Detailed Description
The application solves the technical problem of poor currency circulation management security caused by various security threats facing digital currency transaction and insufficient encryption measures in the prior art by providing the circulation management method, the system and the storage medium of the digital currency transaction. The method comprises the steps of determining the initial transaction state of digital currency to be transacted by identifying the state of the digital currency to be transacted, conducting secure encryption on the digital currency, constructing a blockchain, synchronizing the digital currency to be transacted to a blockchain network for transaction inquiry, broadcasting encrypted transaction information to the blockchain network for verification, monitoring the state of the transaction in real time and generating feedback data, adjusting management strategies according to the real-time transaction conditions, reducing asset loss, realizing intelligent circulation management of the digital currency transaction, and improving the security of the digital currency circulation management.
In the following, the technical solutions of the present application will be clearly and completely described with reference to the accompanying drawings, and it should be understood that the described embodiments are only some embodiments of the present application, but not all embodiments of the present application, and that the present application is not limited by the exemplary embodiments described herein. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application. It should be further noted that, for convenience of description, only some, but not all of the drawings related to the present application are shown.
Referring to fig. 1, the present application provides a method for managing circulation of digital money transactions, wherein the method for managing circulation of digital money transactions is applied to a system for managing circulation of digital money transactions, and the method for managing circulation of digital money transactions specifically includes the following steps:
Traversing digital currency to be transacted for transaction identification to obtain a first transaction state, and carrying out security encryption on the digital currency to be transacted based on the first transaction state to generate a key pair, wherein the key pair comprises a digital encryption currency information pair and transaction encryption information.
Specifically, the pending digital currency transactions are traversed and the status of the digital currencies is identified. Each digital currency to be transacted has its specific transaction status including whether it is a legitimate transaction, whether it has been used, whether it meets current transaction conditions, etc. By traversing these digital currencies, the legitimacy of the digital currencies (e.g., whether there is a risk of double payment, whether the transaction conditions are met, etc.) is checked, and an initial transaction state, i.e., a first transaction state, is obtained. And carrying out secure encryption on the digital currency to be transacted according to the first transaction state, dynamically adjusting an encryption algorithm or a key generation mode, and encrypting the digital currency information by using symmetric encryption or asymmetric encryption to ensure the security of the transaction. Secure encryption is an encryption technique that encrypts transaction data based on the status of the transaction and related information. A key pair is generated during encryption, including a digital cryptocurrency information pair and transaction encryption information. The digital encryption currency information pair comprises encrypted digital currency amount, sender information and receiver information, and transaction encryption information, state information related to a transaction execution flow, transaction operation records and the like. The method comprises the steps of traversing the digital currency to be transacted, identifying the initial state (first transaction state) of the digital currency, then carrying out security encryption on legal transaction based on the state, generating a key pair for protecting transaction data, protecting core currency data in the transaction by the digital encryption currency information pair, protecting operation information in a transaction process by the transaction encryption information, and ensuring the validity of the transaction, the security of the data and the integrity of the process.
And secondly, constructing a blockchain network, synchronizing the digital currency to be transacted to the blockchain network for transaction inquiry, and obtaining historical currency transaction record data.
Specifically, a blockchain network capable of carrying digital currency transactions and synchronous queries is constructed through the steps of node deployment, consensus mechanism setting, network communication configuration and the like. The blockchain network comprises a digital currency transaction platform, and the transaction platform not only provides conventional transaction functions, but also directly participates in the synchronization and consensus process of the blockchain. The transaction platform may serve as a node to maintain a distributed ledger of the blockchain. The digital currency information to be transacted is synchronized into the blockchain network, including transaction party information, transaction amount, transaction time, unique identification of digital currency, and the like. After synchronizing to the blockchain network, the transaction inquiry typically involves checking the transaction history to obtain historical transaction record data for the currency. These historical transaction records will reveal all transaction traces of the digital currency to ensure its legitimacy. The historical currency transaction record data includes details of the digital currency in all transactions in the past, such as when, in which transactions the digital currency was used, whether it has been completed by the transaction, whether there are double payment issues, and the like. By querying the historical transaction record of the digital currency, it is determined whether the currency to be transacted has been used and whether there are any anomalies, such as double payment or incomplete transactions, and the legitimacy and transparency of each transaction is ensured by the traceability of the historical record.
And thirdly, broadcasting the transaction encryption information to the blockchain network for transaction verification according to the historical currency transaction record data, generating transaction confirmation information, and updating the first transaction state based on the transaction confirmation information to obtain a second transaction state.
Specifically, the transaction encryption information is broadcast to all nodes in the blockchain network through the P2P network, and each node performs verification according to the transaction history record of the node after receiving the transaction encryption information and adds the transaction encryption information to the memory pool to prepare for participating in the next round of block verification. In the broadcasting process, historical transaction record data is combined, so that the validity and traceability of transaction information are ensured, and the problems of double payment and the like are prevented. Each node can generate a hash value according to the requirement of the consensus mechanism, and the network can verify the nodes according to the hash values, so that the correctness of the node behaviors and the consistency of the network are ensured. And after the verification is passed, generating transaction confirmation information. The transaction confirmation information is a flag that the transaction is approved by the blockchain network, indicating that the transaction has been validated and can be recorded in the blockchain. And by generating transaction confirmation information, confirming that the transaction is verified by a plurality of nodes in the network, and preventing invalid transactions from illegally entering the blockchain.
And updating the first transaction state of the transaction, namely updating the initial state of the transaction at the beginning of the transaction according to the generated transaction confirmation information. Based on the verification results received from the respective nodes, it is determined whether the nodes have reached a predetermined transaction state, the nodes that have reached the desired transaction state are selected, and their associated transaction data are added to the valid transaction data set. And eliminating nodes which do not reach the expected transaction state, triggering a corresponding state change instruction, updating the transaction state, updating the first transaction state to the second transaction state, and ensuring that the transaction state reflects the latest progress and result of the transaction. The second transaction state indicates that the transaction has been formally confirmed by verification. By means of automatic updating of the states and synchronous and tight combination of the states of the blockchain network, all nodes are guaranteed to have consistent transaction states, and the latest states of transactions are reflected timely.
And fourthly, carrying out transaction monitoring on the digital encryption currency information pair according to the second transaction state to generate transaction feedback data.
Specifically, according to the transaction life cycle, the digital encryption currency information is tracked according to the second transaction state, real-time monitoring is carried out on the digital encryption currency information, and time sequence information of transactions is obtained, wherein the time sequence information comprises data of each transaction at each time point in the life cycle, such as transaction initiation time, confirmation time, propagation time and the like. Traversing the digital encryption currency information pair, performing risk monitoring based on the transaction time sequence information, determining a plurality of risk factors in the transaction, such as transaction delay, network problems, double payment risks and the like, and generating corresponding risk data. According to the risk data, analyzing the fluidity of the digital encryption currency information pair, evaluating the flowing efficiency of funds and the circulation condition of the funds in the network, tracking the flow direction of the digital currency, monitoring the path of the funds in the blockchain network, identifying the transferring process of the funds from one node to the other node, constructing a flowing network diagram, and displaying the connection condition of the circulation path of the funds in the network and the nodes. The generated flow network diagram and the transaction risk data are added into transaction feedback data to form a complete feedback system, so that more comprehensive transaction feedback is provided, and detailed information of the transaction such as transaction time, participation nodes, potential problems in the execution process and the like are contained. And continuously monitoring the digital encryption currency information pair in the second transaction state to ensure smooth execution of the transaction and generate detailed transaction feedback data. The feedback data not only provides a complete transparent record of the transaction, but can also help identify and resolve potential transaction problems.
And fifthly, responding to the second transaction state according to the transaction feedback data, generating a transaction response result, executing a transaction management strategy based on the transaction response result, and performing intelligent circulation management on the transaction of the digital currency.
The risk analysis is carried out on the second transaction state according to transaction risk data in the transaction feedback data, risks possibly existing in the transaction are found in advance, and measures are taken to reduce or avoid influences of the risks on the transaction. And activating a scheduling mechanism by combining flow analysis and risk analysis results, selecting an optimal scheduling path, and avoiding nodes with high congestion or risk, thereby improving the execution efficiency and the safety of transactions. After the scheduling path is determined, control checking is carried out on the transaction execution on the path, so that whether the correctness and the execution condition of the transaction path meet expectations or not is ensured. Based on the verification result, a final transaction response result is generated indicating whether the transaction was successful or whether further adjustment is required.
And executing corresponding transaction management strategies according to the generated transaction response result, including readjusting a transaction path, confirming transaction success or triggering a fault processing flow and the like. And dynamically adjusting the management strategy according to different transaction response results, and executing intelligent transaction optimization. For example, switching to a standby path when a network delay is encountered, suspending the transaction flow and rechecking when an abnormal transaction is detected. By executing the transaction management strategy, intelligent circulation management of digital currency transaction is realized, the problems in the transaction process are automatically identified, the transaction execution path is optimized, high-efficiency and safe circulation of digital currency in a blockchain network is ensured, the transaction efficiency is improved, the risk in the transaction process is reduced, and funds can be circulated in the network in the fastest and safest mode. By analyzing the transaction feedback data, a transaction response result is generated, a corresponding transaction management strategy is executed, intelligent circulation management of digital currency transaction is realized, the high efficiency and the safety of the transaction process are ensured, and measures can be quickly taken to correct and optimize when problems are encountered.
Further, the first step of the present application includes:
Extracting to-be-processed transaction data based on a digital currency transaction pool, scanning to determine the to-be-transacted digital currency, traversing the to-be-transacted digital currency to perform data integrity verification to obtain transaction key field information, performing double payment detection according to the transaction key field information, performing state identification according to a detection result to generate the first transaction state, traversing the to-be-transacted digital currency to perform dynamic encryption according to the first transaction state to obtain a digital encryption currency information pair, traversing the to-be-transacted digital currency to perform dynamic encryption according to the transaction key field information to obtain transaction encryption information, associating the digital encryption currency information pair with the transaction encryption information to generate a key pair.
Specifically, all transaction data to be processed are extracted from the digital currency transaction pool, and preliminary scanning is performed to identify which digital currencies are to be transacted. The digital money transaction pool is a data set storing all records of transactions to be performed, including buyer and seller information, transaction amount, transaction currency type, etc. Traversing each piece of digital currency to be transacted, verifying the integrity of transaction data, and extracting transaction key field information. The purpose of data integrity verification is to ensure that the data (e.g., transaction amount, sender, receiver, etc.) in each transaction is complete, not tampered with, and meets the standards of the transaction protocol. Data integrity verification typically includes checking whether fields of the transaction are complete, whether the digital signature is valid, whether the transaction amount is correct, whether the identity of both parties to the transaction is correct, and the like. The transaction key field information typically includes a transaction ID, sender address, recipient address, transaction amount, digital currency type, transaction timestamp, etc.
And (3) performing double payment detection according to the extracted transaction key field information, so as to ensure that no transaction attempts to perform multiple payments by using the same digital currency. Dual payment detection is to check if the same digital currency is used for two or more transactions, which is an important security issue in digital currency transactions. And according to the result of the dual payment detection, carrying out state identification on each transaction, and identifying the validity and the processing progress of each transaction, such as validity, invalidity and waiting to be confirmed, wherein the validity, the validity and the current processing progress of the transaction are reflected. Legal transactions are identified as valid, illegal or transactions attempting dual payments are identified as invalid. And identifying the state of the transaction according to the detection result, and generating a first transaction state.
And dynamically encrypting legal digital currency to be transacted according to the first transaction state to generate a digital encryption currency information pair. Dynamic encryption is an encryption technology, and different encryption algorithms or keys are applied according to the specific state or attribute of a transaction, so that higher-level security can be provided, and encryption of each transaction is unique and the security of other transactions is not affected even if the encryption algorithm is cracked. The digital encryption currency information pair refers to digital currency transaction data subjected to dynamic encryption processing, and includes data of digital currency itself, such as a sender, a receiver, an amount, a time stamp and the like. The content data of the transaction itself is protected, and the security and confidentiality of both transaction parties and the amount information are ensured.
And dynamically encrypting the digital currency to be transacted according to the information of the transaction key field, namely encrypting the key information in the transaction, so as to ensure the integrity of transaction data. In contrast to digital cryptocurrency information pairs, transaction encryption information focuses on metadata encryption related to the transaction operation and process itself, such as transaction status, operation records, signatures, and the like. The state and the process of the transaction operation are protected, and the legality and the operation integrity of the transaction process are ensured. The generated digital encryption currency information pair is correlated with transaction encryption information, and the generated digital encryption currency information pair and the transaction encryption information are correlated together through a hash or correlation algorithm to ensure that each transaction has a unique encryption key pair, and a key pair for encrypting and decrypting transaction data is generated. In cryptography, a key pair is composed of two related keys, including a public key and a private key, used to encrypt and decrypt transaction data, ensuring the security and uniqueness of each transaction. The key pair here contains a digital encryption currency information pair and transaction encryption information, and contains core information (such as sender, receiver, transaction amount, time stamp, etc.) related to the transaction, and status information, transaction operation record, etc. related to the transaction execution flow. The problem that the same piece of digital currency is reused is effectively prevented through the double payment detection mechanism, and the encryption processing of the transaction key fields and the digital currency information ensures the privacy security of both parties of the transaction.
Further, the second step of the present application includes:
Analyzing the transaction key field information based on an application scene, generating a demand analysis result, carrying out fault-tolerant evaluation according to the demand analysis result, generating a fault-tolerant coefficient, integrating according to the fault-tolerant coefficient and the application scene, determining a consensus mechanism, carrying out network initialization based on a network protocol, generating network communication parameters, constructing a network architecture according to the network communication parameters, obtaining a network node list, carrying out node synchronous communication based on the network node list, determining a node structure, carrying out data deployment on the network node list and the consensus mechanism according to the node structure, and constructing the blockchain network.
Specifically, according to the specific application scenario of the digital currency transaction (financial transaction, logistics management, inter-equipment transaction of the internet of things, etc.), key field information (such as transaction amount, timestamp, sender/receiver address, etc.) related to the transaction is analyzed, and a demand analysis result for the specific application scenario is generated. The requirement analysis result refers to deriving requirements that the blockchain network needs to meet, such as performance requirements, security requirements, privacy protection requirements, and the like, according to a specific application scenario. According to the demand analysis result, the fault tolerance capability of the evaluation system is required to be possessed so as to cope with the situations of node failure, data error or network instability and the like. Fault tolerance assessment is a process of assessing the stability and reliability of a system in the face of error or abnormal conditions, taking into account the ability of the system to continue to operate when a problem arises. And generating a fault tolerance coefficient according to the fault tolerance evaluation result. The fault tolerance coefficient refers to a fault tolerance range allowed by the blockchain network when faults or errors occur, and reflects stability and reliability of the blockchain network when the blockchain network faces the faults or abnormal conditions.
And integrating according to the fault tolerance coefficient and the application scene, and selecting a proper consensus mechanism according to different fault tolerance requirements and scene requirements, so that the selected consensus mechanism can be matched with the evaluated fault tolerance, the safety of the network is ensured, and the high efficiency is maintained. The consensus mechanism is a key concept in blockchain technology, ensuring that all nodes in the network agree on transaction histories, including proof of work (PoW), proof of equity (PoS), proof of delegate equity (DPoS), etc.
Network initialization is performed according to a network protocol, i.e., a set of rules, standards, or conventions used for data exchange in a computer network. The network environment, including communication rules, data formats, node connections, etc., is configured according to a particular network protocol (e.g., TCP/IP, HTTP, webSocket, etc.), ensuring that data is properly transmitted and received in the network. Network communication parameters including IP address, port, connection timeout, transport encryption standard, etc. are generated according to the network protocol and configuration. And constructing a network architecture by using the generated network communication parameters, including setting network equipment such as servers, routers, switches and the like, and configuring a network topology (such as mesh). And acquiring node lists of all the participating networks according to the built network architecture, wherein the node lists comprise node information of all the participating blockchain networks. Synchronous communication among nodes is carried out through a network node list, wherein the synchronous communication refers to information exchange among all nodes in a network so as to ensure that all nodes have the same data copy. According to network requirements, performance, contribution and the like of the nodes, the node structure is determined, wherein the node structure comprises roles of the nodes (such as miner nodes, verification nodes, storage nodes, full nodes and the like), connection modes of the nodes (such as direct connection or connection through intermediate nodes) and geographic distribution of the nodes.
According to the node structure, the nodes in the network node list are configured into the blockchain network, each node is assigned specific roles and responsibilities, and corresponding data storage and processing are performed according to the roles. According to the deployed consensus mechanism, each node is ensured to participate in the consensus process of the blockchain network, and the data is verified through the consensus. A blockchain network with consistency, safety and fault tolerance is formed by binding the node list with a consensus mechanism. The block chain network which has the safety, fault tolerance and adaptation to specific application scenes and can process market transaction is constructed through the steps of analyzing transaction key field information, generating fault tolerance assessment, integrating a consensus mechanism, initializing a network, synchronizing nodes and the like.
Further, the third step of the present application includes:
The method comprises the steps of carrying out full-node coverage traversal on transaction encryption information combined with historical currency transaction record data based on the node structure to generate a broadcasting path, broadcasting the transaction encryption information to the blockchain network according to the broadcasting path to generate broadcasting transaction data, extracting a plurality of node hash values by combining the broadcasting transaction data through the consensus mechanism, carrying out multidimensional verification on a plurality of nodes based on the plurality of node hash values to generate a plurality of node verification results, and carrying out node verification according to the plurality of node verification results to obtain the transaction verification information.
Specifically, all nodes are traversed according to the structure of the nodes (such as the connection relation among the nodes and the network topology), and all nodes in the blockchain network are traversed by combining transaction encryption information and historical currency transaction record data. By traversing the full nodes, a most efficient broadcast path is determined, ensuring that transaction encryption information can be received by the full nodes in the shortest time. Transaction encryption information is broadcast to all nodes in a blockchain network over a point-to-point (P2P) network according to a broadcast path. After receiving the transaction encryption information, the full node stores the transaction encryption information into a memory pool to be used as data for participating in the next round of block verification. Hash values of a plurality of nodes are extracted from broadcast transaction data using a consensus mechanism. The hash value is a fixed-length string that is calculated from the transaction data of the node to uniquely identify the data.
And according to the hash values of the plurality of nodes, performing multidimensional verification on the plurality of nodes in the network, wherein the multidimensional verification comprises verification on the validity of transaction data, whether the node states are consistent, whether the nodes normally operate, and the like, so that the validity and consistency of transaction encryption information and node operation are ensured. And generating a verification result of each node in the verification process, wherein the verification result indicates whether the node passes verification successfully or not. Multidimensional validation refers to validating nodes from different angles and dimensions to ensure that the behavior and state of the nodes conform to network rules. And confirming the nodes according to the verification results of the plurality of nodes, wherein the state and the behavior of the nodes accord with network rules and standards.
When most nodes agree and acknowledge a transaction, a final transaction acknowledge message is generated, indicating that the transaction was acknowledged by the blockchain network. The transaction validation information typically includes a transaction hash, validation time, a list of validation nodes, etc., that are used to prove that the transaction has been validated and accepted by multiple nodes in the network. Through full node traversal and data broadcasting of nodes in the blockchain network, transaction encryption information can be guaranteed to be rapidly transmitted and received by the full nodes, a consensus mechanism extracts node hash values and performs multidimensional verification, the nodes are confirmed, transaction confirmation information is finally generated, consistency, safety and legality of the transaction encryption information in the distributed network are guaranteed, and efficiency and reliability of the blockchain network are improved.
Further, the application also comprises the following steps:
Judging whether the nodes reach an expected transaction state based on the verification results of the nodes, extracting nodes reaching the expected transaction state, adding the nodes to an effective transaction data set, carrying out transaction confirmation through the effective transaction data set to generate a first queue to be confirmed, extracting nodes not reaching the expected transaction state, adding the nodes to an invalid transaction data set, removing the nodes corresponding to the invalid transaction data set from the first queue to be confirmed to generate a second queue to be confirmed, triggering a state change instruction according to the second queue to be confirmed, updating the first transaction state according to a transaction life cycle through the state change instruction, and determining the second transaction state.
Specifically, according to the verification results of the nodes, the transaction states of the nodes are evaluated, and whether the nodes reach the expected transaction states is judged. The expected transaction state generally refers to a state that meets the requirements of the consensus mechanism, where the transaction data is legal and consistent, i.e., where the transaction is accepted and confirmed by most nodes in the network. The specific definition of the desired transaction state may vary among different blockchain networks, but generally involves approval of the transaction by a proportion of nodes. The nodes that have reached the desired transaction state are extracted from all nodes and the transaction data of these nodes are classified as a valid transaction data set. The valid transaction data set contains all nodes that have been validated and are ready for transaction validation. And carrying out transaction confirmation by utilizing the data in the effective transaction data set to obtain a first queue to be confirmed, wherein the first queue to be confirmed comprises all transactions which have passed the preliminary confirmation but are not confirmed finally.
For those nodes that fail to reach the desired transaction state, the data of those nodes are classified as invalid transaction data sets, and the data of those nodes may fail to pass the consensus verification due to illegal transactions, verification failure, or network problems. The corresponding nodes in the invalid transaction data set are removed from the first to-be-acknowledged queue, ensuring that transactions of the nodes are no longer involved in the acknowledgement process. After the invalid nodes are removed, a second queue to be confirmed is generated, and only the valid nodes are contained, so that the rest of transactions can be confirmed smoothly. The second to-be-confirmed queue is formed by valid transactions remaining in the first to-be-confirmed queue after the invalid transactions are removed. And triggering corresponding state change instructions according to the transaction information in the second queue to be confirmed to update the state of the transaction, wherein the instructions are usually sent out according to the consensus result, so that the transaction state is ensured to be correctly updated in different life cycle stages. The first transaction state is updated by the state change instruction, and the state of the transaction is automatically updated, so that the transaction flow can be automatically and smoothly carried out, the second transaction state is determined, and the fact that the transaction state reflects the latest progress and result of the transaction is ensured. And analyzing verification results of the nodes, extracting the nodes reaching the expected transaction state, classifying valid and invalid transaction data, and updating the transaction state according to the state change instruction. The process ensures the validity and consistency of the transaction in the blockchain network, realizes the automatic update of the state through the management of the transaction life cycle, finally generates the second transaction state, effectively solves the screening of invalid transaction data, the efficient processing of transaction confirmation and the automation of the state update, and improves the safety and the efficiency of the blockchain transaction.
Further, the fourth step of the present application includes:
The method comprises the steps of carrying out state synchronization on a blockchain network based on the second transaction state to generate block synchronization parameters, tracking the digital encryption currency information pair according to the transaction life cycle to carry out real-time transaction analysis to obtain transaction time sequence information, traversing the digital encryption currency information pair based on the transaction time sequence information to carry out risk monitoring to determine a plurality of transaction risk data, carrying out transaction liquidity analysis on the digital encryption currency information pair according to the transaction risk data, carrying out flow tracking according to an analysis result to construct a flow network diagram, and adding the flow network diagram and the transaction risk data to the transaction feedback data.
Specifically, according to the second transaction state, the second transaction state is synchronized to all nodes of the blockchain network, so that all nodes are ensured to have consistent transaction data, and the current blockchain state is updated. The block synchronization parameter refers to data for synchronizing each node in the blockchain network, including latest block information, transaction status, transaction timestamp, transaction hash, and the like. The state changes of the digital cryptocurrency information pair are tracked according to the life cycle of the transaction from occurrence to completion, including the initiation, verification, validation and final recording of the transaction on the blockchain. In the tracking process, the state changes of the digital encryption currency information pair and the influence of the changes on the whole transaction flow are analyzed in real time, and the time sequence information of the transaction is acquired, wherein the time sequence information comprises data of each transaction at each time point in the life cycle, such as transaction initiation time, confirmation time, propagation time and the like.
The digital cryptocurrency information pair is traversed using the transaction timing information to identify potential transaction risk. Risk monitoring may include detecting abnormal transaction patterns, high volume transactions, high frequency transactions, etc., which may be evidence of improper transaction behavior, identifying transactions that do not conform to conventional transaction patterns. A plurality of transaction risk data is determined based on the analysis, including a plurality of risk factors in the transaction, such as transaction delays, network problems, double payment risk, and the like. And analyzing the fluidity of the digital encryption currency information pair according to the generated transaction risk data, and evaluating the flowing efficiency of funds and the circulation condition of the funds in the network. According to liquidity analysis, indexes such as transaction amount, transaction frequency, currency residence time and the like are calculated, the execution efficiency of transactions, the circulation speed of funds and interaction between nodes are analyzed, and liquidity of the funds in the blockchain network is estimated. The flow of digital currency is tracked using the timing information and transaction history data, paths of funds in the blockchain network are monitored, and transfer of funds from one node to another node is identified.
And constructing a flow network diagram according to the tracked flow information, and displaying the connection condition of a circulation path and nodes of funds in the network. The network map can intuitively demonstrate the complexity and dynamics of the funds flow, helping users and regulatory authorities to better understand market conditions. And adding the generated flow network diagram and a plurality of transaction risk data into transaction feedback data, wherein the transaction feedback data comprises time sequence information, risk data, flow network diagram and the like of the transaction, so as to form a complete feedback system. The state synchronization of the blockchain network is carried out based on the second transaction state, the transaction time sequence information is tracked in real time, the transaction liquidity and risk are monitored, a flow network diagram is finally constructed, the information is incorporated into transaction feedback data, the safety, the transparency and the traceability of the transaction are improved, and the flow of funds in the blockchain network is effectively monitored.
Further, the fifth step of the present application comprises:
the method comprises the steps of carrying out flow analysis on a second transaction state based on the flow network diagram to generate a first analysis result, carrying out risk analysis on the second transaction state based on the transaction risk data to generate a second analysis result, activating a scheduling mechanism to carry out transaction scheduling according to the first analysis result and the second analysis result to generate a scheduling path, carrying out transaction control checking based on the scheduling path, and responding according to the checking result to generate a transaction response result.
In particular, the flow network graph represents interactions between flow paths and nodes of funds or digital cryptocurrency in a blockchain network, and by analyzing the flow network graph, the flow of funds in the network is visualized and understood, identifying high-flow nodes of transactions, primary flow of funds, and possible congestion points. And carrying out flow analysis on the second transaction state, analyzing the flow condition of the digital currency in the blockchain network, and evaluating the flow efficiency and the flow path of the digital currency. According to flow analysis, a first analysis result is obtained, wherein the first analysis result comprises the speed of fund flow, delay between nodes, congestion condition of a flow path and the like, and a basis is provided for the next transaction optimization.
And carrying out deep analysis on the second transaction state through a plurality of transaction risk data obtained by carrying out risk monitoring on the digital encrypted currency information, analyzing distribution, trend, correlation and the like of the risk data, identifying potential transaction risk and unstable factors, and obtaining a second analysis result, wherein the second analysis result comprises specific risk points, risk types, risk degrees, countermeasures and the like. And activating a scheduling mechanism by combining flow analysis and risk analysis results, and determining the priority and execution sequence of the transaction according to the fund flow condition and the risk level. Selecting an optimal scheduling path, rearranging execution paths for transactions, ensuring efficient funds flow, and avoiding nodes or links that may be at risk.
After the scheduling path is determined, control checking is carried out on the transaction execution on the path, so that whether the correctness and the execution condition of the transaction path meet expectations or not is ensured. The checking content may include the execution sequence of the transaction, the state of the transaction, the behavior of the transaction participants, etc., and the checking result is obtained by verifying whether the node works as expected, whether the funds flow meets the requirements, etc., including whether the path is smooth, whether a new risk or abnormal situation occurs, etc. Based on the verification result, a final transaction response result is generated indicating whether the transaction was successful or whether further adjustment is required. The transaction response results are feedback to the ping results, which may be transaction confirmation, transaction rejection, or triggering additional security measures. For example, if everything is normal, the transaction is confirmed to be successful, and if a problem occurs, a corresponding correction or alarm mechanism is triggered. And comprehensively evaluating the second transaction state through flow analysis and risk analysis, and optimizing a transaction execution path by combining a scheduling mechanism to ensure the liquidity and the safety of the transaction.
In summary, the circulation management method for digital currency transaction provided by the application has the following technical effects:
Traversing digital currency to be transacted for transaction identification to obtain a first transaction state, carrying out security encryption on the digital currency to be transacted based on the first transaction state to generate a key pair, wherein the key pair comprises a digital encryption currency information pair and transaction encryption information, constructing a blockchain network, synchronizing the digital currency to be transacted to the blockchain network for transaction inquiry to obtain historical currency transaction record data, broadcasting the transaction encryption information to the blockchain network for transaction verification according to the historical currency transaction record data to generate transaction confirmation information, updating the first transaction state based on the transaction confirmation information to obtain a second transaction state, carrying out transaction monitoring on the digital encryption currency information pair according to the second transaction state to generate transaction feedback data, responding to the second transaction state according to the transaction feedback data to generate a transaction response result, executing a transaction management strategy based on the transaction response result, and carrying out intelligent circulation management on the transaction of the digital currency. The method comprises the steps of determining the initial transaction state of the digital currency to be transacted by identifying the state of the digital currency to be transacted, conducting secure encryption on the digital currency, constructing a blockchain, synchronizing the digital currency to be transacted to the blockchain network for transaction inquiry, broadcasting encrypted transaction information to the blockchain network for verification, monitoring the state of the transaction in real time and generating feedback data, adjusting management strategies according to the real-time transaction conditions, reducing asset loss, realizing intelligent circulation management of the digital currency transaction, and improving the security of the digital currency circulation management.
In a second embodiment, based on the same inventive concept as the method for managing the circulation of digital money transactions in the foregoing embodiment, the present application further provides a system for managing the circulation of digital money transactions, referring to fig. 2, the system for managing the circulation of digital money transactions includes:
The transaction encryption module 11 is configured to traverse the digital currency to be transacted to perform transaction identification, obtain a first transaction state, perform secure encryption on the digital currency to be transacted based on the first transaction state, and generate a key pair, where the key pair includes a digital encryption currency information pair and transaction encryption information.
The transaction inquiry module 12 is used for constructing a blockchain network, synchronizing the digital currency to be transacted to the blockchain network for transaction inquiry, and obtaining historical currency transaction record data.
And the transaction verification module 13 is used for broadcasting the transaction encryption information to the blockchain network for transaction verification according to the historical currency transaction record data, generating transaction confirmation information, and updating the first transaction state based on the transaction confirmation information to obtain a second transaction state.
The transaction monitoring module 14 is configured to monitor the transaction of the digital cryptocurrency information pair according to the second transaction state, and generate transaction feedback data.
And the response management module 15 is used for responding to the second transaction state according to the transaction feedback data, generating a transaction response result, executing a transaction management strategy based on the transaction response result, and performing intelligent circulation management on the transactions of the digital currency.
Further, the transaction encryption module 11 in the circulation management system of digital money transactions is further configured to:
Extracting to-be-processed transaction data based on a digital currency transaction pool, scanning to determine the to-be-transacted digital currency, traversing the to-be-transacted digital currency to perform data integrity verification to obtain transaction key field information, performing double payment detection according to the transaction key field information, performing state identification according to a detection result to generate the first transaction state, traversing the to-be-transacted digital currency to perform dynamic encryption according to the first transaction state to obtain a digital encryption currency information pair, traversing the to-be-transacted digital currency to perform dynamic encryption according to the transaction key field information to obtain transaction encryption information, associating the digital encryption currency information pair with the transaction encryption information to generate a key pair.
Further, the transaction inquiry module 12 in the currency management system for digital money transactions is further configured to:
Analyzing the transaction key field information based on an application scene, generating a demand analysis result, carrying out fault-tolerant evaluation according to the demand analysis result, generating a fault-tolerant coefficient, integrating according to the fault-tolerant coefficient and the application scene, determining a consensus mechanism, carrying out network initialization based on a network protocol, generating network communication parameters, constructing a network architecture according to the network communication parameters, obtaining a network node list, carrying out node synchronous communication based on the network node list, determining a node structure, carrying out data deployment on the network node list and the consensus mechanism according to the node structure, and constructing the blockchain network.
Further, the transaction verification module 13 in the circulation management system of the digital money transaction is further configured to:
The method comprises the steps of carrying out full-node coverage traversal on transaction encryption information combined with historical currency transaction record data based on the node structure to generate a broadcasting path, broadcasting the transaction encryption information to the blockchain network according to the broadcasting path to generate broadcasting transaction data, extracting a plurality of node hash values by combining the broadcasting transaction data through the consensus mechanism, carrying out multidimensional verification on a plurality of nodes based on the plurality of node hash values to generate a plurality of node verification results, and carrying out node verification according to the plurality of node verification results to obtain the transaction verification information.
Further, the transaction verification module 13 in the circulation management system of the digital money transaction is further configured to:
Judging whether the nodes reach an expected transaction state based on the verification results of the nodes, extracting nodes reaching the expected transaction state, adding the nodes to an effective transaction data set, carrying out transaction confirmation through the effective transaction data set to generate a first queue to be confirmed, extracting nodes not reaching the expected transaction state, adding the nodes to an invalid transaction data set, removing the nodes corresponding to the invalid transaction data set from the first queue to be confirmed to generate a second queue to be confirmed, triggering a state change instruction according to the second queue to be confirmed, updating the first transaction state according to a transaction life cycle through the state change instruction, and determining the second transaction state.
Further, the transaction monitoring module 14 in the currency management system for digital money transactions is also configured to:
The method comprises the steps of carrying out state synchronization on a blockchain network based on the second transaction state to generate block synchronization parameters, tracking the digital encryption currency information pair according to the transaction life cycle to carry out real-time transaction analysis to obtain transaction time sequence information, traversing the digital encryption currency information pair based on the transaction time sequence information to carry out risk monitoring to determine a plurality of transaction risk data, carrying out transaction liquidity analysis on the digital encryption currency information pair according to the transaction risk data, carrying out flow tracking according to an analysis result to construct a flow network diagram, and adding the flow network diagram and the transaction risk data to the transaction feedback data.
Further, the response management module 15 in the flow management system of the digital money transaction is further configured to:
the method comprises the steps of carrying out flow analysis on a second transaction state based on the flow network diagram to generate a first analysis result, carrying out risk analysis on the second transaction state based on the transaction risk data to generate a second analysis result, activating a scheduling mechanism to carry out transaction scheduling according to the first analysis result and the second analysis result to generate a scheduling path, carrying out transaction control checking based on the scheduling path, and responding according to the checking result to generate a transaction response result.
In this specification, each embodiment is described in a progressive manner, and each embodiment focuses on the difference from other embodiments, and the foregoing method and specific example for managing the circulation of digital money transactions in the first embodiment of fig. 1 are equally applicable to the system for managing the circulation of digital money transactions in this embodiment, and by the foregoing detailed description of the method for managing the circulation of digital money transactions, those skilled in the art will be aware of the system for managing the circulation of digital money transactions in this embodiment, so that the description will not be repeated for brevity. For the system disclosed in the embodiment, since the system corresponds to the method disclosed in the embodiment, the description is simpler, and the relevant points refer to the description of the method section.
In a third embodiment, the present application provides a computer-readable storage medium having a computer program stored thereon, the computer program implementing the steps of the method for managing circulation of digital money transactions according to any one of the first embodiment when executed, based on the same inventive concept as the method for managing circulation of digital money transactions according to the first embodiment.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the present application and the equivalent techniques thereof, the present application is also intended to include such modifications and variations.