CN107493162A - The implementation method and device of block chain node - Google Patents

The implementation method and device of block chain node Download PDF

Info

Publication number
CN107493162A
CN107493162A CN201710613402.2A CN201710613402A CN107493162A CN 107493162 A CN107493162 A CN 107493162A CN 201710613402 A CN201710613402 A CN 201710613402A CN 107493162 A CN107493162 A CN 107493162A
Authority
CN
China
Prior art keywords
information
client
service end
sent
cryptographic hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710613402.2A
Other languages
Chinese (zh)
Inventor
田新雪
马书惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201710613402.2A priority Critical patent/CN107493162A/en
Publication of CN107493162A publication Critical patent/CN107493162A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Finance (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the present invention provides a kind of implementation method and device of block chain node.This method includes:Service end receives random number, very first time stamp and the first cryptographic Hash that client is sent;Service end receives the encryption information that client is sent;Encryption information is decrypted using session key to obtain the first information and the second information;The first information and the second information are sent in peer-to-peer network.The embodiment of the present invention is signed Transaction Information by client, and the information after Transaction Information and signature is encrypted, and encryption information is sent to service end, encryption information is decrypted using session key to obtain Transaction Information for service end, and send transaction information in peer-to-peer network, improve the security of client so that intelligent mobile terminal can be used as block chain node, and improve personal information and the security of payment category information in intelligent mobile terminal.

Description

The implementation method and device of block chain node
Technical field
The present embodiments relate to communication technical field, more particularly to a kind of implementation method and device of block chain node.
Background technology
Block chain is the new of the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, AES Application model.Block chain technology is to be calculated using block linked data structure to verify with data storage, be known together using distributed node Method ensures the safety of data transfer and access to generate and update the data, using the mode of cryptography, using by automatized script Code composition intelligent contract come program and a kind of brand-new distributed basis framework of operation data with calculate normal form.
But user terminal such as intelligent mobile terminal can not be used as block chain node at present, because, intelligent mobile terminal On be stored with userspersonal information and pay category information, if intelligent mobile terminal is regard as block chain node, easily to personal Information and payment category information cause potential safety hazard.
The content of the invention
The embodiment of the present invention provides a kind of implementation method and device of block chain node, make it that intelligent mobile terminal can be with As block chain node, and improve personal information and the security of payment category information in intelligent mobile terminal.
The one side of the embodiment of the present invention is to provide a kind of implementation method of block chain node, including:
Service end receives random number, very first time stamp and the first cryptographic Hash that client is sent;
The service end carries out Hash fortune to the password that logs in that the random number, the very first time stab and prestored Calculate, obtain the second cryptographic Hash;
If first cryptographic Hash and second cryptographic Hash are equal, password is being logged in just described in the service end determination Really;
The service end receives the encryption information that client is sent, and the encryption information is that the client is close using session The information that key obtains after the first information and the second information are encrypted, the first information include:Transaction Information, the second time Stamp and the 3rd cryptographic Hash, second information are that the client is carried out using the private key of block chain node to the first information The information obtained after signature, the 3rd cryptographic Hash are to carry out Hash operation to the Transaction Information and second timestamp to obtain The cryptographic Hash arrived;
The encryption information is decrypted using the session key to obtain the first information and institute for the service end State the second information;
The first information and second information are sent in peer-to-peer network by the service end.
The other side of the embodiment of the present invention is to provide a kind of service end, including:
Receiving module, for receiving random number, very first time stamp and the first cryptographic Hash of client transmission;
Computing module, for carrying out Hash to the password that logs in that the random number, the very first time stab and prestored Computing, obtain the second cryptographic Hash;
Determining module, if first cryptographic Hash and second cryptographic Hash are equal, described in the determining module determination It is correct to log in password;
The receiving module is additionally operable to receive the encryption information that client is sent, and the encryption information is the client profit The information obtained after the first information and the second information are encrypted with session key, the first information include:Transaction Information, Second timestamp and the 3rd cryptographic Hash, second information are that the client utilizes the private key of block chain node to described first The information that information obtains after being signed, the 3rd cryptographic Hash are that the Transaction Information and second timestamp are breathed out The cryptographic Hash that uncommon computing obtains;
Deciphering module, for the encryption information is decrypted to obtain using the session key first information and Second information;
Sending module, for the first information and second information to be sent in peer-to-peer network.
The implementation method and device of block chain node provided in an embodiment of the present invention, Transaction Information is carried out by client Signature, and the information after Transaction Information and signature is encrypted, and encryption information is sent to service end, service end utilizes meeting Words key pair encryption information is decrypted to obtain Transaction Information, and sends transaction information in peer-to-peer network, improves client The security at end so that intelligent mobile terminal can be used as block chain node, and improve personal letter in intelligent mobile terminal Breath and the security for paying category information.
Brief description of the drawings
Fig. 1 is the implementation method flow chart of block chain node provided in an embodiment of the present invention;
Fig. 2 is the implementation method flow chart for the block chain node that another embodiment of the present invention provides;
Fig. 3 is the structure chart of service end provided in an embodiment of the present invention;
Fig. 4 is the structure chart for the service end that another embodiment of the present invention provides.
Embodiment
Fig. 1 is the implementation method flow chart of block chain node provided in an embodiment of the present invention.The embodiments of the invention provide The implementation method of block chain node, it is as follows that the method comprising the steps of:
Step S101, service end receives random number, very first time stamp and the first cryptographic Hash that client is sent.
In the present embodiment, user equipment is for example provided with the client of block chain on intelligent mobile terminal, and network side is set The standby service end that consistently online is for example provided with server, client and service end can communicate.
Network side equipment such as server carries out the initialization of service end, and after the initialization, service end has following function:
1) peer-to-peer network (Peer to Peer, abbreviation P2P) is accessed.
2) transmission to be broadcast the message receives and processing.
3) acquisition of book keeping operation power is calculated and grabbed, and obtains corresponding reward (for example, the reward of ore deposit is dug in the absence from work without reason of bit coin).
4) account book is stored.
5) public key of memory block chain node.
Intelligent mobile terminal is downloaded and installs the client of block chain, after installing, starts the client, generates area The public key and private key of block chain node.In the present embodiment, intelligent mobile terminal can be used as a block chain node.Intelligent mobile The client for the block chain installed in terminal has following function:
1) initiation and confirmation of some transaction.
2) signature of electronic contract.
3) private key of memory block chain node.
The client of intelligent mobile terminal carries out interconnection first with the service end of network side equipment such as server and operated, visitor Family end sets initialization entry password in service end, and uploads the public key of block chain node simultaneously to service end.Service end is received To after entry password and public key, service end stores the entry password and public key, then replys successful information to client, represents " shaking hands " success.
Client carries out Hash operation to entry password, random number, very first time stamp, obtains the first cryptographic Hash HASH1, so Random number, very first time stamp and the first cryptographic Hash are sent to service end afterwards.
Step S102, the password that logs in that described service end was stabbed and prestored to the random number, the very first time enters Row Hash operation, obtain the second cryptographic Hash.
Service end is verified to random number, very first time stamp and the first cryptographic Hash, specifically, during to random number, first Between stab and prestore log in password carry out Hash operation, obtain the second cryptographic Hash HASH2.
If step S103, described first cryptographic Hash and second cryptographic Hash are equal, stepped on described in the service end determination Land password is correct.
If HASH1=HASH2, prove the client to log in password correct, perform step S104, otherwise it is assumed that The client is assault, records the MAC Address of other side, and discard processing is done in the message cut-off for the MAC Address later.
Step S104, described service end receives the encryption information that client is sent, and the encryption information is the client The information obtained after the first information and the second information are encrypted using session key, the first information are included:Transaction letter Breath, the second timestamp and the 3rd cryptographic Hash, second information are that the client utilizes the private key of block chain node to described The information that the first information obtains after being signed, the 3rd cryptographic Hash are that the Transaction Information and second timestamp are entered The cryptographic Hash that row Hash operation obtains.
When client actively initiates some transaction, client is required connect in network, and client is to the transaction Physical contents signed with the private key of block chain node, specifically, using the private key of block chain node to Transaction Information, Two timestamps and the 3rd cryptographic Hash are signed, and in the present embodiment, Transaction Information, the second timestamp and the 3rd cryptographic Hash are remembered For the first information, Transaction Information, the second timestamp and the 3rd cryptographic Hash will sign using the private key of block chain node To signing messages be designated as the second information, wherein, the 3rd cryptographic Hash is to the Transaction Information and second timestamp Carry out the cryptographic Hash that Hash operation obtains.The first information and the second information are encrypted using session key for the client, are obtained Service end is sent to encryption information, and by the encryption information.
Step S105, the encryption information is decrypted using the session key to obtain described first for described service end Information and second information.
The first information and second information are sent in peer-to-peer network by step S106, described service end.
After service end receives encryption information, the encryption information is decrypted to obtain using the session key described The first information and second information, that is, Transaction Information, the second timestamp and the 3rd cryptographic Hash are obtained, and utilize block chain link The signing messages that the private key of point is signed to obtain to Transaction Information, the second timestamp and the 3rd cryptographic Hash.Service end will merchandise Information, the second timestamp and the 3rd cryptographic Hash, and using block chain node private key to Transaction Information, the second timestamp and the The signing messages that three cryptographic Hash are signed to obtain is sent in P2P networks, can be specifically broadcast in P2P networks.
In addition, when client need not initiate transaction, client and intelligent mobile terminal can keep offline State, saves the battery and surfing flow of intelligent mobile terminal, and avoid simultaneously it is always in the state of easily by hacker The safety problems such as attack.
Service end is always maintained at presence, grabs book keeping operation power in real time in a network, and obtains reward, and stores account This etc..
The embodiment of the present invention is signed Transaction Information by client, and the information after Transaction Information and signature is entered Row encryption, and encryption information is sent to service end, service end is decrypted to encryption information using session key and merchandised Information, and send transaction information in peer-to-peer network, improve the security of client so that intelligent mobile terminal can be made For block chain node, and improve personal information in intelligent mobile terminal and pay the security of category information.
Fig. 2 is the implementation method flow chart for the block chain node that another embodiment of the present invention provides.In above-described embodiment On the basis of, the implementation method of block chain node provided in an embodiment of the present invention comprises the following steps that:
Step S201, described service end receives the public key for logging in password and the block chain node that client is sent.
The client of intelligent mobile terminal carries out interconnection first with the service end of network side equipment such as server and operated, visitor Family end sets initialization entry password in service end, and uploads the public key of block chain node simultaneously to service end.Service end is received To after entry password and public key, service end stores the entry password and public key, then replys successful information to client, represents " shaking hands " success.
Step S202, service end receives random number, very first time stamp and the first cryptographic Hash that client is sent.
Step S202 is consistent with step S101, and here is omitted.
Step S203, the password that logs in that described service end was stabbed and prestored to the random number, the very first time enters Row Hash operation, obtain the second cryptographic Hash.
Step S203 is consistent with step S102, and here is omitted.
If step S204, described first cryptographic Hash and second cryptographic Hash are equal, stepped on described in the service end determination Land password is correct.
Step S204 is consistent with step S103, and here is omitted.
Step S205, described service end generation session key, and the session key is sent to the client.
Specifically, the service end utilizes the public key of the block chain node to the session key, and will encryption Session key afterwards is sent to the client.
In the present embodiment, introducing the conduct of session key is:Prevent hacker from copying the IP address of client, substitute client End sends false Transaction Information to service end.
Step S206, described service end receives the encryption information that client is sent, and the encryption information is the client The information obtained after the first information and the second information are encrypted using session key, the first information are included:Transaction letter Breath, the second timestamp and the 3rd cryptographic Hash, second information are that the client utilizes the private key of block chain node to described The information that the first information obtains after being signed, the 3rd cryptographic Hash are that the Transaction Information and second timestamp are entered The cryptographic Hash that row Hash operation obtains.
Step S206 is consistent with step S104, and here is omitted.
Step S207, the encryption information is decrypted using the session key to obtain described first for described service end Information and second information.
Step S207 is consistent with step S105, and here is omitted.
The first information and second information are sent in peer-to-peer network by step S208, described service end.
Step S208 is consistent with step S106, and here is omitted.
Step S209, described service end receives the account book solicited message that client is sent.
The account book that the service end stores is sent to by step S210, described service end according to the account book solicited message The client.
Optionally, when client active login service end and when inquiring about account book, account book is sent to client by service end, if Actively account book is not inquired about at login service end to client yet, then service end does not send account book actively to client.Service end can be with Perform the network agent responsibility of client.
In addition, client sends Transaction Information every time, service end is required for checking one is subprimal whether just to log in password Really.That is, when Transaction Information needs issue every time, client is required to the Transaction Information being sent to service end, service End needs to generate a session key for the Transaction Information, and each session key is different, avoid mass data it is accumulative after, Key is guessed and forged by people.
Fig. 3 is the structure chart of service end provided in an embodiment of the present invention.Service end provided in an embodiment of the present invention can be held The handling process that the implementation method embodiment of row block chain node provides, as shown in figure 3, service end 30 includes:Receiving module 31, Computing module 32, determining module 33, deciphering module 34, sending module 35;Wherein, receiving module 31 is used to receive client transmission Random number, the very first time stamp and the first cryptographic Hash;Computing module 32 to the random number, the very first time for stabbing and in advance The password that logs in first stored carries out Hash operation, obtains the second cryptographic Hash;If first cryptographic Hash and second cryptographic Hash It is equal, it is determined that it is correct to log in password described in the determination of module 33;Receiving module 31 is additionally operable to receive the encryption letter that client is sent Breath, the encryption information is the letter obtained after the first information and the second information are encrypted using session key for the client Breath, the first information include:Transaction Information, the second timestamp and the 3rd cryptographic Hash, second information are the clients The information obtained after being signed using the private key of block chain node to the first information, the 3rd cryptographic Hash is to described Transaction Information and second timestamp carry out the cryptographic Hash that Hash operation obtains;Deciphering module 34 is used for close using the session The encryption information is decrypted to obtain the first information and second information for key;Sending module 35 is used for described the One information and second information are sent in peer-to-peer network.
Service end provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-mentioned Fig. 1 is provided, tool Here is omitted for body function.
The embodiment of the present invention is signed Transaction Information by client, and the information after Transaction Information and signature is entered Row encryption, and encryption information is sent to service end, service end is decrypted to encryption information using session key and merchandised Information, and send transaction information in peer-to-peer network, improve the security of client so that intelligent mobile terminal can be made For block chain node, and improve personal information in intelligent mobile terminal and pay the security of category information.
Fig. 4 is the structure chart for the service end that another embodiment of the present invention provides.On the basis of above-described embodiment, service end 30 also include:Generation module 36, encrypting module 37;Generation module 36 is used to generate session key;Sending module 35 be additionally operable to by The session key is sent to the client.
Encrypting module 37 is used for the public key using the block chain node to the session key;Sending module 35 has Body is used to the session key after encryption being sent to the client.
In addition, receiving module 31 is additionally operable to:Receive the public key for logging in password and the block chain node that client is sent.
In addition, receiving module 31 is additionally operable to:Receive the account book solicited message that client is sent;Sending module 35 is additionally operable to: According to the account book solicited message, the account book that the service end stores is sent to the client
Service end provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-mentioned Fig. 2 is provided, tool Here is omitted for body function.
The embodiment of the present invention is signed Transaction Information by client, and the information after Transaction Information and signature is entered Row encryption, and encryption information is sent to service end, service end is decrypted to encryption information using session key and merchandised Information, and send transaction information in peer-to-peer network, improve the security of client so that intelligent mobile terminal can be made For block chain node, and improve personal information in intelligent mobile terminal and pay the security of category information.
In summary, the embodiment of the present invention is signed Transaction Information by client, and by Transaction Information and signature Information afterwards is encrypted, and encryption information is sent into service end, and service end is solved using session key to encryption information It is close to obtain Transaction Information, and send transaction information in peer-to-peer network, improve the security of client so that intelligent mobile Terminal can be used as block chain node, and improve personal information and the security of payment category information in intelligent mobile terminal.
In several embodiments provided by the present invention, it should be understood that disclosed apparatus and method, it can be passed through Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed Mutual coupling or direct-coupling or communication connection can be the INDIRECT COUPLINGs or logical by some interfaces, device or unit Letter connection, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, can also be realized in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in one and computer-readable deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are causing a computer It is each that equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention The part steps of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various Can be with the medium of store program codes.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module Division progress for example, in practical application, can be complete by different functional modules by above-mentioned function distribution as needed Into the internal structure of device being divided into different functional modules, to complete all or part of function described above.On The specific work process of the device of description is stated, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme.

Claims (10)

  1. A kind of 1. implementation method of block chain node, it is characterised in that including:
    Service end receives random number, very first time stamp and the first cryptographic Hash that client is sent;
    The service end carries out Hash operation to the password that logs in that the random number, the very first time stab and prestored, and obtains To the second cryptographic Hash;
    It is correct that password is logged in if first cryptographic Hash and second cryptographic Hash are equal, described in the service end determination;
    The service end receives the encryption information that client is sent, and the encryption information is that the client utilizes session key pair The information that the first information and the second information obtain after being encrypted, the first information include:Transaction Information, the second timestamp and 3rd cryptographic Hash, second information are that the client is signed using the private key of block chain node to the first information The information obtained afterwards, the 3rd cryptographic Hash carry out Hash operation to the Transaction Information and second timestamp and obtained Cryptographic Hash;
    The encryption information is decrypted using the session key to obtain the first information and described for the service end Two information;
    The first information and second information are sent in peer-to-peer network by the service end.
  2. 2. according to the method for claim 1, it is characterised in that the service end receive encryption information that client sends it Before, in addition to:
    The service end generates session key, and the session key is sent into the client.
  3. 3. according to the method for claim 2, it is characterised in that the service end generates session key, and by the session Key is sent to the client, including:
    The service end using the public key of the block chain node to the session key, and by the session key after encryption It is sent to the client.
  4. 4. according to the method described in claim any one of 1-3, it is characterised in that the service end receive that client sends with Before machine number, very first time stamp and the first cryptographic Hash, in addition to:
    The service end receives the public key for logging in password and the block chain node that client is sent.
  5. 5. according to the method for claim 4, it is characterised in that also include:
    The service end receives the account book solicited message that client is sent;
    The account book that the service end stores is sent to the client by the service end according to the account book solicited message.
  6. A kind of 6. service end, it is characterised in that including:
    Receiving module, for receiving random number, very first time stamp and the first cryptographic Hash of client transmission;
    Computing module, for carrying out Hash operation to the password that logs in that the random number, the very first time stab and prestored, Obtain the second cryptographic Hash;
    Determining module, if first cryptographic Hash and second cryptographic Hash are equal, logged in described in the determining module determination Password is correct;
    The receiving module is additionally operable to receive the encryption information that client is sent, and the encryption information is that the client utilizes meeting The information that words key obtains after the first information and the second information are encrypted, the first information include:Transaction Information, second Timestamp and the 3rd cryptographic Hash, second information are that the client utilizes the private key of block chain node to the first information The information obtained after being signed, the 3rd cryptographic Hash are to carry out Hash fortune to the Transaction Information and second timestamp Obtained cryptographic Hash;
    Deciphering module, for being decrypted to obtain the first information and described to the encryption information using the session key Second information;
    Sending module, for the first information and second information to be sent in peer-to-peer network.
  7. 7. service end according to claim 6, it is characterised in that also include:
    Generation module, for generating session key;
    The sending module is additionally operable to the session key being sent to the client.
  8. 8. service end according to claim 7, it is characterised in that also include:
    Encrypting module, for the public key using the block chain node to the session key;
    The sending module is specifically used for the session key after encryption being sent to the client.
  9. 9. according to the service end described in claim any one of 6-8, it is characterised in that the receiving module is additionally operable to:
    Receive the public key for logging in password and the block chain node that client is sent.
  10. 10. service end according to claim 9, it is characterised in that the receiving module is additionally operable to:Client is received to send Account book solicited message;
    The sending module is additionally operable to:
    According to the account book solicited message, the account book that the service end stores is sent to the client.
CN201710613402.2A 2017-07-25 2017-07-25 The implementation method and device of block chain node Pending CN107493162A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710613402.2A CN107493162A (en) 2017-07-25 2017-07-25 The implementation method and device of block chain node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710613402.2A CN107493162A (en) 2017-07-25 2017-07-25 The implementation method and device of block chain node

Publications (1)

Publication Number Publication Date
CN107493162A true CN107493162A (en) 2017-12-19

Family

ID=60644122

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710613402.2A Pending CN107493162A (en) 2017-07-25 2017-07-25 The implementation method and device of block chain node

Country Status (1)

Country Link
CN (1) CN107493162A (en)

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108322558A (en) * 2017-12-28 2018-07-24 北京欧链科技有限公司 The method, apparatus and system of association address information
CN108681965A (en) * 2018-04-24 2018-10-19 全链通有限公司 The block chain network transaction processing method and recipient's node of offline node
CN108805719A (en) * 2018-06-05 2018-11-13 上海豪沃金融信息服务有限公司 A kind of risk control system of finance and money management product
CN108848096A (en) * 2018-06-25 2018-11-20 中国联合网络通信集团有限公司 Handle method, apparatus, equipment and the computer readable storage medium of service contract
CN108854077A (en) * 2018-07-17 2018-11-23 广州瞪羚信息科技有限公司 Across game item circulation method based on block chain technology
CN108964982A (en) * 2018-06-13 2018-12-07 众安信息技术服务有限公司 For realizing the method, apparatus and storage medium of the deployment of the multinode of block chain
CN109087111A (en) * 2018-08-31 2018-12-25 深圳付贝科技有限公司 Common recognition verification method, digging mine machine and block catenary system based on block chain
CN109087105A (en) * 2018-08-31 2018-12-25 深圳付贝科技有限公司 For digging the Hash Search method of mine, digging mine machine and block catenary system
CN109101241A (en) * 2018-07-06 2018-12-28 深圳付贝科技有限公司 A kind of block chain installation kit generation method and its device, electronic equipment
CN109272315A (en) * 2018-08-22 2019-01-25 杭州秘猿科技有限公司 A kind of intelligent terminal, discrimination method and identification system for data interaction
CN109286500A (en) * 2018-09-30 2019-01-29 百度在线网络技术(北京)有限公司 Vehicle Electronic Control Unit ECU authentication method, device and equipment
CN110049067A (en) * 2019-05-30 2019-07-23 全链通有限公司 Transmission method, equipment and the computer readable storage medium of session key
WO2019144400A1 (en) * 2018-01-29 2019-08-01 Waysun Technology Development Limited A system and a method for use in data exchange
WO2019157810A1 (en) * 2018-02-13 2019-08-22 华为技术有限公司 Data transmission method and device and network node
CN110163004A (en) * 2018-02-14 2019-08-23 华为技术有限公司 A kind of method, relevant device and system that block chain generates
CN110164022A (en) * 2019-06-13 2019-08-23 北京艾摩瑞策科技有限公司 A kind of random number of shaking method and its equipment on block chain
CN110213047A (en) * 2019-05-30 2019-09-06 全链通有限公司 Transmission method, equipment and the computer readable storage medium of session key
CN110310176A (en) * 2019-06-26 2019-10-08 上海迪维欧电子设备有限公司 A kind of data ciphering method and device based on block chain network
CN110336779A (en) * 2019-05-07 2019-10-15 弦子科技(北京)有限公司 A kind of construction method, device and the electronic equipment of block chain
CN110490640A (en) * 2019-07-24 2019-11-22 阿里巴巴集团控股有限公司 Method, apparatus and system for object distribution processor
CN110602691A (en) * 2019-10-18 2019-12-20 中国联合网络通信集团有限公司 Mobile communication method and device based on block chain network
CN110691131A (en) * 2019-09-26 2020-01-14 北京笔新互联网科技有限公司 Micro-service framework system based on intelligent mobile terminal
CN110888933A (en) * 2019-10-31 2020-03-17 支付宝(杭州)信息技术有限公司 Information providing method, device and system and information acquisition method and device
CN111047443A (en) * 2019-11-29 2020-04-21 支付宝(杭州)信息技术有限公司 User scoring method and device, electronic equipment and computer readable storage medium
CN111160069A (en) * 2018-11-07 2020-05-15 航天信息股份有限公司 Living body detection method and device
CN111210217A (en) * 2020-01-02 2020-05-29 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
CN111901335A (en) * 2020-07-27 2020-11-06 浙江永旗区块链科技有限公司 Block chain data transmission management method and system based on middle station
CN112163171A (en) * 2020-09-21 2021-01-01 中国电子科技网络信息安全有限公司 Data chaining method based on terminal signature
WO2021043067A1 (en) * 2019-09-03 2021-03-11 深圳前海微众银行股份有限公司 Blockchain-based data statistical method and device
CN112562168A (en) * 2020-11-27 2021-03-26 中国联合网络通信集团有限公司 Block chain-based online shaking method, system, equipment and storage medium
WO2021082315A1 (en) * 2019-10-30 2021-05-06 北京海益同展信息科技有限公司 Consensus method for blockchain, and consensus node, electronic device and storage medium
CN113015989A (en) * 2018-06-08 2021-06-22 通信安全集团公司 Block chain supervision
CN114531666A (en) * 2022-01-28 2022-05-24 重庆邮电大学 ZigBee-based wireless network indoor remote monitoring system and method
US11501295B2 (en) 2019-07-24 2022-11-15 Advanced New Technologies Co., Ltd. Object distribution processing

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357644A (en) * 2016-09-21 2017-01-25 江苏通付盾科技有限公司 Method, system and server for authenticating identities on basis of block chain networks
CN106453271A (en) * 2016-09-21 2017-02-22 江苏通付盾科技有限公司 Identity registration method and system, identity authentication method and system
CN106452785A (en) * 2016-09-29 2017-02-22 财付通支付科技有限公司 Block chain network, branch node and block chain network application method
CN106453407A (en) * 2016-11-23 2017-02-22 江苏通付盾科技有限公司 Identity authentication method based on block chain, authentication server and user terminal
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain
CN106533696A (en) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 Block chain-based identity authentication methods, authentication server and user terminal
CN106779716A (en) * 2016-11-21 2017-05-31 江苏通付盾科技有限公司 Authentication method, apparatus and system based on block chain account address
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357644A (en) * 2016-09-21 2017-01-25 江苏通付盾科技有限公司 Method, system and server for authenticating identities on basis of block chain networks
CN106453271A (en) * 2016-09-21 2017-02-22 江苏通付盾科技有限公司 Identity registration method and system, identity authentication method and system
CN106452785A (en) * 2016-09-29 2017-02-22 财付通支付科技有限公司 Block chain network, branch node and block chain network application method
CN106533696A (en) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 Block chain-based identity authentication methods, authentication server and user terminal
CN106779716A (en) * 2016-11-21 2017-05-31 江苏通付盾科技有限公司 Authentication method, apparatus and system based on block chain account address
CN106453407A (en) * 2016-11-23 2017-02-22 江苏通付盾科技有限公司 Identity authentication method based on block chain, authentication server and user terminal
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108322558A (en) * 2017-12-28 2018-07-24 北京欧链科技有限公司 The method, apparatus and system of association address information
CN108322558B (en) * 2017-12-28 2021-01-01 北京欧链科技有限公司 Method, device and system for associating address information
WO2019144400A1 (en) * 2018-01-29 2019-08-01 Waysun Technology Development Limited A system and a method for use in data exchange
WO2019157810A1 (en) * 2018-02-13 2019-08-22 华为技术有限公司 Data transmission method and device and network node
CN110163004B (en) * 2018-02-14 2023-02-03 华为技术有限公司 Block chain generation method, related equipment and system
US11902450B2 (en) 2018-02-14 2024-02-13 Huawei Technologies Co., Ltd. Blockchain generation method and system, and related device
CN110163004A (en) * 2018-02-14 2019-08-23 华为技术有限公司 A kind of method, relevant device and system that block chain generates
CN108681965A (en) * 2018-04-24 2018-10-19 全链通有限公司 The block chain network transaction processing method and recipient's node of offline node
CN108681965B (en) * 2018-04-24 2021-01-29 全链通有限公司 Block chain network transaction processing method and device for offline node
CN108805719A (en) * 2018-06-05 2018-11-13 上海豪沃金融信息服务有限公司 A kind of risk control system of finance and money management product
CN113015989A (en) * 2018-06-08 2021-06-22 通信安全集团公司 Block chain supervision
CN108964982A (en) * 2018-06-13 2018-12-07 众安信息技术服务有限公司 For realizing the method, apparatus and storage medium of the deployment of the multinode of block chain
CN108848096A (en) * 2018-06-25 2018-11-20 中国联合网络通信集团有限公司 Handle method, apparatus, equipment and the computer readable storage medium of service contract
CN109101241A (en) * 2018-07-06 2018-12-28 深圳付贝科技有限公司 A kind of block chain installation kit generation method and its device, electronic equipment
CN108854077B (en) * 2018-07-17 2021-05-18 广州瞪羚信息科技有限公司 Cross-game item circulation method based on block chain technology
CN108854077A (en) * 2018-07-17 2018-11-23 广州瞪羚信息科技有限公司 Across game item circulation method based on block chain technology
CN109272315A (en) * 2018-08-22 2019-01-25 杭州秘猿科技有限公司 A kind of intelligent terminal, discrimination method and identification system for data interaction
CN109087105A (en) * 2018-08-31 2018-12-25 深圳付贝科技有限公司 For digging the Hash Search method of mine, digging mine machine and block catenary system
CN109087111A (en) * 2018-08-31 2018-12-25 深圳付贝科技有限公司 Common recognition verification method, digging mine machine and block catenary system based on block chain
CN109286500A (en) * 2018-09-30 2019-01-29 百度在线网络技术(北京)有限公司 Vehicle Electronic Control Unit ECU authentication method, device and equipment
CN111160069A (en) * 2018-11-07 2020-05-15 航天信息股份有限公司 Living body detection method and device
CN110336779B (en) * 2019-05-07 2022-08-05 弦子科技(北京)有限公司 Block chain construction method and device and electronic equipment
CN110336779A (en) * 2019-05-07 2019-10-15 弦子科技(北京)有限公司 A kind of construction method, device and the electronic equipment of block chain
CN110049067A (en) * 2019-05-30 2019-07-23 全链通有限公司 Transmission method, equipment and the computer readable storage medium of session key
CN110049067B (en) * 2019-05-30 2021-06-01 全链通有限公司 Transmission method and device of session key and computer-readable storage medium
CN110213047A (en) * 2019-05-30 2019-09-06 全链通有限公司 Transmission method, equipment and the computer readable storage medium of session key
CN110164022A (en) * 2019-06-13 2019-08-23 北京艾摩瑞策科技有限公司 A kind of random number of shaking method and its equipment on block chain
CN110310176A (en) * 2019-06-26 2019-10-08 上海迪维欧电子设备有限公司 A kind of data ciphering method and device based on block chain network
CN110310176B (en) * 2019-06-26 2022-07-08 上海迪维欧电子设备有限公司 Data encryption method and device based on block chain network
US11501295B2 (en) 2019-07-24 2022-11-15 Advanced New Technologies Co., Ltd. Object distribution processing
CN110490640B (en) * 2019-07-24 2021-08-31 创新先进技术有限公司 Method, device and system for object distribution processing
CN110490640A (en) * 2019-07-24 2019-11-22 阿里巴巴集团控股有限公司 Method, apparatus and system for object distribution processor
WO2021043067A1 (en) * 2019-09-03 2021-03-11 深圳前海微众银行股份有限公司 Blockchain-based data statistical method and device
CN110691131A (en) * 2019-09-26 2020-01-14 北京笔新互联网科技有限公司 Micro-service framework system based on intelligent mobile terminal
CN110602691A (en) * 2019-10-18 2019-12-20 中国联合网络通信集团有限公司 Mobile communication method and device based on block chain network
CN110602691B (en) * 2019-10-18 2022-07-22 中国联合网络通信集团有限公司 Mobile communication method and device based on block chain network
WO2021082315A1 (en) * 2019-10-30 2021-05-06 北京海益同展信息科技有限公司 Consensus method for blockchain, and consensus node, electronic device and storage medium
CN110888933B (en) * 2019-10-31 2021-08-20 支付宝(杭州)信息技术有限公司 Information providing method, device and system and information acquisition method and device
CN110888933A (en) * 2019-10-31 2020-03-17 支付宝(杭州)信息技术有限公司 Information providing method, device and system and information acquisition method and device
CN111047443A (en) * 2019-11-29 2020-04-21 支付宝(杭州)信息技术有限公司 User scoring method and device, electronic equipment and computer readable storage medium
CN111210217A (en) * 2020-01-02 2020-05-29 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
CN111901335A (en) * 2020-07-27 2020-11-06 浙江永旗区块链科技有限公司 Block chain data transmission management method and system based on middle station
CN112163171B (en) * 2020-09-21 2022-03-18 中国电子科技网络信息安全有限公司 Data chaining method based on terminal signature
CN112163171A (en) * 2020-09-21 2021-01-01 中国电子科技网络信息安全有限公司 Data chaining method based on terminal signature
CN112562168A (en) * 2020-11-27 2021-03-26 中国联合网络通信集团有限公司 Block chain-based online shaking method, system, equipment and storage medium
CN114531666A (en) * 2022-01-28 2022-05-24 重庆邮电大学 ZigBee-based wireless network indoor remote monitoring system and method

Similar Documents

Publication Publication Date Title
CN107493162A (en) The implementation method and device of block chain node
CN107248994B (en) Information sending method, processing method and device
CN107846282A (en) A kind of electronic data distribution keeping method and system based on block chain technology
CN101197664B (en) Method, system and device for key management protocol negotiation
EP4002181A1 (en) A consensus method and framework for a blockchain system
US20060143453A1 (en) Inter-authentication method and device
CN108243176B (en) Data transmission method and device
CN109245993A (en) Instant communication method and device based on block chain
CN107172074B (en) Information sending method, processing method and device
CN109831527A (en) Document handling method, user terminal, server and readable storage medium storing program for executing
CN107302438A (en) A kind of private key protection method based on key updating, system and device
CN109413201A (en) SSL traffic method, apparatus and storage medium
CN103503408A (en) System and method for providing access credentials
CN103051647B (en) Method, equipment and system that a kind of session realizes
CN106779716A (en) Authentication method, apparatus and system based on block chain account address
CN110932854B (en) Block chain key distribution system and method for Internet of things
CN107172001B (en) Control method and device of website proxy server and key proxy server
CN113037499B (en) Block chain encryption communication method and system
JP2018093434A (en) Transaction management method, transaction management program and transaction management device
CN104009989A (en) Link-stealing-prevention method and system for media files and server
CN105763318B (en) A kind of wildcard obtains, distribution method and device
CN106817219B (en) Method and device for negotiating session key
CN102684884B (en) A kind of Portal Web server and the method preventing from forging the request of rolling off the production line thereof
CN104917807A (en) Resource transfer method, apparatus and system
Recabarren et al. Tithonus: A bitcoin based censorship resilient system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171219