block chain server.

[0075] In step S20, the generation and XID tag one-one correspondence block chain account includes: block chain client generates EID (Electronic Identity, Citizen Network Electronic Identity), and generated block based on EID based on EID Chain account, the EID, block chain accounts are stored in the user information server.

[0076] Among them, the information of the block chain account includes a private key, a publi...

Embodiment 3

[0084] See image 3 , image 3 A flow diagram of the block chain unique user auditing method for the block chain server according to Embodiment 3 of the present invention, a block chain anonymous user auditing method, which is applied to the block chain server, including the following steps

[0085] S30, in response to the transaction request instruction, executes whether or not there is illegal operational behavior in determining the block chain account.

[0086] In step S30, it is also included in response to the periodic review instruction, and the execution of the second instruction judgment area block chain account has illegal operation behavior.

[0087] After the block chain server receives the transaction request, the execution first instruction includes:

[0088] S301, using illegal rules zero knowledge certificate verify that the transaction is violated, if it is verified, there is no violation;

[0089] If it is not possible to verify, the decrypted account data is obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a block chain anonymous user auditing method and system applied to a block chain client, and the method comprises the steps: enabling the block chain client to respond to a registration instruction, carrying out the real-name authentication of a user, and generating block chain accounts in one-to-one correspondence with xID marks; and enabling the block chain client to send a transaction request encrypted by the zero-knowledge proof technology to the block chain server. In the invention, the block chain client carries out real-name authentication on the user and generates the block chain accounts in one-to-one correspondence with the xID marks, so that the encryption of the user data is realized, and the block chain server can judge the operation behaviors of the block chain accounts, thereby ensuring the supervision and auditing of the block chain accounts of the user.

Description

Technical field [0001] The present invention relates to the field of block chains, in particular to block chain anonymous user auditing methods, systems, electronic devices, and storage media. Background technique [0002] The XID tag technical system is the data-de-logorative technical system constructed by the Ministry of Public Security, which is dedicated to the de-identification processing and application of the specification of the data main ID, which can generate different and irreversible for the application agency's data main ID. XID Tag Information (XIDLabel) and implements a controlled mapping. After the controlled mapping, the traffic of the attribute data without the data body ID can be realized, and in the controlled mapping, log and mapping record for the generation and mapping of the data body ID can be checked. [0003] Zero-Knowledge Proof, is proposed by S. Goldwasser, S.Micali and C.RACKOFF in the early 1980s. It refers to the proven that the verifier believes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q20/38H04L9/32H04L29/08
CPCH04L63/083H04L63/0428H04L9/3218H04L9/3247H04L63/0442G06Q20/3829H04L67/10H04L9/50Y02D10/00
Inventor 张焱施逸杨东李汪红
Owner HEFEI DAPPWORKS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products