CN108009807A - A kind of bit coin transaction identity method - Google Patents
A kind of bit coin transaction identity method Download PDFInfo
- Publication number
- CN108009807A CN108009807A CN201710965814.2A CN201710965814A CN108009807A CN 108009807 A CN108009807 A CN 108009807A CN 201710965814 A CN201710965814 A CN 201710965814A CN 108009807 A CN108009807 A CN 108009807A
- Authority
- CN
- China
- Prior art keywords
- node
- transaction
- bit coin
- monitored
- mfrac
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 239000000523 sample Substances 0.000 claims abstract description 56
- 230000000694 effects Effects 0.000 claims description 6
- 238000012163 sequencing technique Methods 0.000 claims description 5
- 230000000644 propagated effect Effects 0.000 claims description 4
- 238000009434 installation Methods 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000005206 flow analysis Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- Computer Security & Cryptography (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Primary Health Care (AREA)
- Tourism & Hospitality (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention provides a kind of bit coin transaction identity method, comprises the following steps:Deployment connects the probe node of node as much as possible in bit coin network;Select the node to be monitored in bit coin network;The neighbor node of the node to be monitored is determined by probe node;Monitor and obtain bit coin network transaction information and transaction propagation path;Calculate transaction propagation path and node to be monitored and its matching value of neighbor node;The match trading of node to be monitored is filtered out by threshold value;Export the match trading and assign its IP label.By to the transaction of bit coin and the matching identification of dealer's IP address, identifying the identity of dealer, not only there is higher recognition accuracy, and be greatly reduced compared with prior art expense.
Description
Technical field
The present invention relates to information technology and security technology area, more particularly to specific identity to identify, and in particular to a kind of ratio
Special coin transaction identity method.
Background technology
Bit coin is a kind of digital cash of decentralization, is issued currency not against particular organization, also not against specific machine
Structure O&M bit coin system.Anyone can directly be traded on any computer with other people, it is not necessary to which third party carries out
Intermediary.Thus, there is no the Centroid that one possesses all subscriber identity informations.In addition, bit coin both parties use than
Special coin address claims as identity generation, and bit coin address is voluntarily created by user, unrelated with identity information.Therefore, although
Bit coin Transaction Information is disclosed, but User Identity information cannot be directly found from Transaction Information.
For such case, generally real name supposition can be carried out by following several schemes at present:
Scheme one:By collecting the data of the bit coin service provider such as bit coin exchange by bit coin address real name.Though
Right bit coin is decentralization in itself, but some bit coin service providers are run by the way of centralization, such as bit coin
Exchange, supports shop of bit coin etc..These bit coin service providers store some bits coin user's in the service of offer
Identity information.For example, bit coin exchange provides the service that digital cash is exchanged with real money, it will usually stores the ratio of user
Special coin address, mailbox message, cellphone information, bank card account, or even the identity informations such as identity card can be stored.Therefore bit coin clothes
Being engaged in business can be by bit coin address and corresponding subscriber identity information matching.
The program is disadvantageous in that:
Cost is larger, it is necessary to policy support and multi-party resource.
It is related to Privacy Protection, user may select not providing the bit coin service provider of data.Such as bit overseas
Coin exchange.
Accuracy rate is low, and user can use the real name effect of this scheme of a variety of methods reduction.Such as user will record
Regard real name address in the bit coin address of bit coin service provider, really merchandised without using real name address, but
New anonymous address is created to be traded.When needing transfer fund using some mixed coin methods, reduce real name address and hide
Incidence relation between name address.
Scheme two:The transaction feature of bit coin address is found by analyzing Transaction Information disclosed in bit coin, in conjunction with it
Information speculates the subscriber identity information of bit coin address behind under his line.All transaction of bit coin are stored in global account book
In, anyone can download and safeguard a global account book.By analyzing the Transaction Information recorded in global account book, Ke Yifa
The transaction rule of existing specific bit coin address, and the transaction relationship between other addresses.It can be reduced based on these information
The anonymity of bit coin address, help is provided for the identity information of presumptive address.
The program has the drawback that:
Accuracy rate is low.User can use the real name effect of this scheme of a variety of methods reduction.For example, user can adopt
With disposable the address Policy, transaction every time uses different addresses, this speculates the difficulty of particular address transaction rule by dramatically increasing
Degree;User can also use mixed coin service to hide funds flow, reduce the incidence relation between different address.
Scheme three:A kind of Chinese invention patent application " block chain tracing side of Application No. 201510955506.2
In method ", inventors herein propose a kind of built according to block chain address and take in spanning tree and expenditure spanning tree, tracing is treated in discovery
The method of the assets transfer historical record of address., can not be right but this method can only find the incidence relation between different address
The transaction of bit coin carries out effective identity.
Scheme four:Probe is inserted into bit coin network, connects all bit coin servers, collects the transaction propagated in network
Information, it is believed that the node for transmitting Transaction Information to tat probe node at first is the origination node of Transaction Information.Find the beginning of transaction
The anonymous bit coin address in transaction and dealer's real IP address can be matched by sending out node.
There is also some defects for the program:
Cost is larger, and bit coin server node is numerous, and all nodes keep connection need larger computing resource and
The communication resource.
Accuracy rate is low.First, probe node can not necessarily capture the Transaction Information of origination node forwarding;Secondly, originate
The Transaction Information of node forwarding may be subject to the interference such as network delay to lag behind other nodes in repeating process.
To sum up, bit coin existing at present transaction identity recognizing technology is undesirable, and there is an urgent need for a kind of effective in the industry
Bit coin transaction identity method.
The content of the invention
In view of the foregoing, the object of the present invention is to provide a kind of bit coin transaction identity method, by bit
The matching identification that coin is merchandised with dealer's IP address, identifies the identity of dealer, not only has higher recognition accuracy, and
It is greatly reduced compared with prior art expense.
To achieve the above object, the technical solution taken of the present invention is:
A kind of bit coin transaction identity method, comprises the following steps:
Deployment connects the probe node of node as much as possible in bit coin network;
Select the node to be monitored in bit coin network;
The neighbor node of the node to be monitored is determined by probe node;
Monitor and obtain bit coin network transaction information and transaction propagation path;
Calculate transaction propagation path and node to be monitored and its matching value of neighbor node;
The match trading of node to be monitored is filtered out by threshold value;
Export the match trading and assign its IP label.
Further, the probe node is the server for being mounted with probe program, its to designated bit coin service
Device, which is established, connects and collects the Transaction Information in bit coin network.
The probe program is realizing the node discovery mechanism and transaction acceptance interface in bit coin agreement;To perform
Collect online bit coin server ip information and establish and connect with designated bit coin server, bit is collected according to bit coin agreement
The operation for the Transaction Information propagated in coin network.
Further, it is described to select node to be monitored and include:Select the server of certain digital cash exchange to be used as to wait to supervise
Node is surveyed, or the data collected according to probe node select suspect node as node to be monitored.
Further, the data selection suspect node collected according to probe node includes as node to be monitored:According to spy
Pin knot point operationally collects the information of all line server nodes in bit coin network, selects certain node IP sections specific to make
For suspect node, the thus IP sections of information for creating the transaction of bit coin is then collected.
Further, the neighbor node is included in bit coin network and node to be monitored is separated by the 1 rank neighbour of 1 hop distance
Occupy the 2 rank neighbor nodes that node is separated by 2 hop distances, and class is pushed into the n rank neighbor nodes that are separated by n hop distances.
Further, it is described to speculate that the neighbor node of the node to be monitored includes by probe node:
The controllable node of deployment installation bit coin client-side program, to create the transaction of bit coin;
Single-point is established by controllable node and node to be monitored to connect and repeatedly create transaction;
The propagation path of the transaction is collected by probe node, to forward the node of the transaction earliest as to be monitored
The neighbor node of node.
Further, monitor and obtain bit coin network transaction information and transaction propagation path includes:
By 1 rank of probe node connection node to be monitored and node to be monitored to n rank neighbor nodes;
Probe node passively receives the Transaction Information of each node forwarding, records the source IP addresses of each Transaction Information
And arrival time;
By the Transaction Information collected according to transaction Hash classification, and to every a kind of transaction according to transaction to tat probe when
Between be ranked up and then the transaction being made of the neighbor node of node to be monitored and node to be monitored selected according to IP and pass
Broadcast path.
Further, the transaction propagation path is 10 tuples, including [TXID, Rt, R1, R2, R3, R4, R5, R6, R7,
R8];Wherein, TXID represents transaction Hash, and Rt represents destination node and forwards this time-sequencing .R1-R8 to merchandise to represent 8 outputs
The sequence of node.
Further, it is described to calculate transaction propagation path with the matching value of node to be monitored and its neighbor node according to as follows
Formula:
Wherein, Goal represents matching value, and value range is (0,1) .Rt, and R1-R8 refers to the defeated of destination node and destination node
The sequence of egress.
Further, the threshold value is determined as follows:
Single-point is established by controllable node and node to be monitored to connect and repeatedly send transaction;Then searched according to probe node
The data of collection and the matching value for calculating such transaction, using the average value of the matching value of such transaction as threshold value.
Further, the match trading that node to be monitored is filtered out by threshold value includes;
The matching value for the All Activity collected to probe node travels through, and the transaction that matching value is exceeded to threshold value is regarded as
Belong to the match trading of node to be monitored.
By taking above-mentioned technical proposal, the present invention directly by Transaction Information and can create the IP address matching merchandised,
With higher mark accuracy rate.Currently existing scheme is missed using the identity information of the relation presumptive address between the transaction of bit coin
Difference is higher, and user can use the increase of a variety of methods to speculate difficulty, such as disposable the address Policy.The present invention passes through tracking
Bit coin is merchandised in the propagation path of network layer, can directly find the IP address for the server for creating transaction.According to IP address
Assigning identity has higher accuracy rate, and can avoid the interference of disposable the address Policy.
The resource that the identity method of the present invention relies on is less.Compared with prior art, the present invention need not collect transaction
Wait the data of other bit coin service providers, it is only necessary to dispose a certain number of probes in bit coin network, you can analysis ratio
Special coin transaction, identity is assigned for transaction;Compared with prior art, required number of probes of the invention is less, to bit coin
The influence of network is smaller.In background technology scheme four only with origination node as Rule of judgment, it is therefore desirable to whole bits
Coin node, which carries out substantial amounts of connection, could obtain higher accuracy rate.Present invention introduces neighbor node as further decision condition,
More preferable marking effect can be realized using a small amount of probe, therefore the present invention realizes that required cost is relatively low.
The identity method of the present invention can to most of server node in bit coin network (including domestic node and
Node overseas) it is monitored, and different server nodes can be directed to different matching thresholds is set, difference can be suitable for
The server node of network state, the scope of application are more extensive.
Brief description of the drawings
Fig. 1 is the system architecture diagram that bit coin transaction identity method is realized in one embodiment of the invention.
Fig. 2 disposes schematic diagram for one embodiment of the invention interior joint.
Embodiment
Operation principle:
The major technique of the present invention is contemplated that:After bit coin node initiates transaction, Transaction Information can be transmitted to first certainly
Oneself neighbor node, afterwards neighbor node continue to be transmitted to the neighbor node of itself, and so on, until Transaction Information is spread all over
Whole network.Obviously, initiate transaction node transmitted transaction time it is earliest, neighbor node takes second place, other nodes are delayed successively.
If by arranging that probe node can be kept connecting with Servers-all node, for a transaction, probe node can be with
This Transaction Information is received from different nodes successively, in the case of without considering network delay, it is believed that first forwarding is handed over
The node that easy information reaches probe node is origination node of merchandising.The present invention realizes bit coin transaction body based on above-mentioned principle
Part mark.
Server node quantity is about 9350 (data on October 13rd, 2017) in bit coin network, for all clothes
The real-time flow analysis needs of device node progress be engaged in compared with multiple resource.The purpose of the present invention is for some specific suspect nodes into
Row monitoring, then filters out the transaction originated by suspect node, so as to these from a large amount of transaction of bit coin Internet communication
Transaction assigns the IP information of suspect node.In the working environment of some conditions permits, it can be expanded by increasing server resource
Big monitoring scale, i.e., carry out parallel monitoring to substantial amounts of suspect node at the same time.
Fig. 1 illustrates the system architecture diagram being monitored for specific suspect node.Node to be monitored in figure refer to by
The suspect node selected.
Suspect node is selected in accordance with general demand and custom, such as selects the server of certain digital cash exchange to make
For suspect node.
In addition, the data that suspect node can also be collected according to probe node select.Probe node can operationally be collected
The information of all line server nodes in bit coin network, including (IP information, geographical location information, affiliated organizational information
Deng), can be selected according to these information can be with node.For example, certain node IP sections specific can be selected as suspect node, so
The thus IP sections of information for creating the transaction of bit coin is collected afterwards.
Neighbor node refers in bit coin network and the selected suspect node as node to be monitored is separated by 1 hop distance
Node (transaction that node i.e. to be monitored creates can be transmitted directly to neighbor node), correspondingly, will be separated by the node of 2 hop distances
(node that the transaction that node i.e. to be monitored creates is got to by 1 intermediate node) is known as 2 rank neighbor nodes, with such
Push away, by the node for being separated by n hop distances (node that the transaction that node i.e. to be monitored creates is got to by n-1 intermediate node)
It is defined as n rank neighbor nodes.
Probe node is the server for being mounted with probe program, by probe node deployment to bit coin network, for collecting
Transaction Information in bit coin network.Probe program realizes node discovery mechanism in bit coin agreement and transaction acceptance connects
Mouthful, online bit coin server ip information can be collected and establish and connect with designated bit coin server, can be according to bit coin
Agreement collects the Transaction Information propagated in bit coin network.
Fig. 1 is engaged, the principle realized to the transaction ID method of the present invention further expands explanation.
First, node to be monitored will be broadcast to left side first to the 1 rank neighbor node transmitted transaction information of oneself, information
1 rank neighbor node and probe node.Secondly, 1 rank node of left side continues 1 rank neighbor node (the 2 of node i.e. to be monitored to oneself
Rank neighbor node) transmitted transaction.This time, probe node will receive same Transaction Information from the 1 rank neighbor node in left side, show
So, the time of node transmitted transaction to tat probe node to be monitored is more early, the arrival of the 1 rank neighbor node transmitted transaction in left side
Time is later.The forwarding situation of other nodes is similar.Therefore, in the ideal case, for every transaction, probe node energy
Enough receive the Transaction Information of n version, the time-sequencing of the Transaction Information of different editions to tat probe node and neighbor node
Order is identical.I.e. order is bigger, then time-sequencing is more rearward.
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Whole description.
The present invention is based on above-mentioned operation principle, can be doubtful for being filtered out in any attachable bit coin network node
Originate transaction.So as to be identified to bit coin transaction identity, specific process flow is as follows:
1) node to be monitored is selected.
I.e. selected suspect node, and using the IP of suspect node as node to be monitored.Suspect node is collected according to work above
The mode for making to introduce in principle carries out.It can be obtained by being scanned on line with the various ways such as acquisition under line.For example select certain
The server of digital cash exchange is as suspect node, or the data collected also according to probe node select, for example selects
Then certain node IP sections specific collects the bit coin transaction that thus IP sections of servers create as suspect node.
2) neighbor node is speculated.
Deduce the neighbor node of node to be monitored.Neighbor node as introduce above in bit coin network and treat
The node that monitoring node logically connects.Node to be monitored collects information by neighbor node from bit coin network, also leads to
Cross neighbor node and send information to bit coin network, the neighbor node for speculatively finding node to be monitored helps to improve mark
Know accuracy rate.
This step speculates the neighbor node of node to be monitored using active sniff method:First with controllable node (
Server is controlled, bit coin client-side program is installed in the server of deployment, can be used for creating the transaction of bit coin) and it is to be monitored
Node establishes single-point and connects and repeatedly create transaction, the propagation path of such transaction is then collected using probe node, thus it is speculated that most
Early forward neighbor node of the node that these are merchandised as node to be monitored.Merchandised according to bit coin and forward rule, neighbor node
Such Transaction Information will be forwarded first, therefore, the neighbor node of node to be monitored can be deduced using active sniff algorithm.It is logical
Repeatedly test is crossed, the precision for speculating neighbor node can be significantly improved.
Controllable node in Fig. 2 is the controllable server disposed, and is mounted with bit coin client-side program, can be used for creating
Build the transaction of bit coin.
Node to be monitored is by using " the connect ip in bit coin agreement:Port " is instructed, and controllable node can be with
Node to be monitored establishes single-point connection (i.e. controllable node only have node to be monitored this 1 neighbor node).When using controllable node
When sending transaction, transaction will be simply sent to node to be monitored, and then node to be monitored gives transmitted transaction first to the neighbours of oneself
Node.Therefore, the propagation path of such transaction is collected by using probe, can be by the node of transmitted transaction first to tat probe
It is speculated as neighbor node.Under normal conditions, controllable node only needs to speculate neighbor node (i.e. 1 rank neighbor node), 2 ranks to n ranks
Neighbor node is served only for description network topology.
3) Transaction Information is monitored.
Monitor method is as shown in Figure 1,1 rank that node to be monitored and node to be monitored are connected using probe node is adjacent to n ranks
Occupy node.Then, probe node passively receives the Transaction Information of each node forwarding, records the source IP of each Transaction Information
Address and arrival time.
Probe node reaches the Transaction Information collected according to transaction Hash classification, and to every a kind of transaction according to transaction
The time of probe is ranked up and then is selected according to IP and is made of the neighbor node of node to be monitored and node to be monitored
Transaction propagation path.Transaction propagation path is 10 tuples, including [TXID, Rt, R1, R2, R3, R4, R5, R6, R7,
R8]。
Wherein, TXID represents transaction Hash, and Rt represents destination node and forwards this time-sequencing .R1-R8 to merchandise to represent 8
The sequence of output node.For example, when the Transaction Information first of destination node forwarding arrives tat probe node, then Rt=1. is when collection
To transaction in do not find output node forwarding transaction when, set ranking value as MAX, represent infinity.
4) matching value is calculated.
Matching value reflects transaction propagation path and the goodness of fit matching values of target node network topology are higher, transaction letter
Breath is more likely to be to be originated by destination node.Match value calculating method as shown in formula (1)
Goal refers to matching value, and value range is (0,1) .Rt, and R1-R8 refers to the output node of destination node and destination node
Sequence.
5) selected threshold value.
Threshold value be for judge transaction whether the matching value with IP node matchings to be monitored, calculated when according to step 4)
Matching value when being more than threshold value, that is, think that the IP of this transaction and node to be monitored is matched, otherwise mismatch.
Selecting for matching value can equally use active sniff method to obtain, the method and the active sniff side in step 2
Method is similar, i.e., establishes single-point by controllable node and node to be monitored and connect and repeatedly send and merchandise.Then according to probe section
The data that point is collected calculate the matching value of such transaction using step 4), using the average value of the matching value of such transaction as threshold
Value.
6) export match trading and assign IP labels.
According to the threshold value selected, the matching value for the All Activity collected to probe travels through, and matching value exceedes threshold value
Transaction will be considered to belong to the match trading of node to be monitored.System will export all match tradings, and be assigned for these transaction
Give IP labels.So as to fulfill transaction identity.
Obviously, described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without making creative work
Example, belongs to the scope of protection of the invention.
Claims (10)
- A kind of identity method 1. bit coin is merchandised, comprises the following steps:Deployment connects the probe node of node as much as possible in bit coin network;Select the node to be monitored in bit coin network;The neighbor node of the node to be monitored is determined by probe node;Monitor and obtain bit coin network transaction information and transaction propagation path;Calculate transaction propagation path and node to be monitored and its matching value of neighbor node;The match trading of node to be monitored is filtered out by threshold value;Export the match trading and assign its IP label.
- The identity method 2. bit coin as claimed in claim 1 is merchandised, it is characterised in that the probe node is to be mounted with The server of probe program, it connects and collects the letter of the transaction in bit coin network to be established with designated bit coin server Breath.The probe program is realizing the node discovery mechanism and transaction acceptance interface in bit coin agreement;To perform collection Online bit coin server ip information is simultaneously established and connected with designated bit coin server, and bit coin net is collected according to bit coin agreement The operation for the Transaction Information propagated in network;It is described to select node to be monitored and include:The server of certain digital cash exchange is selected as node to be monitored, Huo Zhegen The data collected according to probe node select suspect node as node to be monitored.
- The identity method 3. bit coin as claimed in claim 1 is merchandised, it is characterised in that the number collected according to probe node Include according to selection suspect node as node to be monitored:Operationally collected according to probe node all online in bit coin network The information of server node, selects certain node IP sections specific then to collect thus IP sections of establishment bit coin as suspect node The information of transaction.
- The identity method 4. bit coin as claimed in claim 1 is merchandised, it is characterised in that the neighbor node is included in ratio The 1 rank neighbor node for being separated by 1 hop distance in special coin network with node to be monitored is separated by 2 rank neighbor nodes of 2 hop distances, and class It is pushed into the n rank neighbor nodes for being separated by n hop distances.
- The identity method 5. bit coin as claimed in claim 4 is merchandised, it is characterised in that described to be speculated by probe node The neighbor node of the node to be monitored includes:The controllable node of deployment installation bit coin client-side program, to create the transaction of bit coin;Single-point is established by controllable node and node to be monitored to connect and repeatedly create transaction;The propagation path of the transaction is collected by probe node, the node to forward the transaction earliest is used as node to be monitored Neighbor node.
- The identity method 6. bit coin as claimed in claim 4 is merchandised, it is characterised in that monitor and obtain bit coin network Transaction Information and transaction propagation path include:By 1 rank of probe node connection node to be monitored and node to be monitored to n rank neighbor nodes;Probe node passively receives the Transaction Information of each node forwarding, records the source IP addresses of each Transaction Information and arrives Up to the time;By the Transaction Information collected according to transaction Hash classification, and to every a kind of transaction according to transaction to tat probe when Between be ranked up and then the transaction being made of the neighbor node of node to be monitored and node to be monitored selected according to IP and pass Broadcast path.
- The identity method 7. bit coin as claimed in claim 6 is merchandised, it is characterised in that the transaction propagation path is 10 Tuple, including [TXID, Rt, R1, R2, R3, R4, R5, R6, R7, R8];Wherein, TXID represents transaction Hash, and Rt represents target section The time-sequencing .R1-R8 of this transaction of point forwarding represents the sequence of 8 output nodes.
- The identity method 8. bit coin as claimed in claim 7 is merchandised, it is characterised in that the calculating transaction propagation path With the matching value of node to be monitored and its neighbor node according to following formula:<mrow> <mi>G</mi> <mi>o</mi> <mi>a</mi> <mi>l</mi> <mo>=</mo> <mrow> <mo>(</mo> <mfrac> <mn>1.5</mn> <mrow> <mi>R</mi> <mi>t</mi> </mrow> </mfrac> <mo>+</mo> <msubsup> <mo>&Sigma;</mo> <mrow> <mi>i</mi> <mo>=</mo> <mn>1</mn> </mrow> <mn>8</mn> </msubsup> <mo>(</mo> <mfrac> <mn>1</mn> <mrow> <mi>R</mi> <mi>i</mi> </mrow> </mfrac> <mo>)</mo> <mo>)</mo> </mrow> <mo>/</mo> <mrow> <mo>(</mo> <mi>a</mi> <mo>+</mo> <mfrac> <mn>1</mn> <mn>2</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>3</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>4</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>5</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>6</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>7</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>8</mn> </mfrac> <mo>+</mo> <mfrac> <mn>1</mn> <mn>9</mn> </mfrac> <mo>)</mo> </mrow> <mo>;</mo> </mrow>Wherein, Goal represents matching value, and value range is (0,1) .Rt, and R1-R8 refers to the output section of destination node and destination node The sequence of point.
- The identity method 9. bit coin as claimed in claim 8 is merchandised, it is characterised in that the threshold value is in the following way Determine:Single-point is established by controllable node and node to be monitored to connect and repeatedly send transaction;Then collected according to probe node Data and the matching value for calculating such transaction, using the average value of the matching value of such transaction as threshold value.
- The identity method 10. bit coin as claimed in claim 9 is merchandised, it is characterised in that described to be filtered out by threshold value The match trading of node to be monitored includes;The matching value for the All Activity collected to probe node travels through, and the transaction that matching value is exceeded to threshold value is regarded as belonging to The match trading of node to be monitored.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710965814.2A CN108009807A (en) | 2017-10-17 | 2017-10-17 | A kind of bit coin transaction identity method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710965814.2A CN108009807A (en) | 2017-10-17 | 2017-10-17 | A kind of bit coin transaction identity method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108009807A true CN108009807A (en) | 2018-05-08 |
Family
ID=62050965
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710965814.2A Pending CN108009807A (en) | 2017-10-17 | 2017-10-17 | A kind of bit coin transaction identity method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108009807A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109087079A (en) * | 2018-07-09 | 2018-12-25 | 北京知帆科技有限公司 | Digital cash Transaction Information analysis method |
CN110569408A (en) * | 2019-09-04 | 2019-12-13 | 广州大学 | digital currency tracing method and system |
CN111325346A (en) * | 2020-02-20 | 2020-06-23 | 中南大学 | Identity inference method and system for bitcoin mine pool |
CN111383004A (en) * | 2018-12-29 | 2020-07-07 | 北京知帆科技有限公司 | Method for extracting entity position of digital currency, method for extracting information and device thereof |
CN111709737A (en) * | 2020-05-15 | 2020-09-25 | 国家计算机网络与信息安全管理中心 | Bit currency transaction information determination method and device, storage medium and electronic equipment |
CN112351119A (en) * | 2021-01-11 | 2021-02-09 | 北京知帆科技有限公司 | Probability-based block chain transaction originating IP address determination method and device |
CN112801783A (en) * | 2020-12-31 | 2021-05-14 | 北京知帆科技有限公司 | Entity identification method and device based on digital currency transaction characteristics |
CN113379525A (en) * | 2021-06-11 | 2021-09-10 | 恒安嘉新(北京)科技股份公司 | Financial supervision method and device, electronic equipment and storage medium |
CN113689222A (en) * | 2021-08-25 | 2021-11-23 | 福建坛讯信息科技有限公司 | Block chain-based digital currency transaction network topology data analysis and optimization method and system |
CN113706304A (en) * | 2021-08-25 | 2021-11-26 | 福建宏创科技信息有限公司 | Block chain-based digital currency transaction node IP tracing method and system |
CN113938299A (en) * | 2021-10-12 | 2022-01-14 | 北京哈工创新计算机网络与信息安全技术研究中心 | Transaction tracing method for hidden service node of bit currency |
CN114679394A (en) * | 2022-04-12 | 2022-06-28 | 北京理工大学 | Bit currency address classification verification method based on network space search engine |
CN114997877A (en) * | 2021-08-25 | 2022-09-02 | 福建宏创科技信息有限公司 | Network topology data analysis method of IP of virtual currency public link network transaction node, storage medium and electronic equipment |
CN116389163A (en) * | 2023-05-26 | 2023-07-04 | 中科链安(北京)科技有限公司 | Block chain transaction originating node IP tracking method, risk monitoring method and risk monitoring device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104426884A (en) * | 2013-09-03 | 2015-03-18 | 深圳市腾讯计算机系统有限公司 | Method for authenticating identity and device for authenticating identity |
US20150264073A1 (en) * | 2014-03-11 | 2015-09-17 | Vectra Networks, Inc. | System and method for detecting intrusions through real-time processing of traffic with extensive historical perspective |
CN105260199A (en) * | 2015-08-31 | 2016-01-20 | 北京比特大陆科技有限公司 | Method and device for deploying and managing electronic devices |
CN105608146A (en) * | 2015-12-17 | 2016-05-25 | 布比(北京)网络技术有限公司 | Block chain tracing method |
CN106385400A (en) * | 2016-08-25 | 2017-02-08 | 北京知道未来信息技术有限公司 | Bitcoin transaction network based anonymous message transmission method |
-
2017
- 2017-10-17 CN CN201710965814.2A patent/CN108009807A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104426884A (en) * | 2013-09-03 | 2015-03-18 | 深圳市腾讯计算机系统有限公司 | Method for authenticating identity and device for authenticating identity |
US20150264073A1 (en) * | 2014-03-11 | 2015-09-17 | Vectra Networks, Inc. | System and method for detecting intrusions through real-time processing of traffic with extensive historical perspective |
CN105260199A (en) * | 2015-08-31 | 2016-01-20 | 北京比特大陆科技有限公司 | Method and device for deploying and managing electronic devices |
CN105608146A (en) * | 2015-12-17 | 2016-05-25 | 布比(北京)网络技术有限公司 | Block chain tracing method |
CN106385400A (en) * | 2016-08-25 | 2017-02-08 | 北京知道未来信息技术有限公司 | Bitcoin transaction network based anonymous message transmission method |
Non-Patent Citations (1)
Title |
---|
祝烈煌 等: "区块链隐私保护研究综述", 《计算机研究与发展》 * |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109087079B (en) * | 2018-07-09 | 2021-03-30 | 北京知帆科技有限公司 | Digital currency transaction information analysis method |
CN109087079A (en) * | 2018-07-09 | 2018-12-25 | 北京知帆科技有限公司 | Digital cash Transaction Information analysis method |
CN111383004A (en) * | 2018-12-29 | 2020-07-07 | 北京知帆科技有限公司 | Method for extracting entity position of digital currency, method for extracting information and device thereof |
CN110569408B (en) * | 2019-09-04 | 2022-03-11 | 广州大学 | Digital currency tracing method and system |
CN110569408A (en) * | 2019-09-04 | 2019-12-13 | 广州大学 | digital currency tracing method and system |
CN111325346A (en) * | 2020-02-20 | 2020-06-23 | 中南大学 | Identity inference method and system for bitcoin mine pool |
CN111325346B (en) * | 2020-02-20 | 2023-04-18 | 中南大学 | Identity inference method and system for bitcoin mine pool |
CN111709737A (en) * | 2020-05-15 | 2020-09-25 | 国家计算机网络与信息安全管理中心 | Bit currency transaction information determination method and device, storage medium and electronic equipment |
CN112801783A (en) * | 2020-12-31 | 2021-05-14 | 北京知帆科技有限公司 | Entity identification method and device based on digital currency transaction characteristics |
CN112351119A (en) * | 2021-01-11 | 2021-02-09 | 北京知帆科技有限公司 | Probability-based block chain transaction originating IP address determination method and device |
CN112351119B (en) * | 2021-01-11 | 2021-04-02 | 北京知帆科技有限公司 | Probability-based block chain transaction originating IP address determination method and device |
CN113379525A (en) * | 2021-06-11 | 2021-09-10 | 恒安嘉新(北京)科技股份公司 | Financial supervision method and device, electronic equipment and storage medium |
CN113689222A (en) * | 2021-08-25 | 2021-11-23 | 福建坛讯信息科技有限公司 | Block chain-based digital currency transaction network topology data analysis and optimization method and system |
CN114997877A (en) * | 2021-08-25 | 2022-09-02 | 福建宏创科技信息有限公司 | Network topology data analysis method of IP of virtual currency public link network transaction node, storage medium and electronic equipment |
CN113706304A (en) * | 2021-08-25 | 2021-11-26 | 福建宏创科技信息有限公司 | Block chain-based digital currency transaction node IP tracing method and system |
CN113938299A (en) * | 2021-10-12 | 2022-01-14 | 北京哈工创新计算机网络与信息安全技术研究中心 | Transaction tracing method for hidden service node of bit currency |
CN113938299B (en) * | 2021-10-12 | 2024-04-26 | 北京哈工创新计算机网络与信息安全技术研究中心 | Transaction tracing method for hidden service node of bitcoin |
CN114679394A (en) * | 2022-04-12 | 2022-06-28 | 北京理工大学 | Bit currency address classification verification method based on network space search engine |
CN114679394B (en) * | 2022-04-12 | 2023-09-15 | 北京理工大学 | Bitcoin address classification verification method based on network space search engine |
CN116389163A (en) * | 2023-05-26 | 2023-07-04 | 中科链安(北京)科技有限公司 | Block chain transaction originating node IP tracking method, risk monitoring method and risk monitoring device |
CN116389163B (en) * | 2023-05-26 | 2023-08-01 | 中科链安(北京)科技有限公司 | Block chain transaction originating node IP tracking method, risk monitoring method and risk monitoring device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108009807A (en) | A kind of bit coin transaction identity method | |
Roos et al. | Settling payments fast and private: Efficient decentralized routing for path-based transactions | |
Romiti et al. | A deep dive into bitcoin mining pools: An empirical analysis of mining shares | |
CN109660401A (en) | A kind of distributed network assets detection method | |
Kuzuno et al. | Blockchain explorer: An analytical process and investigation environment for bitcoin | |
Thomas et al. | 1000 days of UDP amplification DDoS attacks | |
CA2683600C (en) | A system and method for creating a list of shared information on a peer-to-peer network | |
Soysal et al. | Machine learning algorithms for accurate flow-based network traffic classification: Evaluation and comparison | |
Giotsas et al. | Inferring multilateral peering | |
CN100413290C (en) | Method for setting up notification function for route selection according to border gateway protocol | |
CN101931628B (en) | Method and device for verifying intra-domain source addresses | |
CN104836810B (en) | A kind of collaborative detection method of NDN low speed caching pollution attack | |
CN107889082A (en) | A kind of D2D method for discovering equipment using social networks between user | |
US20150163224A1 (en) | Device and method for detecting bypass access and account theft | |
CN110532923A (en) | A kind of personage's trajectory retrieval method and its system | |
CN108596627A (en) | A kind of big data computational methods and system calculated based on block chain and mist | |
CN111047448A (en) | Analysis method and device for multi-channel data fusion | |
CN108965248A (en) | A kind of P2P Botnet detection system and method based on flow analysis | |
Huffaker et al. | Toward topology dualism: improving the accuracy of as annotations for routers | |
Zhao et al. | IP Geolocation based on identification routers and local delay distribution similarity | |
Zhu et al. | Mining information on bitcoin network data | |
Sharma et al. | On the anonymity of peer-to-peer network anonymity schemes used by cryptocurrencies | |
Einwechter | An introduction to distributed intrusion detection systems | |
Sundaresan et al. | Profiling underground merchants based on network behavior | |
CN108134774A (en) | The method for secret protection and device being classified based on content privacy and user security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180508 |