CN107493162A - The implementation method and device of block chain node - Google Patents
The implementation method and device of block chain node Download PDFInfo
- Publication number
- CN107493162A CN107493162A CN201710613402.2A CN201710613402A CN107493162A CN 107493162 A CN107493162 A CN 107493162A CN 201710613402 A CN201710613402 A CN 201710613402A CN 107493162 A CN107493162 A CN 107493162A
- Authority
- CN
- China
- Prior art keywords
- information
- client
- service end
- sent
- cryptographic hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Finance (AREA)
- Computer And Data Communications (AREA)
Abstract
The embodiment of the present invention provides a kind of implementation method and device of block chain node.This method includes:Service end receives random number, very first time stamp and the first cryptographic Hash that client is sent;Service end receives the encryption information that client is sent;Encryption information is decrypted using session key to obtain the first information and the second information;The first information and the second information are sent in peer-to-peer network.The embodiment of the present invention is signed Transaction Information by client, and the information after Transaction Information and signature is encrypted, and encryption information is sent to service end, encryption information is decrypted using session key to obtain Transaction Information for service end, and send transaction information in peer-to-peer network, improve the security of client so that intelligent mobile terminal can be used as block chain node, and improve personal information and the security of payment category information in intelligent mobile terminal.
Description
Technical field
The present embodiments relate to communication technical field, more particularly to a kind of implementation method and device of block chain node.
Background technology
Block chain is the new of the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, AES
Application model.Block chain technology is to be calculated using block linked data structure to verify with data storage, be known together using distributed node
Method ensures the safety of data transfer and access to generate and update the data, using the mode of cryptography, using by automatized script
Code composition intelligent contract come program and a kind of brand-new distributed basis framework of operation data with calculate normal form.
But user terminal such as intelligent mobile terminal can not be used as block chain node at present, because, intelligent mobile terminal
On be stored with userspersonal information and pay category information, if intelligent mobile terminal is regard as block chain node, easily to personal
Information and payment category information cause potential safety hazard.
The content of the invention
The embodiment of the present invention provides a kind of implementation method and device of block chain node, make it that intelligent mobile terminal can be with
As block chain node, and improve personal information and the security of payment category information in intelligent mobile terminal.
The one side of the embodiment of the present invention is to provide a kind of implementation method of block chain node, including:
Service end receives random number, very first time stamp and the first cryptographic Hash that client is sent;
The service end carries out Hash fortune to the password that logs in that the random number, the very first time stab and prestored
Calculate, obtain the second cryptographic Hash;
If first cryptographic Hash and second cryptographic Hash are equal, password is being logged in just described in the service end determination
Really;
The service end receives the encryption information that client is sent, and the encryption information is that the client is close using session
The information that key obtains after the first information and the second information are encrypted, the first information include:Transaction Information, the second time
Stamp and the 3rd cryptographic Hash, second information are that the client is carried out using the private key of block chain node to the first information
The information obtained after signature, the 3rd cryptographic Hash are to carry out Hash operation to the Transaction Information and second timestamp to obtain
The cryptographic Hash arrived;
The encryption information is decrypted using the session key to obtain the first information and institute for the service end
State the second information;
The first information and second information are sent in peer-to-peer network by the service end.
The other side of the embodiment of the present invention is to provide a kind of service end, including:
Receiving module, for receiving random number, very first time stamp and the first cryptographic Hash of client transmission;
Computing module, for carrying out Hash to the password that logs in that the random number, the very first time stab and prestored
Computing, obtain the second cryptographic Hash;
Determining module, if first cryptographic Hash and second cryptographic Hash are equal, described in the determining module determination
It is correct to log in password;
The receiving module is additionally operable to receive the encryption information that client is sent, and the encryption information is the client profit
The information obtained after the first information and the second information are encrypted with session key, the first information include:Transaction Information,
Second timestamp and the 3rd cryptographic Hash, second information are that the client utilizes the private key of block chain node to described first
The information that information obtains after being signed, the 3rd cryptographic Hash are that the Transaction Information and second timestamp are breathed out
The cryptographic Hash that uncommon computing obtains;
Deciphering module, for the encryption information is decrypted to obtain using the session key first information and
Second information;
Sending module, for the first information and second information to be sent in peer-to-peer network.
The implementation method and device of block chain node provided in an embodiment of the present invention, Transaction Information is carried out by client
Signature, and the information after Transaction Information and signature is encrypted, and encryption information is sent to service end, service end utilizes meeting
Words key pair encryption information is decrypted to obtain Transaction Information, and sends transaction information in peer-to-peer network, improves client
The security at end so that intelligent mobile terminal can be used as block chain node, and improve personal letter in intelligent mobile terminal
Breath and the security for paying category information.
Brief description of the drawings
Fig. 1 is the implementation method flow chart of block chain node provided in an embodiment of the present invention;
Fig. 2 is the implementation method flow chart for the block chain node that another embodiment of the present invention provides;
Fig. 3 is the structure chart of service end provided in an embodiment of the present invention;
Fig. 4 is the structure chart for the service end that another embodiment of the present invention provides.
Embodiment
Fig. 1 is the implementation method flow chart of block chain node provided in an embodiment of the present invention.The embodiments of the invention provide
The implementation method of block chain node, it is as follows that the method comprising the steps of:
Step S101, service end receives random number, very first time stamp and the first cryptographic Hash that client is sent.
In the present embodiment, user equipment is for example provided with the client of block chain on intelligent mobile terminal, and network side is set
The standby service end that consistently online is for example provided with server, client and service end can communicate.
Network side equipment such as server carries out the initialization of service end, and after the initialization, service end has following function:
1) peer-to-peer network (Peer to Peer, abbreviation P2P) is accessed.
2) transmission to be broadcast the message receives and processing.
3) acquisition of book keeping operation power is calculated and grabbed, and obtains corresponding reward (for example, the reward of ore deposit is dug in the absence from work without reason of bit coin).
4) account book is stored.
5) public key of memory block chain node.
Intelligent mobile terminal is downloaded and installs the client of block chain, after installing, starts the client, generates area
The public key and private key of block chain node.In the present embodiment, intelligent mobile terminal can be used as a block chain node.Intelligent mobile
The client for the block chain installed in terminal has following function:
1) initiation and confirmation of some transaction.
2) signature of electronic contract.
3) private key of memory block chain node.
The client of intelligent mobile terminal carries out interconnection first with the service end of network side equipment such as server and operated, visitor
Family end sets initialization entry password in service end, and uploads the public key of block chain node simultaneously to service end.Service end is received
To after entry password and public key, service end stores the entry password and public key, then replys successful information to client, represents
" shaking hands " success.
Client carries out Hash operation to entry password, random number, very first time stamp, obtains the first cryptographic Hash HASH1, so
Random number, very first time stamp and the first cryptographic Hash are sent to service end afterwards.
Step S102, the password that logs in that described service end was stabbed and prestored to the random number, the very first time enters
Row Hash operation, obtain the second cryptographic Hash.
Service end is verified to random number, very first time stamp and the first cryptographic Hash, specifically, during to random number, first
Between stab and prestore log in password carry out Hash operation, obtain the second cryptographic Hash HASH2.
If step S103, described first cryptographic Hash and second cryptographic Hash are equal, stepped on described in the service end determination
Land password is correct.
If HASH1=HASH2, prove the client to log in password correct, perform step S104, otherwise it is assumed that
The client is assault, records the MAC Address of other side, and discard processing is done in the message cut-off for the MAC Address later.
Step S104, described service end receives the encryption information that client is sent, and the encryption information is the client
The information obtained after the first information and the second information are encrypted using session key, the first information are included:Transaction letter
Breath, the second timestamp and the 3rd cryptographic Hash, second information are that the client utilizes the private key of block chain node to described
The information that the first information obtains after being signed, the 3rd cryptographic Hash are that the Transaction Information and second timestamp are entered
The cryptographic Hash that row Hash operation obtains.
When client actively initiates some transaction, client is required connect in network, and client is to the transaction
Physical contents signed with the private key of block chain node, specifically, using the private key of block chain node to Transaction Information,
Two timestamps and the 3rd cryptographic Hash are signed, and in the present embodiment, Transaction Information, the second timestamp and the 3rd cryptographic Hash are remembered
For the first information, Transaction Information, the second timestamp and the 3rd cryptographic Hash will sign using the private key of block chain node
To signing messages be designated as the second information, wherein, the 3rd cryptographic Hash is to the Transaction Information and second timestamp
Carry out the cryptographic Hash that Hash operation obtains.The first information and the second information are encrypted using session key for the client, are obtained
Service end is sent to encryption information, and by the encryption information.
Step S105, the encryption information is decrypted using the session key to obtain described first for described service end
Information and second information.
The first information and second information are sent in peer-to-peer network by step S106, described service end.
After service end receives encryption information, the encryption information is decrypted to obtain using the session key described
The first information and second information, that is, Transaction Information, the second timestamp and the 3rd cryptographic Hash are obtained, and utilize block chain link
The signing messages that the private key of point is signed to obtain to Transaction Information, the second timestamp and the 3rd cryptographic Hash.Service end will merchandise
Information, the second timestamp and the 3rd cryptographic Hash, and using block chain node private key to Transaction Information, the second timestamp and the
The signing messages that three cryptographic Hash are signed to obtain is sent in P2P networks, can be specifically broadcast in P2P networks.
In addition, when client need not initiate transaction, client and intelligent mobile terminal can keep offline
State, saves the battery and surfing flow of intelligent mobile terminal, and avoid simultaneously it is always in the state of easily by hacker
The safety problems such as attack.
Service end is always maintained at presence, grabs book keeping operation power in real time in a network, and obtains reward, and stores account
This etc..
The embodiment of the present invention is signed Transaction Information by client, and the information after Transaction Information and signature is entered
Row encryption, and encryption information is sent to service end, service end is decrypted to encryption information using session key and merchandised
Information, and send transaction information in peer-to-peer network, improve the security of client so that intelligent mobile terminal can be made
For block chain node, and improve personal information in intelligent mobile terminal and pay the security of category information.
Fig. 2 is the implementation method flow chart for the block chain node that another embodiment of the present invention provides.In above-described embodiment
On the basis of, the implementation method of block chain node provided in an embodiment of the present invention comprises the following steps that:
Step S201, described service end receives the public key for logging in password and the block chain node that client is sent.
The client of intelligent mobile terminal carries out interconnection first with the service end of network side equipment such as server and operated, visitor
Family end sets initialization entry password in service end, and uploads the public key of block chain node simultaneously to service end.Service end is received
To after entry password and public key, service end stores the entry password and public key, then replys successful information to client, represents
" shaking hands " success.
Step S202, service end receives random number, very first time stamp and the first cryptographic Hash that client is sent.
Step S202 is consistent with step S101, and here is omitted.
Step S203, the password that logs in that described service end was stabbed and prestored to the random number, the very first time enters
Row Hash operation, obtain the second cryptographic Hash.
Step S203 is consistent with step S102, and here is omitted.
If step S204, described first cryptographic Hash and second cryptographic Hash are equal, stepped on described in the service end determination
Land password is correct.
Step S204 is consistent with step S103, and here is omitted.
Step S205, described service end generation session key, and the session key is sent to the client.
Specifically, the service end utilizes the public key of the block chain node to the session key, and will encryption
Session key afterwards is sent to the client.
In the present embodiment, introducing the conduct of session key is:Prevent hacker from copying the IP address of client, substitute client
End sends false Transaction Information to service end.
Step S206, described service end receives the encryption information that client is sent, and the encryption information is the client
The information obtained after the first information and the second information are encrypted using session key, the first information are included:Transaction letter
Breath, the second timestamp and the 3rd cryptographic Hash, second information are that the client utilizes the private key of block chain node to described
The information that the first information obtains after being signed, the 3rd cryptographic Hash are that the Transaction Information and second timestamp are entered
The cryptographic Hash that row Hash operation obtains.
Step S206 is consistent with step S104, and here is omitted.
Step S207, the encryption information is decrypted using the session key to obtain described first for described service end
Information and second information.
Step S207 is consistent with step S105, and here is omitted.
The first information and second information are sent in peer-to-peer network by step S208, described service end.
Step S208 is consistent with step S106, and here is omitted.
Step S209, described service end receives the account book solicited message that client is sent.
The account book that the service end stores is sent to by step S210, described service end according to the account book solicited message
The client.
Optionally, when client active login service end and when inquiring about account book, account book is sent to client by service end, if
Actively account book is not inquired about at login service end to client yet, then service end does not send account book actively to client.Service end can be with
Perform the network agent responsibility of client.
In addition, client sends Transaction Information every time, service end is required for checking one is subprimal whether just to log in password
Really.That is, when Transaction Information needs issue every time, client is required to the Transaction Information being sent to service end, service
End needs to generate a session key for the Transaction Information, and each session key is different, avoid mass data it is accumulative after,
Key is guessed and forged by people.
Fig. 3 is the structure chart of service end provided in an embodiment of the present invention.Service end provided in an embodiment of the present invention can be held
The handling process that the implementation method embodiment of row block chain node provides, as shown in figure 3, service end 30 includes:Receiving module 31,
Computing module 32, determining module 33, deciphering module 34, sending module 35;Wherein, receiving module 31 is used to receive client transmission
Random number, the very first time stamp and the first cryptographic Hash;Computing module 32 to the random number, the very first time for stabbing and in advance
The password that logs in first stored carries out Hash operation, obtains the second cryptographic Hash;If first cryptographic Hash and second cryptographic Hash
It is equal, it is determined that it is correct to log in password described in the determination of module 33;Receiving module 31 is additionally operable to receive the encryption letter that client is sent
Breath, the encryption information is the letter obtained after the first information and the second information are encrypted using session key for the client
Breath, the first information include:Transaction Information, the second timestamp and the 3rd cryptographic Hash, second information are the clients
The information obtained after being signed using the private key of block chain node to the first information, the 3rd cryptographic Hash is to described
Transaction Information and second timestamp carry out the cryptographic Hash that Hash operation obtains;Deciphering module 34 is used for close using the session
The encryption information is decrypted to obtain the first information and second information for key;Sending module 35 is used for described the
One information and second information are sent in peer-to-peer network.
Service end provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-mentioned Fig. 1 is provided, tool
Here is omitted for body function.
The embodiment of the present invention is signed Transaction Information by client, and the information after Transaction Information and signature is entered
Row encryption, and encryption information is sent to service end, service end is decrypted to encryption information using session key and merchandised
Information, and send transaction information in peer-to-peer network, improve the security of client so that intelligent mobile terminal can be made
For block chain node, and improve personal information in intelligent mobile terminal and pay the security of category information.
Fig. 4 is the structure chart for the service end that another embodiment of the present invention provides.On the basis of above-described embodiment, service end
30 also include:Generation module 36, encrypting module 37;Generation module 36 is used to generate session key;Sending module 35 be additionally operable to by
The session key is sent to the client.
Encrypting module 37 is used for the public key using the block chain node to the session key;Sending module 35 has
Body is used to the session key after encryption being sent to the client.
In addition, receiving module 31 is additionally operable to:Receive the public key for logging in password and the block chain node that client is sent.
In addition, receiving module 31 is additionally operable to:Receive the account book solicited message that client is sent;Sending module 35 is additionally operable to:
According to the account book solicited message, the account book that the service end stores is sent to the client
Service end provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-mentioned Fig. 2 is provided, tool
Here is omitted for body function.
The embodiment of the present invention is signed Transaction Information by client, and the information after Transaction Information and signature is entered
Row encryption, and encryption information is sent to service end, service end is decrypted to encryption information using session key and merchandised
Information, and send transaction information in peer-to-peer network, improve the security of client so that intelligent mobile terminal can be made
For block chain node, and improve personal information in intelligent mobile terminal and pay the security of category information.
In summary, the embodiment of the present invention is signed Transaction Information by client, and by Transaction Information and signature
Information afterwards is encrypted, and encryption information is sent into service end, and service end is solved using session key to encryption information
It is close to obtain Transaction Information, and send transaction information in peer-to-peer network, improve the security of client so that intelligent mobile
Terminal can be used as block chain node, and improve personal information and the security of payment category information in intelligent mobile terminal.
In several embodiments provided by the present invention, it should be understood that disclosed apparatus and method, it can be passed through
Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only
Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be tied
Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed
Mutual coupling or direct-coupling or communication connection can be the INDIRECT COUPLINGs or logical by some interfaces, device or unit
Letter connection, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, can also be realized in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in one and computer-readable deposit
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are causing a computer
It is each that equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention
The part steps of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various
Can be with the medium of store program codes.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module
Division progress for example, in practical application, can be complete by different functional modules by above-mentioned function distribution as needed
Into the internal structure of device being divided into different functional modules, to complete all or part of function described above.On
The specific work process of the device of description is stated, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent
The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to
The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered
Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme.
Claims (10)
- A kind of 1. implementation method of block chain node, it is characterised in that including:Service end receives random number, very first time stamp and the first cryptographic Hash that client is sent;The service end carries out Hash operation to the password that logs in that the random number, the very first time stab and prestored, and obtains To the second cryptographic Hash;It is correct that password is logged in if first cryptographic Hash and second cryptographic Hash are equal, described in the service end determination;The service end receives the encryption information that client is sent, and the encryption information is that the client utilizes session key pair The information that the first information and the second information obtain after being encrypted, the first information include:Transaction Information, the second timestamp and 3rd cryptographic Hash, second information are that the client is signed using the private key of block chain node to the first information The information obtained afterwards, the 3rd cryptographic Hash carry out Hash operation to the Transaction Information and second timestamp and obtained Cryptographic Hash;The encryption information is decrypted using the session key to obtain the first information and described for the service end Two information;The first information and second information are sent in peer-to-peer network by the service end.
- 2. according to the method for claim 1, it is characterised in that the service end receive encryption information that client sends it Before, in addition to:The service end generates session key, and the session key is sent into the client.
- 3. according to the method for claim 2, it is characterised in that the service end generates session key, and by the session Key is sent to the client, including:The service end using the public key of the block chain node to the session key, and by the session key after encryption It is sent to the client.
- 4. according to the method described in claim any one of 1-3, it is characterised in that the service end receive that client sends with Before machine number, very first time stamp and the first cryptographic Hash, in addition to:The service end receives the public key for logging in password and the block chain node that client is sent.
- 5. according to the method for claim 4, it is characterised in that also include:The service end receives the account book solicited message that client is sent;The account book that the service end stores is sent to the client by the service end according to the account book solicited message.
- A kind of 6. service end, it is characterised in that including:Receiving module, for receiving random number, very first time stamp and the first cryptographic Hash of client transmission;Computing module, for carrying out Hash operation to the password that logs in that the random number, the very first time stab and prestored, Obtain the second cryptographic Hash;Determining module, if first cryptographic Hash and second cryptographic Hash are equal, logged in described in the determining module determination Password is correct;The receiving module is additionally operable to receive the encryption information that client is sent, and the encryption information is that the client utilizes meeting The information that words key obtains after the first information and the second information are encrypted, the first information include:Transaction Information, second Timestamp and the 3rd cryptographic Hash, second information are that the client utilizes the private key of block chain node to the first information The information obtained after being signed, the 3rd cryptographic Hash are to carry out Hash fortune to the Transaction Information and second timestamp Obtained cryptographic Hash;Deciphering module, for being decrypted to obtain the first information and described to the encryption information using the session key Second information;Sending module, for the first information and second information to be sent in peer-to-peer network.
- 7. service end according to claim 6, it is characterised in that also include:Generation module, for generating session key;The sending module is additionally operable to the session key being sent to the client.
- 8. service end according to claim 7, it is characterised in that also include:Encrypting module, for the public key using the block chain node to the session key;The sending module is specifically used for the session key after encryption being sent to the client.
- 9. according to the service end described in claim any one of 6-8, it is characterised in that the receiving module is additionally operable to:Receive the public key for logging in password and the block chain node that client is sent.
- 10. service end according to claim 9, it is characterised in that the receiving module is additionally operable to:Client is received to send Account book solicited message;The sending module is additionally operable to:According to the account book solicited message, the account book that the service end stores is sent to the client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710613402.2A CN107493162A (en) | 2017-07-25 | 2017-07-25 | The implementation method and device of block chain node |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710613402.2A CN107493162A (en) | 2017-07-25 | 2017-07-25 | The implementation method and device of block chain node |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107493162A true CN107493162A (en) | 2017-12-19 |
Family
ID=60644122
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710613402.2A Pending CN107493162A (en) | 2017-07-25 | 2017-07-25 | The implementation method and device of block chain node |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107493162A (en) |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108322558A (en) * | 2017-12-28 | 2018-07-24 | 北京欧链科技有限公司 | The method, apparatus and system of association address information |
CN108681965A (en) * | 2018-04-24 | 2018-10-19 | 全链通有限公司 | The block chain network transaction processing method and recipient's node of offline node |
CN108805719A (en) * | 2018-06-05 | 2018-11-13 | 上海豪沃金融信息服务有限公司 | A kind of risk control system of finance and money management product |
CN108848096A (en) * | 2018-06-25 | 2018-11-20 | 中国联合网络通信集团有限公司 | Handle method, apparatus, equipment and the computer readable storage medium of service contract |
CN108854077A (en) * | 2018-07-17 | 2018-11-23 | 广州瞪羚信息科技有限公司 | Across game item circulation method based on block chain technology |
CN108964982A (en) * | 2018-06-13 | 2018-12-07 | 众安信息技术服务有限公司 | For realizing the method, apparatus and storage medium of the deployment of the multinode of block chain |
CN109087111A (en) * | 2018-08-31 | 2018-12-25 | 深圳付贝科技有限公司 | Common recognition verification method, digging mine machine and block catenary system based on block chain |
CN109087105A (en) * | 2018-08-31 | 2018-12-25 | 深圳付贝科技有限公司 | For digging the Hash Search method of mine, digging mine machine and block catenary system |
CN109101241A (en) * | 2018-07-06 | 2018-12-28 | 深圳付贝科技有限公司 | A kind of block chain installation kit generation method and its device, electronic equipment |
CN109272315A (en) * | 2018-08-22 | 2019-01-25 | 杭州秘猿科技有限公司 | A kind of intelligent terminal, discrimination method and identification system for data interaction |
CN109286500A (en) * | 2018-09-30 | 2019-01-29 | 百度在线网络技术(北京)有限公司 | Vehicle Electronic Control Unit ECU authentication method, device and equipment |
CN110049067A (en) * | 2019-05-30 | 2019-07-23 | 全链通有限公司 | Transmission method, equipment and the computer readable storage medium of session key |
WO2019144400A1 (en) * | 2018-01-29 | 2019-08-01 | Waysun Technology Development Limited | A system and a method for use in data exchange |
WO2019157810A1 (en) * | 2018-02-13 | 2019-08-22 | 华为技术有限公司 | Data transmission method and device and network node |
CN110163004A (en) * | 2018-02-14 | 2019-08-23 | 华为技术有限公司 | A kind of method, relevant device and system that block chain generates |
CN110164022A (en) * | 2019-06-13 | 2019-08-23 | 北京艾摩瑞策科技有限公司 | A kind of random number of shaking method and its equipment on block chain |
CN110213047A (en) * | 2019-05-30 | 2019-09-06 | 全链通有限公司 | Transmission method, equipment and the computer readable storage medium of session key |
CN110310176A (en) * | 2019-06-26 | 2019-10-08 | 上海迪维欧电子设备有限公司 | A kind of data ciphering method and device based on block chain network |
CN110336779A (en) * | 2019-05-07 | 2019-10-15 | 弦子科技(北京)有限公司 | A kind of construction method, device and the electronic equipment of block chain |
CN110490640A (en) * | 2019-07-24 | 2019-11-22 | 阿里巴巴集团控股有限公司 | Method, apparatus and system for object distribution processor |
CN110602691A (en) * | 2019-10-18 | 2019-12-20 | 中国联合网络通信集团有限公司 | Mobile communication method and device based on block chain network |
CN110691131A (en) * | 2019-09-26 | 2020-01-14 | 北京笔新互联网科技有限公司 | Micro-service framework system based on intelligent mobile terminal |
CN110888933A (en) * | 2019-10-31 | 2020-03-17 | 支付宝(杭州)信息技术有限公司 | Information providing method, device and system and information acquisition method and device |
CN111047443A (en) * | 2019-11-29 | 2020-04-21 | 支付宝(杭州)信息技术有限公司 | User scoring method and device, electronic equipment and computer readable storage medium |
CN111160069A (en) * | 2018-11-07 | 2020-05-15 | 航天信息股份有限公司 | Living body detection method and device |
CN111210217A (en) * | 2020-01-02 | 2020-05-29 | 腾讯科技(深圳)有限公司 | Data processing method, device and storage medium |
CN111901335A (en) * | 2020-07-27 | 2020-11-06 | 浙江永旗区块链科技有限公司 | Block chain data transmission management method and system based on middle station |
CN112163171A (en) * | 2020-09-21 | 2021-01-01 | 中国电子科技网络信息安全有限公司 | Data chaining method based on terminal signature |
WO2021043067A1 (en) * | 2019-09-03 | 2021-03-11 | 深圳前海微众银行股份有限公司 | Blockchain-based data statistical method and device |
CN112562168A (en) * | 2020-11-27 | 2021-03-26 | 中国联合网络通信集团有限公司 | Block chain-based online shaking method, system, equipment and storage medium |
WO2021082315A1 (en) * | 2019-10-30 | 2021-05-06 | 北京海益同展信息科技有限公司 | Consensus method for blockchain, and consensus node, electronic device and storage medium |
CN113015989A (en) * | 2018-06-08 | 2021-06-22 | 通信安全集团公司 | Block chain supervision |
CN114531666A (en) * | 2022-01-28 | 2022-05-24 | 重庆邮电大学 | ZigBee-based wireless network indoor remote monitoring system and method |
US11501295B2 (en) | 2019-07-24 | 2022-11-15 | Advanced New Technologies Co., Ltd. | Object distribution processing |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357644A (en) * | 2016-09-21 | 2017-01-25 | 江苏通付盾科技有限公司 | Method, system and server for authenticating identities on basis of block chain networks |
CN106453271A (en) * | 2016-09-21 | 2017-02-22 | 江苏通付盾科技有限公司 | Identity registration method and system, identity authentication method and system |
CN106452785A (en) * | 2016-09-29 | 2017-02-22 | 财付通支付科技有限公司 | Block chain network, branch node and block chain network application method |
CN106453407A (en) * | 2016-11-23 | 2017-02-22 | 江苏通付盾科技有限公司 | Identity authentication method based on block chain, authentication server and user terminal |
CN106534160A (en) * | 2016-12-02 | 2017-03-22 | 江苏通付盾科技有限公司 | Identity authentication method and system based on block chain |
CN106533696A (en) * | 2016-11-18 | 2017-03-22 | 江苏通付盾科技有限公司 | Block chain-based identity authentication methods, authentication server and user terminal |
CN106779716A (en) * | 2016-11-21 | 2017-05-31 | 江苏通付盾科技有限公司 | Authentication method, apparatus and system based on block chain account address |
CN106789047A (en) * | 2017-03-03 | 2017-05-31 | 钱德君 | A kind of block chain identification system |
-
2017
- 2017-07-25 CN CN201710613402.2A patent/CN107493162A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357644A (en) * | 2016-09-21 | 2017-01-25 | 江苏通付盾科技有限公司 | Method, system and server for authenticating identities on basis of block chain networks |
CN106453271A (en) * | 2016-09-21 | 2017-02-22 | 江苏通付盾科技有限公司 | Identity registration method and system, identity authentication method and system |
CN106452785A (en) * | 2016-09-29 | 2017-02-22 | 财付通支付科技有限公司 | Block chain network, branch node and block chain network application method |
CN106533696A (en) * | 2016-11-18 | 2017-03-22 | 江苏通付盾科技有限公司 | Block chain-based identity authentication methods, authentication server and user terminal |
CN106779716A (en) * | 2016-11-21 | 2017-05-31 | 江苏通付盾科技有限公司 | Authentication method, apparatus and system based on block chain account address |
CN106453407A (en) * | 2016-11-23 | 2017-02-22 | 江苏通付盾科技有限公司 | Identity authentication method based on block chain, authentication server and user terminal |
CN106534160A (en) * | 2016-12-02 | 2017-03-22 | 江苏通付盾科技有限公司 | Identity authentication method and system based on block chain |
CN106789047A (en) * | 2017-03-03 | 2017-05-31 | 钱德君 | A kind of block chain identification system |
Cited By (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108322558A (en) * | 2017-12-28 | 2018-07-24 | 北京欧链科技有限公司 | The method, apparatus and system of association address information |
CN108322558B (en) * | 2017-12-28 | 2021-01-01 | 北京欧链科技有限公司 | Method, device and system for associating address information |
WO2019144400A1 (en) * | 2018-01-29 | 2019-08-01 | Waysun Technology Development Limited | A system and a method for use in data exchange |
WO2019157810A1 (en) * | 2018-02-13 | 2019-08-22 | 华为技术有限公司 | Data transmission method and device and network node |
CN110163004B (en) * | 2018-02-14 | 2023-02-03 | 华为技术有限公司 | Block chain generation method, related equipment and system |
US11902450B2 (en) | 2018-02-14 | 2024-02-13 | Huawei Technologies Co., Ltd. | Blockchain generation method and system, and related device |
CN110163004A (en) * | 2018-02-14 | 2019-08-23 | 华为技术有限公司 | A kind of method, relevant device and system that block chain generates |
CN108681965A (en) * | 2018-04-24 | 2018-10-19 | 全链通有限公司 | The block chain network transaction processing method and recipient's node of offline node |
CN108681965B (en) * | 2018-04-24 | 2021-01-29 | 全链通有限公司 | Block chain network transaction processing method and device for offline node |
CN108805719A (en) * | 2018-06-05 | 2018-11-13 | 上海豪沃金融信息服务有限公司 | A kind of risk control system of finance and money management product |
CN113015989A (en) * | 2018-06-08 | 2021-06-22 | 通信安全集团公司 | Block chain supervision |
CN108964982A (en) * | 2018-06-13 | 2018-12-07 | 众安信息技术服务有限公司 | For realizing the method, apparatus and storage medium of the deployment of the multinode of block chain |
CN108848096A (en) * | 2018-06-25 | 2018-11-20 | 中国联合网络通信集团有限公司 | Handle method, apparatus, equipment and the computer readable storage medium of service contract |
CN109101241A (en) * | 2018-07-06 | 2018-12-28 | 深圳付贝科技有限公司 | A kind of block chain installation kit generation method and its device, electronic equipment |
CN108854077B (en) * | 2018-07-17 | 2021-05-18 | 广州瞪羚信息科技有限公司 | Cross-game item circulation method based on block chain technology |
CN108854077A (en) * | 2018-07-17 | 2018-11-23 | 广州瞪羚信息科技有限公司 | Across game item circulation method based on block chain technology |
CN109272315A (en) * | 2018-08-22 | 2019-01-25 | 杭州秘猿科技有限公司 | A kind of intelligent terminal, discrimination method and identification system for data interaction |
CN109087105A (en) * | 2018-08-31 | 2018-12-25 | 深圳付贝科技有限公司 | For digging the Hash Search method of mine, digging mine machine and block catenary system |
CN109087111A (en) * | 2018-08-31 | 2018-12-25 | 深圳付贝科技有限公司 | Common recognition verification method, digging mine machine and block catenary system based on block chain |
CN109286500A (en) * | 2018-09-30 | 2019-01-29 | 百度在线网络技术(北京)有限公司 | Vehicle Electronic Control Unit ECU authentication method, device and equipment |
CN111160069A (en) * | 2018-11-07 | 2020-05-15 | 航天信息股份有限公司 | Living body detection method and device |
CN110336779B (en) * | 2019-05-07 | 2022-08-05 | 弦子科技(北京)有限公司 | Block chain construction method and device and electronic equipment |
CN110336779A (en) * | 2019-05-07 | 2019-10-15 | 弦子科技(北京)有限公司 | A kind of construction method, device and the electronic equipment of block chain |
CN110049067A (en) * | 2019-05-30 | 2019-07-23 | 全链通有限公司 | Transmission method, equipment and the computer readable storage medium of session key |
CN110049067B (en) * | 2019-05-30 | 2021-06-01 | 全链通有限公司 | Transmission method and device of session key and computer-readable storage medium |
CN110213047A (en) * | 2019-05-30 | 2019-09-06 | 全链通有限公司 | Transmission method, equipment and the computer readable storage medium of session key |
CN110164022A (en) * | 2019-06-13 | 2019-08-23 | 北京艾摩瑞策科技有限公司 | A kind of random number of shaking method and its equipment on block chain |
CN110310176A (en) * | 2019-06-26 | 2019-10-08 | 上海迪维欧电子设备有限公司 | A kind of data ciphering method and device based on block chain network |
CN110310176B (en) * | 2019-06-26 | 2022-07-08 | 上海迪维欧电子设备有限公司 | Data encryption method and device based on block chain network |
US11501295B2 (en) | 2019-07-24 | 2022-11-15 | Advanced New Technologies Co., Ltd. | Object distribution processing |
CN110490640B (en) * | 2019-07-24 | 2021-08-31 | 创新先进技术有限公司 | Method, device and system for object distribution processing |
CN110490640A (en) * | 2019-07-24 | 2019-11-22 | 阿里巴巴集团控股有限公司 | Method, apparatus and system for object distribution processor |
WO2021043067A1 (en) * | 2019-09-03 | 2021-03-11 | 深圳前海微众银行股份有限公司 | Blockchain-based data statistical method and device |
CN110691131A (en) * | 2019-09-26 | 2020-01-14 | 北京笔新互联网科技有限公司 | Micro-service framework system based on intelligent mobile terminal |
CN110602691A (en) * | 2019-10-18 | 2019-12-20 | 中国联合网络通信集团有限公司 | Mobile communication method and device based on block chain network |
CN110602691B (en) * | 2019-10-18 | 2022-07-22 | 中国联合网络通信集团有限公司 | Mobile communication method and device based on block chain network |
WO2021082315A1 (en) * | 2019-10-30 | 2021-05-06 | 北京海益同展信息科技有限公司 | Consensus method for blockchain, and consensus node, electronic device and storage medium |
CN110888933B (en) * | 2019-10-31 | 2021-08-20 | 支付宝(杭州)信息技术有限公司 | Information providing method, device and system and information acquisition method and device |
CN110888933A (en) * | 2019-10-31 | 2020-03-17 | 支付宝(杭州)信息技术有限公司 | Information providing method, device and system and information acquisition method and device |
CN111047443A (en) * | 2019-11-29 | 2020-04-21 | 支付宝(杭州)信息技术有限公司 | User scoring method and device, electronic equipment and computer readable storage medium |
CN111210217A (en) * | 2020-01-02 | 2020-05-29 | 腾讯科技(深圳)有限公司 | Data processing method, device and storage medium |
CN111901335A (en) * | 2020-07-27 | 2020-11-06 | 浙江永旗区块链科技有限公司 | Block chain data transmission management method and system based on middle station |
CN112163171B (en) * | 2020-09-21 | 2022-03-18 | 中国电子科技网络信息安全有限公司 | Data chaining method based on terminal signature |
CN112163171A (en) * | 2020-09-21 | 2021-01-01 | 中国电子科技网络信息安全有限公司 | Data chaining method based on terminal signature |
CN112562168A (en) * | 2020-11-27 | 2021-03-26 | 中国联合网络通信集团有限公司 | Block chain-based online shaking method, system, equipment and storage medium |
CN114531666A (en) * | 2022-01-28 | 2022-05-24 | 重庆邮电大学 | ZigBee-based wireless network indoor remote monitoring system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107493162A (en) | The implementation method and device of block chain node | |
CN107248994B (en) | Information sending method, processing method and device | |
CN107846282A (en) | A kind of electronic data distribution keeping method and system based on block chain technology | |
CN101197664B (en) | Method, system and device for key management protocol negotiation | |
EP4002181A1 (en) | A consensus method and framework for a blockchain system | |
US20060143453A1 (en) | Inter-authentication method and device | |
CN108243176B (en) | Data transmission method and device | |
CN109245993A (en) | Instant communication method and device based on block chain | |
CN107172074B (en) | Information sending method, processing method and device | |
CN109831527A (en) | Document handling method, user terminal, server and readable storage medium storing program for executing | |
CN107302438A (en) | A kind of private key protection method based on key updating, system and device | |
CN109413201A (en) | SSL traffic method, apparatus and storage medium | |
CN103503408A (en) | System and method for providing access credentials | |
CN103051647B (en) | Method, equipment and system that a kind of session realizes | |
CN106779716A (en) | Authentication method, apparatus and system based on block chain account address | |
CN110932854B (en) | Block chain key distribution system and method for Internet of things | |
CN107172001B (en) | Control method and device of website proxy server and key proxy server | |
CN113037499B (en) | Block chain encryption communication method and system | |
JP2018093434A (en) | Transaction management method, transaction management program and transaction management device | |
CN104009989A (en) | Link-stealing-prevention method and system for media files and server | |
CN105763318B (en) | A kind of wildcard obtains, distribution method and device | |
CN106817219B (en) | Method and device for negotiating session key | |
CN102684884B (en) | A kind of Portal Web server and the method preventing from forging the request of rolling off the production line thereof | |
CN104917807A (en) | Resource transfer method, apparatus and system | |
Recabarren et al. | Tithonus: A bitcoin based censorship resilient system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171219 |