CN108009807A - A kind of bit coin transaction identity method - Google Patents

A kind of bit coin transaction identity method Download PDF

Info

Publication number
CN108009807A
CN108009807A CN201710965814.2A CN201710965814A CN108009807A CN 108009807 A CN108009807 A CN 108009807A CN 201710965814 A CN201710965814 A CN 201710965814A CN 108009807 A CN108009807 A CN 108009807A
Authority
CN
China
Prior art keywords
node
transaction
bit coin
monitored
mfrac
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710965814.2A
Other languages
Chinese (zh)
Inventor
毛洪亮
王秀文
吴震
李焱余
徐小磊
唐积强
马秀娟
张露晨
苏沐冉
李传海
高峰
沈蒙
祝烈煌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Technology BIT
National Computer Network and Information Security Management Center
Original Assignee
Beijing Institute of Technology BIT
National Computer Network and Information Security Management Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Technology BIT, National Computer Network and Information Security Management Center filed Critical Beijing Institute of Technology BIT
Priority to CN201710965814.2A priority Critical patent/CN108009807A/en
Publication of CN108009807A publication Critical patent/CN108009807A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Tourism & Hospitality (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention provides a kind of bit coin transaction identity method, comprises the following steps:Deployment connects the probe node of node as much as possible in bit coin network;Select the node to be monitored in bit coin network;The neighbor node of the node to be monitored is determined by probe node;Monitor and obtain bit coin network transaction information and transaction propagation path;Calculate transaction propagation path and node to be monitored and its matching value of neighbor node;The match trading of node to be monitored is filtered out by threshold value;Export the match trading and assign its IP label.By to the transaction of bit coin and the matching identification of dealer's IP address, identifying the identity of dealer, not only there is higher recognition accuracy, and be greatly reduced compared with prior art expense.

Description

A kind of bit coin transaction identity method
Technical field
The present invention relates to information technology and security technology area, more particularly to specific identity to identify, and in particular to a kind of ratio Special coin transaction identity method.
Background technology
Bit coin is a kind of digital cash of decentralization, is issued currency not against particular organization, also not against specific machine Structure O&M bit coin system.Anyone can directly be traded on any computer with other people, it is not necessary to which third party carries out Intermediary.Thus, there is no the Centroid that one possesses all subscriber identity informations.In addition, bit coin both parties use than Special coin address claims as identity generation, and bit coin address is voluntarily created by user, unrelated with identity information.Therefore, although Bit coin Transaction Information is disclosed, but User Identity information cannot be directly found from Transaction Information.
For such case, generally real name supposition can be carried out by following several schemes at present:
Scheme one:By collecting the data of the bit coin service provider such as bit coin exchange by bit coin address real name.Though Right bit coin is decentralization in itself, but some bit coin service providers are run by the way of centralization, such as bit coin Exchange, supports shop of bit coin etc..These bit coin service providers store some bits coin user's in the service of offer Identity information.For example, bit coin exchange provides the service that digital cash is exchanged with real money, it will usually stores the ratio of user Special coin address, mailbox message, cellphone information, bank card account, or even the identity informations such as identity card can be stored.Therefore bit coin clothes Being engaged in business can be by bit coin address and corresponding subscriber identity information matching.
The program is disadvantageous in that:
Cost is larger, it is necessary to policy support and multi-party resource.
It is related to Privacy Protection, user may select not providing the bit coin service provider of data.Such as bit overseas Coin exchange.
Accuracy rate is low, and user can use the real name effect of this scheme of a variety of methods reduction.Such as user will record Regard real name address in the bit coin address of bit coin service provider, really merchandised without using real name address, but New anonymous address is created to be traded.When needing transfer fund using some mixed coin methods, reduce real name address and hide Incidence relation between name address.
Scheme two:The transaction feature of bit coin address is found by analyzing Transaction Information disclosed in bit coin, in conjunction with it Information speculates the subscriber identity information of bit coin address behind under his line.All transaction of bit coin are stored in global account book In, anyone can download and safeguard a global account book.By analyzing the Transaction Information recorded in global account book, Ke Yifa The transaction rule of existing specific bit coin address, and the transaction relationship between other addresses.It can be reduced based on these information The anonymity of bit coin address, help is provided for the identity information of presumptive address.
The program has the drawback that:
Accuracy rate is low.User can use the real name effect of this scheme of a variety of methods reduction.For example, user can adopt With disposable the address Policy, transaction every time uses different addresses, this speculates the difficulty of particular address transaction rule by dramatically increasing Degree;User can also use mixed coin service to hide funds flow, reduce the incidence relation between different address.
Scheme three:A kind of Chinese invention patent application " block chain tracing side of Application No. 201510955506.2 In method ", inventors herein propose a kind of built according to block chain address and take in spanning tree and expenditure spanning tree, tracing is treated in discovery The method of the assets transfer historical record of address., can not be right but this method can only find the incidence relation between different address The transaction of bit coin carries out effective identity.
Scheme four:Probe is inserted into bit coin network, connects all bit coin servers, collects the transaction propagated in network Information, it is believed that the node for transmitting Transaction Information to tat probe node at first is the origination node of Transaction Information.Find the beginning of transaction The anonymous bit coin address in transaction and dealer's real IP address can be matched by sending out node.
There is also some defects for the program:
Cost is larger, and bit coin server node is numerous, and all nodes keep connection need larger computing resource and The communication resource.
Accuracy rate is low.First, probe node can not necessarily capture the Transaction Information of origination node forwarding;Secondly, originate The Transaction Information of node forwarding may be subject to the interference such as network delay to lag behind other nodes in repeating process.
To sum up, bit coin existing at present transaction identity recognizing technology is undesirable, and there is an urgent need for a kind of effective in the industry Bit coin transaction identity method.
The content of the invention
In view of the foregoing, the object of the present invention is to provide a kind of bit coin transaction identity method, by bit The matching identification that coin is merchandised with dealer's IP address, identifies the identity of dealer, not only has higher recognition accuracy, and It is greatly reduced compared with prior art expense.
To achieve the above object, the technical solution taken of the present invention is:
A kind of bit coin transaction identity method, comprises the following steps:
Deployment connects the probe node of node as much as possible in bit coin network;
Select the node to be monitored in bit coin network;
The neighbor node of the node to be monitored is determined by probe node;
Monitor and obtain bit coin network transaction information and transaction propagation path;
Calculate transaction propagation path and node to be monitored and its matching value of neighbor node;
The match trading of node to be monitored is filtered out by threshold value;
Export the match trading and assign its IP label.
Further, the probe node is the server for being mounted with probe program, its to designated bit coin service Device, which is established, connects and collects the Transaction Information in bit coin network.
The probe program is realizing the node discovery mechanism and transaction acceptance interface in bit coin agreement;To perform Collect online bit coin server ip information and establish and connect with designated bit coin server, bit is collected according to bit coin agreement The operation for the Transaction Information propagated in coin network.
Further, it is described to select node to be monitored and include:Select the server of certain digital cash exchange to be used as to wait to supervise Node is surveyed, or the data collected according to probe node select suspect node as node to be monitored.
Further, the data selection suspect node collected according to probe node includes as node to be monitored:According to spy Pin knot point operationally collects the information of all line server nodes in bit coin network, selects certain node IP sections specific to make For suspect node, the thus IP sections of information for creating the transaction of bit coin is then collected.
Further, the neighbor node is included in bit coin network and node to be monitored is separated by the 1 rank neighbour of 1 hop distance Occupy the 2 rank neighbor nodes that node is separated by 2 hop distances, and class is pushed into the n rank neighbor nodes that are separated by n hop distances.
Further, it is described to speculate that the neighbor node of the node to be monitored includes by probe node:
The controllable node of deployment installation bit coin client-side program, to create the transaction of bit coin;
Single-point is established by controllable node and node to be monitored to connect and repeatedly create transaction;
The propagation path of the transaction is collected by probe node, to forward the node of the transaction earliest as to be monitored The neighbor node of node.
Further, monitor and obtain bit coin network transaction information and transaction propagation path includes:
By 1 rank of probe node connection node to be monitored and node to be monitored to n rank neighbor nodes;
Probe node passively receives the Transaction Information of each node forwarding, records the source IP addresses of each Transaction Information And arrival time;
By the Transaction Information collected according to transaction Hash classification, and to every a kind of transaction according to transaction to tat probe when Between be ranked up and then the transaction being made of the neighbor node of node to be monitored and node to be monitored selected according to IP and pass Broadcast path.
Further, the transaction propagation path is 10 tuples, including [TXID, Rt, R1, R2, R3, R4, R5, R6, R7, R8];Wherein, TXID represents transaction Hash, and Rt represents destination node and forwards this time-sequencing .R1-R8 to merchandise to represent 8 outputs The sequence of node.
Further, it is described to calculate transaction propagation path with the matching value of node to be monitored and its neighbor node according to as follows Formula:
Wherein, Goal represents matching value, and value range is (0,1) .Rt, and R1-R8 refers to the defeated of destination node and destination node The sequence of egress.
Further, the threshold value is determined as follows:
Single-point is established by controllable node and node to be monitored to connect and repeatedly send transaction;Then searched according to probe node The data of collection and the matching value for calculating such transaction, using the average value of the matching value of such transaction as threshold value.
Further, the match trading that node to be monitored is filtered out by threshold value includes;
The matching value for the All Activity collected to probe node travels through, and the transaction that matching value is exceeded to threshold value is regarded as Belong to the match trading of node to be monitored.
By taking above-mentioned technical proposal, the present invention directly by Transaction Information and can create the IP address matching merchandised, With higher mark accuracy rate.Currently existing scheme is missed using the identity information of the relation presumptive address between the transaction of bit coin Difference is higher, and user can use the increase of a variety of methods to speculate difficulty, such as disposable the address Policy.The present invention passes through tracking Bit coin is merchandised in the propagation path of network layer, can directly find the IP address for the server for creating transaction.According to IP address Assigning identity has higher accuracy rate, and can avoid the interference of disposable the address Policy.
The resource that the identity method of the present invention relies on is less.Compared with prior art, the present invention need not collect transaction Wait the data of other bit coin service providers, it is only necessary to dispose a certain number of probes in bit coin network, you can analysis ratio Special coin transaction, identity is assigned for transaction;Compared with prior art, required number of probes of the invention is less, to bit coin The influence of network is smaller.In background technology scheme four only with origination node as Rule of judgment, it is therefore desirable to whole bits Coin node, which carries out substantial amounts of connection, could obtain higher accuracy rate.Present invention introduces neighbor node as further decision condition, More preferable marking effect can be realized using a small amount of probe, therefore the present invention realizes that required cost is relatively low.
The identity method of the present invention can to most of server node in bit coin network (including domestic node and Node overseas) it is monitored, and different server nodes can be directed to different matching thresholds is set, difference can be suitable for The server node of network state, the scope of application are more extensive.
Brief description of the drawings
Fig. 1 is the system architecture diagram that bit coin transaction identity method is realized in one embodiment of the invention.
Fig. 2 disposes schematic diagram for one embodiment of the invention interior joint.
Embodiment
Operation principle:
The major technique of the present invention is contemplated that:After bit coin node initiates transaction, Transaction Information can be transmitted to first certainly Oneself neighbor node, afterwards neighbor node continue to be transmitted to the neighbor node of itself, and so on, until Transaction Information is spread all over Whole network.Obviously, initiate transaction node transmitted transaction time it is earliest, neighbor node takes second place, other nodes are delayed successively. If by arranging that probe node can be kept connecting with Servers-all node, for a transaction, probe node can be with This Transaction Information is received from different nodes successively, in the case of without considering network delay, it is believed that first forwarding is handed over The node that easy information reaches probe node is origination node of merchandising.The present invention realizes bit coin transaction body based on above-mentioned principle Part mark.
Server node quantity is about 9350 (data on October 13rd, 2017) in bit coin network, for all clothes The real-time flow analysis needs of device node progress be engaged in compared with multiple resource.The purpose of the present invention is for some specific suspect nodes into Row monitoring, then filters out the transaction originated by suspect node, so as to these from a large amount of transaction of bit coin Internet communication Transaction assigns the IP information of suspect node.In the working environment of some conditions permits, it can be expanded by increasing server resource Big monitoring scale, i.e., carry out parallel monitoring to substantial amounts of suspect node at the same time.
Fig. 1 illustrates the system architecture diagram being monitored for specific suspect node.Node to be monitored in figure refer to by The suspect node selected.
Suspect node is selected in accordance with general demand and custom, such as selects the server of certain digital cash exchange to make For suspect node.
In addition, the data that suspect node can also be collected according to probe node select.Probe node can operationally be collected The information of all line server nodes in bit coin network, including (IP information, geographical location information, affiliated organizational information Deng), can be selected according to these information can be with node.For example, certain node IP sections specific can be selected as suspect node, so The thus IP sections of information for creating the transaction of bit coin is collected afterwards.
Neighbor node refers in bit coin network and the selected suspect node as node to be monitored is separated by 1 hop distance Node (transaction that node i.e. to be monitored creates can be transmitted directly to neighbor node), correspondingly, will be separated by the node of 2 hop distances (node that the transaction that node i.e. to be monitored creates is got to by 1 intermediate node) is known as 2 rank neighbor nodes, with such Push away, by the node for being separated by n hop distances (node that the transaction that node i.e. to be monitored creates is got to by n-1 intermediate node) It is defined as n rank neighbor nodes.
Probe node is the server for being mounted with probe program, by probe node deployment to bit coin network, for collecting Transaction Information in bit coin network.Probe program realizes node discovery mechanism in bit coin agreement and transaction acceptance connects Mouthful, online bit coin server ip information can be collected and establish and connect with designated bit coin server, can be according to bit coin Agreement collects the Transaction Information propagated in bit coin network.
Fig. 1 is engaged, the principle realized to the transaction ID method of the present invention further expands explanation.
First, node to be monitored will be broadcast to left side first to the 1 rank neighbor node transmitted transaction information of oneself, information 1 rank neighbor node and probe node.Secondly, 1 rank node of left side continues 1 rank neighbor node (the 2 of node i.e. to be monitored to oneself Rank neighbor node) transmitted transaction.This time, probe node will receive same Transaction Information from the 1 rank neighbor node in left side, show So, the time of node transmitted transaction to tat probe node to be monitored is more early, the arrival of the 1 rank neighbor node transmitted transaction in left side Time is later.The forwarding situation of other nodes is similar.Therefore, in the ideal case, for every transaction, probe node energy Enough receive the Transaction Information of n version, the time-sequencing of the Transaction Information of different editions to tat probe node and neighbor node Order is identical.I.e. order is bigger, then time-sequencing is more rearward.
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Whole description.
The present invention is based on above-mentioned operation principle, can be doubtful for being filtered out in any attachable bit coin network node Originate transaction.So as to be identified to bit coin transaction identity, specific process flow is as follows:
1) node to be monitored is selected.
I.e. selected suspect node, and using the IP of suspect node as node to be monitored.Suspect node is collected according to work above The mode for making to introduce in principle carries out.It can be obtained by being scanned on line with the various ways such as acquisition under line.For example select certain The server of digital cash exchange is as suspect node, or the data collected also according to probe node select, for example selects Then certain node IP sections specific collects the bit coin transaction that thus IP sections of servers create as suspect node.
2) neighbor node is speculated.
Deduce the neighbor node of node to be monitored.Neighbor node as introduce above in bit coin network and treat The node that monitoring node logically connects.Node to be monitored collects information by neighbor node from bit coin network, also leads to Cross neighbor node and send information to bit coin network, the neighbor node for speculatively finding node to be monitored helps to improve mark Know accuracy rate.
This step speculates the neighbor node of node to be monitored using active sniff method:First with controllable node ( Server is controlled, bit coin client-side program is installed in the server of deployment, can be used for creating the transaction of bit coin) and it is to be monitored Node establishes single-point and connects and repeatedly create transaction, the propagation path of such transaction is then collected using probe node, thus it is speculated that most Early forward neighbor node of the node that these are merchandised as node to be monitored.Merchandised according to bit coin and forward rule, neighbor node Such Transaction Information will be forwarded first, therefore, the neighbor node of node to be monitored can be deduced using active sniff algorithm.It is logical Repeatedly test is crossed, the precision for speculating neighbor node can be significantly improved.
Controllable node in Fig. 2 is the controllable server disposed, and is mounted with bit coin client-side program, can be used for creating Build the transaction of bit coin.
Node to be monitored is by using " the connect ip in bit coin agreement:Port " is instructed, and controllable node can be with Node to be monitored establishes single-point connection (i.e. controllable node only have node to be monitored this 1 neighbor node).When using controllable node When sending transaction, transaction will be simply sent to node to be monitored, and then node to be monitored gives transmitted transaction first to the neighbours of oneself Node.Therefore, the propagation path of such transaction is collected by using probe, can be by the node of transmitted transaction first to tat probe It is speculated as neighbor node.Under normal conditions, controllable node only needs to speculate neighbor node (i.e. 1 rank neighbor node), 2 ranks to n ranks Neighbor node is served only for description network topology.
3) Transaction Information is monitored.
Monitor method is as shown in Figure 1,1 rank that node to be monitored and node to be monitored are connected using probe node is adjacent to n ranks Occupy node.Then, probe node passively receives the Transaction Information of each node forwarding, records the source IP of each Transaction Information Address and arrival time.
Probe node reaches the Transaction Information collected according to transaction Hash classification, and to every a kind of transaction according to transaction The time of probe is ranked up and then is selected according to IP and is made of the neighbor node of node to be monitored and node to be monitored Transaction propagation path.Transaction propagation path is 10 tuples, including [TXID, Rt, R1, R2, R3, R4, R5, R6, R7, R8]。
Wherein, TXID represents transaction Hash, and Rt represents destination node and forwards this time-sequencing .R1-R8 to merchandise to represent 8 The sequence of output node.For example, when the Transaction Information first of destination node forwarding arrives tat probe node, then Rt=1. is when collection To transaction in do not find output node forwarding transaction when, set ranking value as MAX, represent infinity.
4) matching value is calculated.
Matching value reflects transaction propagation path and the goodness of fit matching values of target node network topology are higher, transaction letter Breath is more likely to be to be originated by destination node.Match value calculating method as shown in formula (1)
Goal refers to matching value, and value range is (0,1) .Rt, and R1-R8 refers to the output node of destination node and destination node Sequence.
5) selected threshold value.
Threshold value be for judge transaction whether the matching value with IP node matchings to be monitored, calculated when according to step 4) Matching value when being more than threshold value, that is, think that the IP of this transaction and node to be monitored is matched, otherwise mismatch.
Selecting for matching value can equally use active sniff method to obtain, the method and the active sniff side in step 2 Method is similar, i.e., establishes single-point by controllable node and node to be monitored and connect and repeatedly send and merchandise.Then according to probe section The data that point is collected calculate the matching value of such transaction using step 4), using the average value of the matching value of such transaction as threshold Value.
6) export match trading and assign IP labels.
According to the threshold value selected, the matching value for the All Activity collected to probe travels through, and matching value exceedes threshold value Transaction will be considered to belong to the match trading of node to be monitored.System will export all match tradings, and be assigned for these transaction Give IP labels.So as to fulfill transaction identity.
Obviously, described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without making creative work Example, belongs to the scope of protection of the invention.

Claims (10)

  1. A kind of identity method 1. bit coin is merchandised, comprises the following steps:
    Deployment connects the probe node of node as much as possible in bit coin network;
    Select the node to be monitored in bit coin network;
    The neighbor node of the node to be monitored is determined by probe node;
    Monitor and obtain bit coin network transaction information and transaction propagation path;
    Calculate transaction propagation path and node to be monitored and its matching value of neighbor node;
    The match trading of node to be monitored is filtered out by threshold value;
    Export the match trading and assign its IP label.
  2. The identity method 2. bit coin as claimed in claim 1 is merchandised, it is characterised in that the probe node is to be mounted with The server of probe program, it connects and collects the letter of the transaction in bit coin network to be established with designated bit coin server Breath.The probe program is realizing the node discovery mechanism and transaction acceptance interface in bit coin agreement;To perform collection Online bit coin server ip information is simultaneously established and connected with designated bit coin server, and bit coin net is collected according to bit coin agreement The operation for the Transaction Information propagated in network;
    It is described to select node to be monitored and include:The server of certain digital cash exchange is selected as node to be monitored, Huo Zhegen The data collected according to probe node select suspect node as node to be monitored.
  3. The identity method 3. bit coin as claimed in claim 1 is merchandised, it is characterised in that the number collected according to probe node Include according to selection suspect node as node to be monitored:Operationally collected according to probe node all online in bit coin network The information of server node, selects certain node IP sections specific then to collect thus IP sections of establishment bit coin as suspect node The information of transaction.
  4. The identity method 4. bit coin as claimed in claim 1 is merchandised, it is characterised in that the neighbor node is included in ratio The 1 rank neighbor node for being separated by 1 hop distance in special coin network with node to be monitored is separated by 2 rank neighbor nodes of 2 hop distances, and class It is pushed into the n rank neighbor nodes for being separated by n hop distances.
  5. The identity method 5. bit coin as claimed in claim 4 is merchandised, it is characterised in that described to be speculated by probe node The neighbor node of the node to be monitored includes:
    The controllable node of deployment installation bit coin client-side program, to create the transaction of bit coin;
    Single-point is established by controllable node and node to be monitored to connect and repeatedly create transaction;
    The propagation path of the transaction is collected by probe node, the node to forward the transaction earliest is used as node to be monitored Neighbor node.
  6. The identity method 6. bit coin as claimed in claim 4 is merchandised, it is characterised in that monitor and obtain bit coin network Transaction Information and transaction propagation path include:
    By 1 rank of probe node connection node to be monitored and node to be monitored to n rank neighbor nodes;
    Probe node passively receives the Transaction Information of each node forwarding, records the source IP addresses of each Transaction Information and arrives Up to the time;By the Transaction Information collected according to transaction Hash classification, and to every a kind of transaction according to transaction to tat probe when Between be ranked up and then the transaction being made of the neighbor node of node to be monitored and node to be monitored selected according to IP and pass Broadcast path.
  7. The identity method 7. bit coin as claimed in claim 6 is merchandised, it is characterised in that the transaction propagation path is 10 Tuple, including [TXID, Rt, R1, R2, R3, R4, R5, R6, R7, R8];Wherein, TXID represents transaction Hash, and Rt represents target section The time-sequencing .R1-R8 of this transaction of point forwarding represents the sequence of 8 output nodes.
  8. The identity method 8. bit coin as claimed in claim 7 is merchandised, it is characterised in that the calculating transaction propagation path With the matching value of node to be monitored and its neighbor node according to following formula:
    <mrow> <mi>G</mi> <mi>o</mi> <mi>a</mi> <mi>l</mi> <mo>=</mo> <mrow> <mo>(</mo> <mfrac> <mn>1.5</mn> <mrow> <mi>R</mi> <mi>t</mi> </mrow> </mfrac> <mo>+</mo> <msubsup> <mo>&amp;Sigma;</mo> <mrow> <mi>i</mi> <mo>=</mo> <mn>1</mn> </mrow> <mn>8</mn> </msubsup> <mo>(</mo> <mfrac> <mn>1</mn> <mrow> <mi>R</mi> <mi>i</mi> </mrow> </mfrac> <mo>)</mo> <mo>)</mo> </mrow> <mo>/</mo> <mrow> <mo>(</mo> <mi>a</mi> <mo>+</mo> <mfrac> <mn>1</mn> <mn>2</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>3</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>4</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>5</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>6</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>7</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>8</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>9</mn> </mfrac> <mo>)</mo> </mrow> <mo>;</mo> </mrow>
    Wherein, Goal represents matching value, and value range is (0,1) .Rt, and R1-R8 refers to the output section of destination node and destination node The sequence of point.
  9. The identity method 9. bit coin as claimed in claim 8 is merchandised, it is characterised in that the threshold value is in the following way Determine:
    Single-point is established by controllable node and node to be monitored to connect and repeatedly send transaction;Then collected according to probe node Data and the matching value for calculating such transaction, using the average value of the matching value of such transaction as threshold value.
  10. The identity method 10. bit coin as claimed in claim 9 is merchandised, it is characterised in that described to be filtered out by threshold value The match trading of node to be monitored includes;
    The matching value for the All Activity collected to probe node travels through, and the transaction that matching value is exceeded to threshold value is regarded as belonging to The match trading of node to be monitored.
CN201710965814.2A 2017-10-17 2017-10-17 A kind of bit coin transaction identity method Pending CN108009807A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710965814.2A CN108009807A (en) 2017-10-17 2017-10-17 A kind of bit coin transaction identity method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710965814.2A CN108009807A (en) 2017-10-17 2017-10-17 A kind of bit coin transaction identity method

Publications (1)

Publication Number Publication Date
CN108009807A true CN108009807A (en) 2018-05-08

Family

ID=62050965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710965814.2A Pending CN108009807A (en) 2017-10-17 2017-10-17 A kind of bit coin transaction identity method

Country Status (1)

Country Link
CN (1) CN108009807A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109087079A (en) * 2018-07-09 2018-12-25 北京知帆科技有限公司 Digital cash Transaction Information analysis method
CN110569408A (en) * 2019-09-04 2019-12-13 广州大学 digital currency tracing method and system
CN111325346A (en) * 2020-02-20 2020-06-23 中南大学 Identity inference method and system for bitcoin mine pool
CN111383004A (en) * 2018-12-29 2020-07-07 北京知帆科技有限公司 Method for extracting entity position of digital currency, method for extracting information and device thereof
CN111709737A (en) * 2020-05-15 2020-09-25 国家计算机网络与信息安全管理中心 Bit currency transaction information determination method and device, storage medium and electronic equipment
CN112351119A (en) * 2021-01-11 2021-02-09 北京知帆科技有限公司 Probability-based block chain transaction originating IP address determination method and device
CN112801783A (en) * 2020-12-31 2021-05-14 北京知帆科技有限公司 Entity identification method and device based on digital currency transaction characteristics
CN113379525A (en) * 2021-06-11 2021-09-10 恒安嘉新(北京)科技股份公司 Financial supervision method and device, electronic equipment and storage medium
CN113689222A (en) * 2021-08-25 2021-11-23 福建坛讯信息科技有限公司 Block chain-based digital currency transaction network topology data analysis and optimization method and system
CN113706304A (en) * 2021-08-25 2021-11-26 福建宏创科技信息有限公司 Block chain-based digital currency transaction node IP tracing method and system
CN113938299A (en) * 2021-10-12 2022-01-14 北京哈工创新计算机网络与信息安全技术研究中心 Transaction tracing method for hidden service node of bit currency
CN114679394A (en) * 2022-04-12 2022-06-28 北京理工大学 Bit currency address classification verification method based on network space search engine
CN114997877A (en) * 2021-08-25 2022-09-02 福建宏创科技信息有限公司 Network topology data analysis method of IP of virtual currency public link network transaction node, storage medium and electronic equipment
CN116389163A (en) * 2023-05-26 2023-07-04 中科链安(北京)科技有限公司 Block chain transaction originating node IP tracking method, risk monitoring method and risk monitoring device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104426884A (en) * 2013-09-03 2015-03-18 深圳市腾讯计算机系统有限公司 Method for authenticating identity and device for authenticating identity
US20150264073A1 (en) * 2014-03-11 2015-09-17 Vectra Networks, Inc. System and method for detecting intrusions through real-time processing of traffic with extensive historical perspective
CN105260199A (en) * 2015-08-31 2016-01-20 北京比特大陆科技有限公司 Method and device for deploying and managing electronic devices
CN105608146A (en) * 2015-12-17 2016-05-25 布比(北京)网络技术有限公司 Block chain tracing method
CN106385400A (en) * 2016-08-25 2017-02-08 北京知道未来信息技术有限公司 Bitcoin transaction network based anonymous message transmission method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104426884A (en) * 2013-09-03 2015-03-18 深圳市腾讯计算机系统有限公司 Method for authenticating identity and device for authenticating identity
US20150264073A1 (en) * 2014-03-11 2015-09-17 Vectra Networks, Inc. System and method for detecting intrusions through real-time processing of traffic with extensive historical perspective
CN105260199A (en) * 2015-08-31 2016-01-20 北京比特大陆科技有限公司 Method and device for deploying and managing electronic devices
CN105608146A (en) * 2015-12-17 2016-05-25 布比(北京)网络技术有限公司 Block chain tracing method
CN106385400A (en) * 2016-08-25 2017-02-08 北京知道未来信息技术有限公司 Bitcoin transaction network based anonymous message transmission method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
祝烈煌 等: "区块链隐私保护研究综述", 《计算机研究与发展》 *

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109087079B (en) * 2018-07-09 2021-03-30 北京知帆科技有限公司 Digital currency transaction information analysis method
CN109087079A (en) * 2018-07-09 2018-12-25 北京知帆科技有限公司 Digital cash Transaction Information analysis method
CN111383004A (en) * 2018-12-29 2020-07-07 北京知帆科技有限公司 Method for extracting entity position of digital currency, method for extracting information and device thereof
CN110569408B (en) * 2019-09-04 2022-03-11 广州大学 Digital currency tracing method and system
CN110569408A (en) * 2019-09-04 2019-12-13 广州大学 digital currency tracing method and system
CN111325346A (en) * 2020-02-20 2020-06-23 中南大学 Identity inference method and system for bitcoin mine pool
CN111325346B (en) * 2020-02-20 2023-04-18 中南大学 Identity inference method and system for bitcoin mine pool
CN111709737A (en) * 2020-05-15 2020-09-25 国家计算机网络与信息安全管理中心 Bit currency transaction information determination method and device, storage medium and electronic equipment
CN112801783A (en) * 2020-12-31 2021-05-14 北京知帆科技有限公司 Entity identification method and device based on digital currency transaction characteristics
CN112351119A (en) * 2021-01-11 2021-02-09 北京知帆科技有限公司 Probability-based block chain transaction originating IP address determination method and device
CN112351119B (en) * 2021-01-11 2021-04-02 北京知帆科技有限公司 Probability-based block chain transaction originating IP address determination method and device
CN113379525A (en) * 2021-06-11 2021-09-10 恒安嘉新(北京)科技股份公司 Financial supervision method and device, electronic equipment and storage medium
CN113689222A (en) * 2021-08-25 2021-11-23 福建坛讯信息科技有限公司 Block chain-based digital currency transaction network topology data analysis and optimization method and system
CN114997877A (en) * 2021-08-25 2022-09-02 福建宏创科技信息有限公司 Network topology data analysis method of IP of virtual currency public link network transaction node, storage medium and electronic equipment
CN113706304A (en) * 2021-08-25 2021-11-26 福建宏创科技信息有限公司 Block chain-based digital currency transaction node IP tracing method and system
CN113938299A (en) * 2021-10-12 2022-01-14 北京哈工创新计算机网络与信息安全技术研究中心 Transaction tracing method for hidden service node of bit currency
CN113938299B (en) * 2021-10-12 2024-04-26 北京哈工创新计算机网络与信息安全技术研究中心 Transaction tracing method for hidden service node of bitcoin
CN114679394A (en) * 2022-04-12 2022-06-28 北京理工大学 Bit currency address classification verification method based on network space search engine
CN114679394B (en) * 2022-04-12 2023-09-15 北京理工大学 Bitcoin address classification verification method based on network space search engine
CN116389163A (en) * 2023-05-26 2023-07-04 中科链安(北京)科技有限公司 Block chain transaction originating node IP tracking method, risk monitoring method and risk monitoring device
CN116389163B (en) * 2023-05-26 2023-08-01 中科链安(北京)科技有限公司 Block chain transaction originating node IP tracking method, risk monitoring method and risk monitoring device

Similar Documents

Publication Publication Date Title
CN108009807A (en) A kind of bit coin transaction identity method
Roos et al. Settling payments fast and private: Efficient decentralized routing for path-based transactions
Romiti et al. A deep dive into bitcoin mining pools: An empirical analysis of mining shares
CN109660401A (en) A kind of distributed network assets detection method
Kuzuno et al. Blockchain explorer: An analytical process and investigation environment for bitcoin
Thomas et al. 1000 days of UDP amplification DDoS attacks
CA2683600C (en) A system and method for creating a list of shared information on a peer-to-peer network
Soysal et al. Machine learning algorithms for accurate flow-based network traffic classification: Evaluation and comparison
Giotsas et al. Inferring multilateral peering
CN100413290C (en) Method for setting up notification function for route selection according to border gateway protocol
CN101931628B (en) Method and device for verifying intra-domain source addresses
CN104836810B (en) A kind of collaborative detection method of NDN low speed caching pollution attack
CN107889082A (en) A kind of D2D method for discovering equipment using social networks between user
US20150163224A1 (en) Device and method for detecting bypass access and account theft
CN110532923A (en) A kind of personage&#39;s trajectory retrieval method and its system
CN108596627A (en) A kind of big data computational methods and system calculated based on block chain and mist
CN111047448A (en) Analysis method and device for multi-channel data fusion
CN108965248A (en) A kind of P2P Botnet detection system and method based on flow analysis
Huffaker et al. Toward topology dualism: improving the accuracy of as annotations for routers
Zhao et al. IP Geolocation based on identification routers and local delay distribution similarity
Zhu et al. Mining information on bitcoin network data
Sharma et al. On the anonymity of peer-to-peer network anonymity schemes used by cryptocurrencies
Einwechter An introduction to distributed intrusion detection systems
Sundaresan et al. Profiling underground merchants based on network behavior
CN108134774A (en) The method for secret protection and device being classified based on content privacy and user security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180508