CN108737430B - Encryption communication method and system for block chain node - Google Patents

Encryption communication method and system for block chain node Download PDF

Info

Publication number
CN108737430B
CN108737430B CN201810511352.1A CN201810511352A CN108737430B CN 108737430 B CN108737430 B CN 108737430B CN 201810511352 A CN201810511352 A CN 201810511352A CN 108737430 B CN108737430 B CN 108737430B
Authority
CN
China
Prior art keywords
node
public key
signature
encryption
user identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810511352.1A
Other languages
Chinese (zh)
Other versions
CN108737430A (en
Inventor
路成业
王凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN201810511352.1A priority Critical patent/CN108737430B/en
Publication of CN108737430A publication Critical patent/CN108737430A/en
Application granted granted Critical
Publication of CN108737430B publication Critical patent/CN108737430B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an encryption communication method and system of a block chain node, wherein the method comprises the following steps: the method comprises the steps that a participating node of a block chain network is added for the first time, a first signature private key of the participating node is adopted to sign a first user identification and a first signature public key of the participating node, and a first adding broadcast message is sent to the block chain network after a timestamp is printed by a timestamp server; the mining node analyzes the first join broadcast message to obtain a first user identifier and a first signature public key, and carries out validity verification on the participating node according to the first signature public key; the supervision node generates and distributes a first encryption public key and a first encryption private key corresponding to the first user identification according to the first signature public key; and the participating node performs secure communication with the target node based on the first encryption public key and the first encryption private key. Therefore, the public key certificate scheme is combined with the blockchain network, and the communication safety of the blockchain network is ensured.

Description

Encryption communication method and system for block chain node
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an encryption communication method and system for block link points.
Background
Blockchain techniques are increasingly known with the advent of bitcoins. The block chain network has no central node, all nodes have equal positions, and transaction data in the block chain network is packaged and written into the block by adopting a common recognition mechanism such as workload certification, rights and interests certification and the like. In this decentralized network, all nodes maintain a backup of the data of the entire network. The consensus mechanism adopted by the block chain guarantees the real effectiveness of information transfer on an untrusted channel.
However, even though the operation mechanism based on the blockchain can ensure that data is tampered in the transmission process, the nodes can be prevented from being attacked by denial of service, but because the operation mechanism depends on the common supervision of all the nodes for service, all transaction information is generally disclosed in a broadcast form, so that the related transaction information is easily and maliciously intercepted, and when many scenes such as business secrets and the like needing confidentiality are involved, the confidentiality requirement cannot be met, and the security of communication cannot be guaranteed.
Disclosure of Invention
The invention provides an encryption communication method and system for a block chain node, which aim to solve the technical problem that the communication safety of each node in a block chain network cannot be guaranteed in the prior art.
A first embodiment of the present invention provides an encryption communication method for block link points, including: a participating node joining a block chain network for the first time signs a first user identifier and a first signature public key of the participating node by adopting a first signature private key of the participating node, and sends a first joining broadcast message to the block chain network after a timestamp is printed by a timestamp server; the mining node analyzes the first join broadcast message to obtain the first user identification and the first signature public key, searches whether a block chain account book currently stored by a local node has the first user identification, if the first user identification is detected to be absent, the participating node is subjected to signature verification through the first signature public key, and if the first join broadcast message passes the verification, the first join broadcast message is written into a new block and then is broadcast to the block chain network; the supervision node analyzes the received broadcast message of the new block, acquires the first user identifier and the first signature public key, and generates a first encryption public key and a first encryption private key corresponding to the first user identifier; the supervision node encrypts the first encryption private key by using the first signature public key to generate first encryption data, signs the first encryption data, the first encryption public key and the first user identification by using the signature private key of the supervision node, and then sends a first key configuration broadcast message to the block chain network; the participating node analyzes the received first key configuration broadcast message, acquires the first encrypted data and the first encrypted public key corresponding to the first user identifier, and decrypts the first encrypted data by using the first signature private key to acquire the first encrypted private key; the target node analyzes the received first key configuration broadcast message, acquires the first encryption public key corresponding to the first user identifier, encrypts first data sent to the participating node by using the first encryption public key to generate first encrypted communication data, signs by using a second signature private key of the target node, and sends the first encrypted communication data to the participating node; and the participating node analyzes the block chain content to obtain a second signature public key corresponding to a second user identifier of the target node, applies the second signature public key to carry out signature verification on first encrypted communication data sent by the target node, and if the verification is passed, applies the first encryption private key to decrypt the first encrypted communication data to obtain the first data.
A second embodiment of the present invention provides an encrypted communication system of block link points, including: the system comprises a participating node, an ore mining node, a monitoring node and a target node which join a block chain network for the first time, wherein the participating node which joins the block chain network for the first time is used for signing a first user identifier and a first signature public key of the participating node by adopting a first signature private key of the participating node, and sending a first joining broadcast message to the block chain network after a timestamp is printed by a timestamp server; the mining node is used for analyzing the first join broadcast message to acquire the first user identifier and the first signature public key, searching whether the block chain account book currently stored in the local node has the first user identifier or not, if the first user identifier is detected to be absent, performing signature verification on the participating node through the first signature public key, and if the first join broadcast message passes the verification, writing the first join broadcast message into a new block and then broadcasting the new block chain network; the supervision node is configured to parse the received broadcast message of the new block, obtain the first user identifier and the first signature public key, generate a first encryption public key and a first encryption private key corresponding to the first user identifier, encrypt the first encryption private key by using the first signature public key to generate first encrypted data, sign the first encrypted data, the first encryption public key, and the first user identifier by using the signature private key of the supervision node, and send a first key configuration broadcast message to the block chain network; the participating node is further configured to parse the received first key configuration broadcast message, obtain the first encrypted data and the first encrypted public key corresponding to the first user identifier, and decrypt the first encrypted data by using the first signature private key to obtain the first encrypted private key; the target node is configured to analyze the received first key configuration broadcast message, obtain the first encryption public key corresponding to the first user identifier, encrypt, with the first encryption public key, first data sent to the participating node to generate first encrypted communication data, sign, with a second signature private key of the target node, and send the first encrypted communication data to the participating node; the participating node is further configured to analyze the content of the block chain to obtain a second signature public key corresponding to a second user identifier of the target node, apply the second signature public key to perform signature verification on first encrypted communication data sent by the target node, and if the verification is passed, apply the first encryption private key to decrypt the first encrypted communication data to obtain the first data.
A third embodiment of the present invention provides a computer apparatus including: the block chain node encryption communication method comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein when the processor executes the computer program, the encryption communication method of the block chain node is realized.
A fourth embodiment of the present invention provides a non-transitory computer-readable storage medium having stored thereon a computer program that, when executed by a processor, implements the encrypted communication method of a blockchain node as described in the above embodiments.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
the identity verification of newly participating nodes of the block chain network is realized based on a public key certificate technology, illegal nodes are prevented from being disguised as legal nodes to access the block chain network, moreover, an introduced supervision node distributes an encryption key pair for each authenticated node based on the public key certificate technology, the communication interaction between the nodes based on the encryption key pair is ensured, a safe communication channel of node time is established, and the communication safety of the block chain network is ensured.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which,
fig. 1 is a schematic structural diagram of an encrypted communication system of a blockchain node according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an encrypted communication system of a blockchain node according to another embodiment of the present invention;
fig. 3 is an interaction diagram of an encrypted communication system of blockchain nodes according to one embodiment of the present invention;
fig. 4 is an interaction diagram of an encrypted communication system of blockchain nodes according to another embodiment of the present invention;
fig. 5 is a flow chart of a method of encrypted communication of blockchain nodes according to one embodiment of the present invention; and
fig. 6 is a flowchart of an encrypted communication method of a blockchain node according to another embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
Based on the analysis, the confidentiality of the communication of the existing block chain network is not strong, the safety of the communication cannot be guaranteed, and in order to solve the technical problem, the public key certificate technology is introduced, and the public key certificate technology does not need to maintain a directory containing names and public keys, so that the public key distribution mode is safer.
Specifically, the present invention provides an encryption communication system of block chain nodes, as shown in fig. 1, in the encryption communication system of block chain nodes provided by the present invention, a block chain network includes, in addition to nodes with the same status (mining nodes), a supervisor node, which serves as an initiator of the block chain, distributes an encryption private key for security of a new participating node of each block chain, so as to supervise security of all mining nodes, wherein if a new participating node joins successfully, the new mining node is a new mining node.
That is to say, in the embodiment of the present invention, the node of the blockchain is subjected to identity authentication and encrypted transmission of information based on a public key certificate technology, the core of the public key certificate technology is a pair of keys (in the present invention, a first encrypted public key and a first encrypted private key are represented), and the basic principle is as follows: information content encrypted by one key can only be decrypted by another key with which it is paired. The first encryption public key can be widely issued to correspondent, namely the mining node, and the first encryption private key needs to be stored safely. In use, the target node can encrypt the transaction information by using the first signature public key of the participating node and transmit the encrypted transaction information to the participating node, and the participating node can use the first signature private key of the participating node to complete decryption.
An encrypted communication method and system of a blockchain node according to an embodiment of the present invention are described below with reference to the drawings.
In order to make the flow of the encryption communication method of the blockchain node of the embodiment of the present invention clearer for those skilled in the art, the following description focuses on an embodiment of an encryption communication system of blockchain nodes, as shown in fig. 2, the system includes a participating node 100, a mining node 200, a supervising node 300 and a target node 210, which join a blockchain network for the first time, where the target node 210 is the mining node 200 communicating with the participating node 100, the supervising node 300 is usually an initiator of the blockchain, and in many scenarios, such as financial transactions and intra-enterprise communication, the involved encryption must be able to be effectively supervised, and the supervising node 300 is used as a supervisor to implement a corresponding supervision function, and it can be understood that the supervising node 300 is higher in level than other nodes.
In the encrypted communication of the block link points, the target node 210 is the mining node 200 communicating with the participating node 100, and the communication flow of the supervisory node 300 is shown in fig. 3, wherein the target node 210 and the mining node 200 are identified by using the same main body as that of the mining node 200 communicating with the participating node 100:
referring to fig. 3, in the embodiment of the present invention, a participating node that joins in a blockchain network for the first time signs a first user identifier and a first signature public key of the participating node using a first signature private key of the participating node, and sends a first join broadcast message to the blockchain network after a timestamp is stamped by a timestamp server (step 11), a mining node analyzes the first join broadcast message to obtain the first user identifier and the first signature public key, and searches whether a blockchain account book currently stored by a local node has the first user identifier, if it is detected that the first user identifier does not exist, the participating node is signed and verified by the first signature public key, and if the first user identifier does not exist, the participating node is verified to be legitimate, so that the first join broadcast message is written into a new block and then broadcast to the blockchain network (step 12).
And then, the supervision node analyzes the received broadcast message of the new block, acquires a first user identifier and a first signature public key, generates a first encryption public key and a first encryption private key corresponding to the first user identifier, encrypts the first encryption private key by using the first signature public key to generate first encryption data, signs the first encryption data, the first encryption public key and the first user identifier by using the signature private key of the supervision node, and sends a first key configuration broadcast message to the block chain network (step 13).
In step 3, as shown in fig. 3, if the presence of the first subscriber identity is detected, it indicates that the participating node already exists, so as to discard the first join broadcast message. In this embodiment, if two join broadcast messages containing the same user identifier are received, the user identifier with the later timestamp is discarded, so as to avoid the repeated joining of the participating nodes.
The participating node analyzes the received first key configuration broadcast message, acquires first encrypted data and a first encrypted public key corresponding to the first user identifier, and decrypts the first encrypted data by using the first signature private key to acquire a first encrypted private key (step 14).
The target node analyzes the received first key configuration broadcast message, acquires a first encryption public key corresponding to the first user identifier, encrypts first data sent to the participating node by using the first encryption public key to generate first encrypted communication data, signs by using a second signature private key of the target node, and sends the first encrypted communication data to the participating node (step 15).
The participating node analyzes the content of the block chain to obtain a second signature public key corresponding to a second user identifier of the target node, the second signature public key is applied to carry out signature verification on first encrypted communication data sent by the target node, if the verification is passed, the target node is legal, the first encrypted communication data is decrypted by the first encryption private key to obtain first data, and therefore the secure communication between the participating node and the target node is completed based on the first encryption private key and the first encryption public key which are matched with each other (step 16).
In an embodiment of the present invention, in order to more fully embody the operation flow of the system, the following description is focused on a target node side, where, referring to fig. 4, a target node joining in a blockchain network for the first time signs a second user identifier and a second signature public key of the target node with a second signature private key of the target node, sends a second join broadcast message to the blockchain network after stamping a timestamp through a timestamp server (step 21), a mining node analyzes the second join broadcast message sent by the target node joining in the blockchain network for the first time to obtain the second user identifier and the second signature public key, and retrieves whether a blockchain account book currently stored in a local node has the second user identifier, if detecting that the second user identifier does not exist, performs signature verification on the target node through the second signature public key, and if the second user identifier does not exist, the second join broadcast message is written to the new block and broadcast to the blockchain network (step 22).
Similarly, the supervision node analyzes the received broadcast message of the new block, acquires a second user identifier and a second signature public key, generates a second encryption public key and a second encryption private key corresponding to the second user identifier, encrypts the second encryption private key by using the second signature public key to generate second encryption data, signs the second encryption data, the second encryption public key and the second user identifier by using the signature private key of the supervision node, and sends a second key configuration broadcast message to the block chain network (step 23).
The participating node analyzes the second key configuration broadcast message, acquires a second encryption public key corresponding to the second user identifier, encrypts second data sent to the target node by using the second encryption public key to generate second encrypted communication data, signs by using the first signature private key, and sends the second encrypted communication data to the target node (step 24).
And finally, the target node analyzes the block chain content to obtain a first signature public key corresponding to the first user identifier of the participating node, the first signature public key is applied to carry out signature verification on second encrypted communication data sent by the participating node, and if the second encrypted communication data passes the verification, the second encrypted communication data is decrypted by using a second encryption private key configured for the target node by the supervision node to obtain second data (step 25).
Therefore, the encryption communication system of the blockchain node in the embodiment of the invention combines the public key certificate scheme with the blockchain network, ensures the communication safety of the blockchain network, and ensures the operation stability of the blockchain network by carrying out overall supervision based on the supervision node.
In order to describe details of the implementation of the encryption communication system of the blockchain node according to the embodiment of the present invention in more detail, so that those skilled in the art will be clearer about the encryption communication process of the blockchain node according to the present invention, the following description focuses on details of the communication process on the encryption communication method side of the blockchain node.
Fig. 5 is a flowchart of an encrypted communication method of a blockchain node according to an embodiment of the present invention, as shown in fig. 5, the method including:
step 101, joining a participating node of a blockchain network for the first time, signing a first user identifier and a first signature public key of the participating node by using a first signature private key of the participating node, and sending a first joining broadcast message to the blockchain network after a timestamp is printed by a timestamp server.
It can be understood that, due to the application requirements and the development of the blockchain, the nodes in the blockchain network are not fixed, the blockchain network allows new participating nodes to join, and in order to verify the validity of the participating nodes that join for the first time and prevent illegal devices from falsely joining the blockchain network with the participating nodes to intercept related transaction information, in the embodiment of the present invention, the validity is verified based on a public key certificate mechanism.
Specifically, a participating node of the blockchain network is added for the first time, and the first signature private key of the participating node is used to sign the first user identifier and the first signature public key of the participating node, obviously, after receiving the first user identifier and the first signature public key in the first broadcast message, other nodes in the blockchain network can authenticate the identity of the new participating node based on the first signature public key and the first user identifier, and the principle of the identity authentication will be described in the subsequent steps.
The first user identifier may be information that uniquely identifies the participating node, such as a device identifier and a network access permission number of the participating node.
Of course, in order to ensure the validity and security of the participating nodes after being allowed to join the blockchain network in the actual implementation process, the time marking is also performed on the first broadcast message.
In one embodiment of the invention, a timestamp is printed by a timestamp server and a first join broadcast message is sent to a blockchain network, so that if two join broadcast messages containing the same user identification are received by a mining node, the user identification behind the timestamp is discarded, and other illegal nodes are prevented from pretending to be participating nodes to try to join the blockchain network or intercept related transaction information by intercepting the user identification.
It should be noted that, in the embodiment of the present invention, according to the distance between the participating node and the mining node and the difference of the network connection conditions, the manner of sending the first broadcast message by the participating node may be infrared, bluetooth, NFC (near field Communication), WiFi, and the like.
102, the mining node analyzes the first join broadcast message to acquire a first user identifier and a first signature public key, searches whether the block chain account book currently stored by the local node has the first user identifier, if the first user identifier is detected to be absent, performs signature verification on the join node through the first signature public key, and if the first join broadcast message passes the signature verification, writes the first join broadcast message into a new block and broadcasts the new block chain account to the block chain network.
Specifically, the mining node analyzes the first join broadcast message to obtain a first user identifier and a first signature public key, in order to ensure that the join node is a valid and legal node, whether the first user identifier exists in a block chain account book currently stored in the local node is searched, if the first user identifier does not exist, the node is determined as a newly participating node, and therefore signature verification is performed on the join node through the first signature public key, and the join node is prevented from being falsely identified as the join node by other illegal devices.
The first signature public key and the signature are mutually decryption passwords based on a public key certificate technology, only a first signature private key owned by the participating node can correspond to data encrypted by the first signature public key, so that the participating node is signed and verified by the first signature public key, if the verification is passed, the corresponding signature corresponds to the first signature public key, for example, after the first signature public key is sent to the participating node corresponding to the first user identifier, the first signature private key in the participating node is matched with the first signature public key, for example, after the data encrypted by the signature public key is sent to the participating node corresponding to the first user identifier, the first signature private key in the participating node can decrypt the data, therefore, after the verification is passed, the data is broadcasted to the whole network based on an operation mechanism of a block chain network so as to obtain the record of the event by the whole network node, and the mining node writes the first join broadcast message into the new block and broadcasts the new block to the block chain network.
In an embodiment of the present invention, if it is detected that the first subscriber identity exists, the first join broadcast message is discarded, so as to avoid repeated writing of the participating node.
Step 103, the supervision node analyzes the received broadcast message of the new block, obtains the first user identifier and the first signature public key, and generates a first encryption public key and a first encryption private key corresponding to the first user identifier.
After the participating node is successfully written into the block, the participating node is indicated to be successfully accessed into the block chain network as a new mining node, so that in order to enable the participating node to safely communicate with other nodes, the supervision node allocates the corresponding encryption key pair to the node participating in the first time, the participating node can conveniently communicate with other mining nodes based on the encryption key pair allocated by the supervision node, and the communication safety is ensured.
Specifically, the supervision node analyzes the received broadcast message of the new block, acquires a first user identifier and a first signature public key, and generates a first encryption public key and a first encryption private key corresponding to the first user identifier, so as to complete generation of an encryption key pair of the participating node.
In different application scenarios, the manner in which the supervisory node generates the first encryption public key and the first encryption private key includes, but is not limited to, generation using a Certificate Authority (CA), and the like.
And 104, the supervision node encrypts the first encryption private key by using the first signature public key to generate first encryption data, signs the first encryption data, the first encryption public key and the first user identifier by using the signature private key of the supervision node, and then sends a first key configuration broadcast message to the blockchain network.
Specifically, the supervision node encrypts the first encryption private key by using the first signature public key to generate first encryption data, and signs the first encryption data, the first encryption public key and the first user identifier by using the signature private key of the supervision node and then sends a first key configuration broadcast message to the blockchain network, so that although the nodes in the blockchain network can receive the first encryption data, the supervision node encrypts the first encryption private key by using the first signature public key to generate the first encryption data, only a participating node which owns the first signature private key corresponding to the first signature public key can decrypt the corresponding first encryption private key, and the first encryption private key is guaranteed to be uniquely owned by the participating node.
In addition, the first encrypted public key and the first user identification are sent in a broadcast mode, so that the mining node receiving the broadcast message can store the first encrypted public key corresponding to the first user identification conveniently, and a reliable safe channel is provided for the mining node to communicate with the participating nodes. And the signature private key of the supervision node is used for signing the first key configuration information, so that the situation that the illegal terminal pretends that the supervision node distributes false information to influence the communication safety is avoided.
Step 105, the participating node analyzes the received first key configuration broadcast message, obtains first encrypted data and a first encrypted public key corresponding to the first user identifier, and decrypts the first encrypted data by using the first signature private key to obtain the first encrypted private key.
Specifically, the participating node analyzes the received first key configuration broadcast message, and acquires first encrypted data and a first encrypted public key corresponding to the first user identifier, so that the first encrypted data is decrypted by using the first signature private key which is uniquely owned, and the first encrypted private key is acquired.
And 106, the target node analyzes the received first key configuration broadcast message, acquires a first encryption public key corresponding to the first user identifier, encrypts first data sent to the participating node by using the first encryption public key to generate first encrypted communication data, signs by using a second signature private key of the target node, and sends the first encrypted communication data to the participating node.
And 107, the participating node analyzes the block chain content to obtain a second signature public key corresponding to a second user identifier of the target node, applies the second signature public key to perform signature verification on the first encrypted communication data sent by the target node, and if the verification is passed, applies the first encryption private key to decrypt the first encrypted communication data to obtain the first data.
Based on the above analysis, it is obvious that the supervisory node provides a secure channel for communication between nodes by distributing an encryption key pair for each node in the blockchain network, so that the nodes communicate based on a public key certificate mechanism.
Specifically, the target node analyzes the received first key configuration broadcast message, acquires a first encryption public key corresponding to the first user identifier, encrypts first data sent to the participating node by using the first encryption public key to generate first encrypted communication data, and sends the first encrypted communication data to the participating node after signing by using a second signature private key of the target node in order to realize bidirectional security of the secure channel.
Based on a consensus mechanism of the block chain network, a second signature public key generated in advance by a target node is recorded in a generated block chain, so that the participating node analyzes the content of the block chain to obtain a second signature public key corresponding to a second user identifier of the target node, the second signature public key is applied to perform signature verification on first encrypted communication data sent by the target node, if the verification is passed, for example, if the second signature public key corresponds to the second signature private key, the identity verification on the target node is successful, and the first encrypted communication data is decrypted by the first private key to obtain the first data.
In order to more fully describe the method for encrypted communication of a blockchain node according to an embodiment of the present invention, a process of adding a blockchain to a target node is described below with reference to the accompanying drawings.
Fig. 6 is a flowchart of an encrypted communication method of a blockchain node according to another embodiment of the present invention, as shown in fig. 6, before the step 107, the method further includes:
step 201, a target node of the blockchain network is added for the first time, a second signature private key of the target node is used for signing a second user identifier and a second signature public key of the target node, and a second adding broadcast message is sent to the blockchain network after a timestamp is printed by a timestamp server.
And on the basis of the same mode of accessing the new participating node, the target node of the block chain network is added for the first time, the second signature private key of the target node is adopted to sign the second user identifier and the second signature public key of the target node, and a timestamp is printed by a timestamp server to send a second adding broadcast message to the block chain network, so that the mining node can verify the validity and validity of the target node.
Step 202, the mining node analyzes a second join broadcast message sent by the target node joining the blockchain network for the first time to obtain a second user identifier and a second signature public key, searches whether the blockchain account book currently stored in the local node has the second user identifier, if the second user identifier is detected to be absent, the target node is signed and verified through the second signature public key, and if the second user identifier is verified to be absent, the second join broadcast message is written into a new block and then is broadcasted to the blockchain network.
Specifically, the mining node analyzes a second join broadcast message sent by a target node joining a block chain network for the first time to obtain a second user identifier and a second signature public key, searches whether a block chain account book currently stored by a local node has the second user identifier to determine the validity of the target node, if the second user identifier does not exist, the target node is shown to be absent in the current block chain network and is a new node which can be joined, further, in order to verify the validity of the target node and avoid other illegal devices from falsifying the target node, signature verification is carried out on the target node through the second signature public key, and if the second user identifier passes the verification, the target node is shown to be a legal node, so that the second join broadcast message is written into a new block and then is broadcasted to the block chain network.
With continued reference to fig. 6, the supervising node assigns a pair of encryption keys based on the newly joined target node to ensure that the establishment of a secure channel of communication in the blockchain network is complete. Further, in an embodiment of the present invention, after the step 202, the method further includes:
step 203, the supervision node analyzes the received broadcast message of the new block, obtains a second user identifier and a second signature public key, and generates a second encryption public key and a second encryption private key corresponding to the second user identifier.
Specifically, the supervision node analyzes the received broadcast message of the new block, acquires a second user identifier and a second signature public key, and generates a second encryption public key and a second encryption private key corresponding to the second user identifier, so as to complete distribution of the block encryption key pair of the target node.
And step 204, the supervision node encrypts the second encryption private key by using the second signature public key to generate second encryption data, signs the second encryption data, the second encryption public key and the second user identifier by using the signature private key of the supervision node, and then sends a second key configuration broadcast message to the blockchain network.
Specifically, the supervision node encrypts the second encryption private key by using the second signature public key to generate second encryption data, so that the second encryption private key can only be obtained by a target node with the second signature private key, directional distribution of the second encryption private key is guaranteed, and in order to further establish a secure communication channel between the target node and other mining nodes, the signature private key of the supervision node is used for signing the second encryption data, the second encryption public key and the second user identifier and then sending a second key configuration broadcast message to the block chain network.
Step 205, the participating node analyzes the second key configuration broadcast message, obtains a second encryption public key corresponding to the second user identifier, encrypts second data sent to the target node by using the second encryption public key to generate second encrypted communication data, signs by using the first signature private key, and sends the second encrypted communication data to the target node.
Specifically, the participating node analyzes the broadcast message configured by the second key, and since the second user identifier and the second encrypted public key are both sent in a broadcast manner, the participating node can obtain the second encrypted public key corresponding to the second user identifier, so that the second encrypted public key is applied to encrypt the second data sent to the target node to generate second encrypted communication data, and the second encrypted communication data is sent to the target node after being signed by the first signature private key, so that only the target node with the second encrypted private key can decrypt the second encrypted communication data, and the communication security is ensured.
And step 206, the target node analyzes the block chain content to obtain a first signature public key corresponding to the first user identifier of the participating node, applies the first signature public key to perform signature verification on second encrypted communication data sent by the participating node, and if the second encrypted communication data passes the signature verification, applies a second encryption private key configured by the supervision node for the target node to decrypt the second encrypted communication data to obtain second data.
Specifically, since the first signature public key of the participating node that has been verified to be legitimate and successfully joins the blockchain network has been written into the previously generated blockchain content, the target node parses the blockchain content to obtain the first signature public key corresponding to the first user identifier of the participating node, applies the first signature public key to perform signature verification on the second encrypted communication data sent by the participating node, and if the verification passes, it is indicated that the participating node is a legitimate node but not disguised by other illegitimate nodes, so that the second encrypted communication data is decrypted by using the second encryption private key configured by the supervisory node for the target node to obtain the second data.
To sum up, the encryption communication method for the blockchain nodes according to the embodiment of the present invention implements authentication of a newly participating node of the blockchain network based on a public key certificate technology, prevents an illegal node from being disguised as a legal node to access the blockchain network, and allocates an encryption key pair to each authenticated node by an introduced supervisory node based on the public key certificate technology, thereby ensuring communication interaction between the nodes based on the encryption key pair, establishing a secure communication channel of node time, and ensuring communication security of the blockchain network.
In order to implement the foregoing embodiments, the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the computer device implements the encryption communication method of the blockchain node as described in the foregoing embodiments.
In order to implement the above embodiments, the present invention also proposes a non-transitory computer-readable storage medium having stored thereon a computer program which, when executed by a processor, is capable of implementing the encrypted communication method of the blockchain node as described in the foregoing embodiments.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (12)

1. A method for encrypted communication of block link points, comprising:
a participating node joining a block chain network for the first time signs a first user identifier and a first signature public key of the participating node by adopting a first signature private key of the participating node, and sends a first joining broadcast message to the block chain network after a timestamp is printed by a timestamp server;
the mining node analyzes the first join broadcast message to obtain the first user identification and the first signature public key, searches whether a block chain account book currently stored by a local node has the first user identification, if the first user identification is detected to be absent, the participating node is subjected to signature verification through the first signature public key, and if the first join broadcast message passes the verification, the first join broadcast message is written into a new block and then is broadcast to the block chain network;
the supervision node analyzes the received broadcast message of the new block, acquires the first user identifier and the first signature public key, and generates a first encryption public key and a first encryption private key corresponding to the first user identifier;
the supervision node encrypts the first encryption private key by using the first signature public key to generate first encryption data, signs the first encryption data, the first encryption public key and the first user identification by using the signature private key of the supervision node, and then sends a first key configuration broadcast message to the block chain network;
the participating node analyzes the received first key configuration broadcast message, acquires the first encrypted data and the first encrypted public key corresponding to the first user identifier, and decrypts the first encrypted data by using the first signature private key to acquire the first encrypted private key;
the target node analyzes the received first key configuration broadcast message, acquires the first encryption public key corresponding to the first user identifier, encrypts first data sent to the participating node by using the first encryption public key to generate first encrypted communication data, signs by using a second signature private key of the target node, and sends the first encrypted communication data to the participating node;
and the participating node analyzes the block chain content to obtain a second signature public key corresponding to a second user identifier of the target node, applies the second signature public key to carry out signature verification on first encrypted communication data sent by the target node, and if the verification is passed, applies the first encryption private key to decrypt the first encrypted communication data to obtain the first data.
2. The method of claim 1, wherein after said retrieving whether the first subscriber identity exists for a blockchain ledger currently stored by a local node, further comprising:
and if the first user identification is detected to exist, discarding the first joining broadcast message.
3. The method of claim 1, further comprising:
and if the mining node receives two join broadcast messages containing the same user identification, discarding the user identification with the later timestamp.
4. The method of claim 1, wherein prior to the participating node parsing blockchain content to obtain a second public signature key corresponding to a second subscriber identity of the target node, further comprising:
a target node of the blockchain network is added for the first time, a second signature private key of the target node is adopted to sign a second user identification and a second signature public key of the target node, and a second adding broadcast message is sent to the blockchain network after a timestamp is printed by a timestamp server;
and the mining node analyzes a second join broadcast message sent by the target node joining the block chain network for the first time to acquire a second user identification and a second signature public key, searches whether a block chain account book currently stored in a local node has the second user identification, if the second user identification is detected to be absent, the target node is signed and verified through the second signature public key, and if the second user identification is verified to be absent, the second join broadcast message is written into a new block and then is broadcast to the block chain network.
5. The method of claim 4, further comprising:
the supervision node analyzes the received broadcast message of the new block, acquires the second user identifier and the second signature public key, and generates a second encryption public key and a second encryption private key corresponding to the second user identifier;
the supervision node encrypts the second encryption private key by using the second signature public key to generate second encryption data, signs the second encryption data, the second encryption public key and the second user identification by using the signature private key of the supervision node, and then sends a second key configuration broadcast message to the block chain network;
the participating node analyzes the second key configuration broadcast message, acquires a second encryption public key corresponding to the second user identifier, encrypts second data sent to the target node by using the second encryption public key to generate second encrypted communication data, signs by using the first signature private key and sends the second encrypted communication data to the target node;
the target node analyzes the block chain content to obtain a first signature public key corresponding to a first user identifier of the participating node, the first signature public key is applied to carry out signature verification on second encrypted communication data sent by the participating node, and if the verification is passed, the second encrypted communication data is decrypted by applying a second encryption private key configured for the target node by the supervision node to obtain the second data.
6. A block-linked point encrypted communications system, comprising: participating nodes, mining nodes, supervision nodes and target nodes of a blockchain network are added for the first time, wherein,
the participating node joining the blockchain network for the first time is used for signing a first user identifier and a first signature public key of the participating node by adopting a first signature private key of the participating node, and sending a first joining broadcast message to the blockchain network after a timestamp is printed by a timestamp server;
the mining node is used for analyzing the first join broadcast message to acquire the first user identifier and the first signature public key, searching whether the block chain account book currently stored in the local node has the first user identifier or not, if the first user identifier is detected to be absent, performing signature verification on the participating node through the first signature public key, and if the first join broadcast message passes the verification, writing the first join broadcast message into a new block and then broadcasting the new block chain network;
the supervision node is configured to parse the received broadcast message of the new block, obtain the first user identifier and the first signature public key, generate a first encryption public key and a first encryption private key corresponding to the first user identifier, encrypt the first encryption private key by using the first signature public key to generate first encrypted data, sign the first encrypted data, the first encryption public key, and the first user identifier by using the signature private key of the supervision node, and send a first key configuration broadcast message to the block chain network;
the participating node is further configured to parse the received first key configuration broadcast message, obtain the first encrypted data and the first encrypted public key corresponding to the first user identifier, and decrypt the first encrypted data by using the first signature private key to obtain the first encrypted private key;
the target node is configured to analyze the received first key configuration broadcast message, obtain the first encryption public key corresponding to the first user identifier, encrypt, with the first encryption public key, first data sent to the participating node to generate first encrypted communication data, sign, with a second signature private key of the target node, and send the first encrypted communication data to the participating node;
the participating node is further configured to analyze the content of the block chain to obtain a second signature public key corresponding to a second user identifier of the target node, apply the second signature public key to perform signature verification on first encrypted communication data sent by the target node, and if the verification is passed, apply the first encryption private key to decrypt the first encrypted communication data to obtain the first data.
7. The system of claim 6, wherein the mining node is further configured to:
and if the first user identification is detected to exist, discarding the first joining broadcast message.
8. The system of claim 6, wherein the mining node is further configured to:
and if two join broadcast messages containing the same user identification are received, discarding the user identification with the later timestamp.
9. The system of claim 6, further comprising:
the target node is added into the block chain network for the first time, and is used for signing a second user identifier and a second signature public key of the target node by adopting a second signature private key of the target node, and sending a second adding broadcast message to the block chain network after a timestamp is printed by a timestamp server;
and the mining node is further configured to analyze a second join broadcast message sent by the target node joining the block chain network for the first time to obtain a second user identifier and a second signature public key, retrieve whether the block chain account book currently stored in the local node has the second user identifier, if the second user identifier is detected to be absent, perform signature verification on the target node through the second signature public key, and if the second user identifier is detected to be absent, write the second join broadcast message into a new block and then broadcast the new block chain network.
10. The system of claim 9,
the supervision node is further configured to parse the received broadcast message of the new block, acquire the second user identifier and the second signature public key, and generate a second encryption public key and a second encryption private key corresponding to the second user identifier;
the supervision node is further configured to encrypt the second encryption private key by using the second signature public key to generate second encrypted data, and send a second key configuration broadcast message to the blockchain network after signing the second encrypted data, the second encryption public key, and the second user identifier by using the signature private key of the supervision node;
the participating node is further configured to parse the second key configuration broadcast message, obtain a second encryption public key corresponding to the second user identifier, encrypt second data sent to the target node by using the second encryption public key, generate second encrypted communication data, sign by using the first signature private key, and send the second encrypted communication data to the target node;
the target node is further configured to analyze the content of the block chain to obtain a first signature public key corresponding to a first user identifier of the participating node, apply the first signature public key to perform signature verification on second encrypted communication data sent by the participating node, and if the second encrypted communication data passes the signature verification, apply a second encryption private key configured by the supervising node for the target node to decrypt the second encrypted communication data to obtain the second data.
11. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of encrypted communication of block chain link points as claimed in any one of claims 1 to 5 when executing the computer program.
12. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a method of encrypted communication of block link points according to any one of claims 1 to 5.
CN201810511352.1A 2018-05-25 2018-05-25 Encryption communication method and system for block chain node Expired - Fee Related CN108737430B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810511352.1A CN108737430B (en) 2018-05-25 2018-05-25 Encryption communication method and system for block chain node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810511352.1A CN108737430B (en) 2018-05-25 2018-05-25 Encryption communication method and system for block chain node

Publications (2)

Publication Number Publication Date
CN108737430A CN108737430A (en) 2018-11-02
CN108737430B true CN108737430B (en) 2020-07-17

Family

ID=63936139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810511352.1A Expired - Fee Related CN108737430B (en) 2018-05-25 2018-05-25 Encryption communication method and system for block chain node

Country Status (1)

Country Link
CN (1) CN108737430B (en)

Families Citing this family (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110020513B (en) * 2018-11-07 2023-08-22 创新先进技术有限公司 Signature recording method, signature verification device and storage medium
CN109951286A (en) * 2018-11-15 2019-06-28 陕西医链区块链集团有限公司 Encryption authentication system and method for medical block chain communication system
DE102018130297A1 (en) * 2018-11-29 2020-06-04 Infineon Technologies Ag Proof of work concept for a vehicle
CN111275274A (en) * 2018-12-03 2020-06-12 中国电信股份有限公司 Supervision management method and system
CN109767325A (en) * 2018-12-13 2019-05-17 重庆金融资产交易所有限责任公司 Method of commerce, device and computer readable storage medium based on block chain
CN109729080B (en) * 2018-12-20 2021-05-11 全链通有限公司 Access attack protection method and system based on block chain domain name system
CN109889496A (en) * 2019-01-11 2019-06-14 平安科技(深圳)有限公司 Communication means, device and electronic equipment between chain exterior node and block chain node
CN109617699A (en) * 2019-01-16 2019-04-12 北京沃东天骏信息技术有限公司 A kind of key generation method, block chain network service platform and storage medium
CN110049043B (en) * 2019-04-17 2021-07-27 江苏全链通信息科技有限公司 Server log monitoring method and system based on block chain
CN111835519A (en) * 2019-04-19 2020-10-27 四川大学 Covert communication method based on public block chain
CN110190964B (en) * 2019-05-16 2022-03-15 苏州科达科技股份有限公司 Identity authentication method and electronic equipment
CN110264200B (en) * 2019-05-29 2021-11-19 中国工商银行股份有限公司 Block chain data processing method and device
CN112187781A (en) * 2019-06-03 2021-01-05 魏靖 Block chain data processing method
CN110363510B (en) * 2019-06-05 2022-09-06 西安电子科技大学 Encryption currency user feature mining and abnormal user detection method based on block chain
CN110535848B (en) * 2019-08-22 2022-07-26 腾讯科技(深圳)有限公司 Information storage method and device
CN110852750A (en) * 2019-11-14 2020-02-28 国网山东省电力公司潍坊市寒亭区供电公司 Power transmission tower monitoring system and monitoring method
CN112910633B (en) * 2019-12-03 2023-05-23 微观(天津)科技发展有限公司 Data processing method and device applied to blockchain node and storage medium
CN111065101A (en) * 2019-12-30 2020-04-24 全链通有限公司 5G communication information encryption and decryption method and device based on block chain and storage medium
CN111614678B (en) * 2020-05-22 2022-07-29 中国联合网络通信集团有限公司 Anti-disclosure method, anti-disclosure device and encryption device
CN111756743B (en) * 2020-06-24 2021-12-14 腾讯科技(深圳)有限公司 Resource transfer method and device based on block chain, computer equipment and storage medium
CN111770101B (en) * 2020-07-01 2022-05-13 中国银行股份有限公司 System and method for accessing block chain network
CN111885053B (en) * 2020-07-22 2022-09-20 东莞盟大集团有限公司 Data processing method and device based on block chain and computer equipment
CN112182626B (en) * 2020-10-19 2024-03-22 苏州智慧精融供应链科技发展有限公司 Supply chain financial risk management system based on blockchain technology
CN112507391B (en) * 2020-12-01 2024-01-30 杭州企达信息技术有限公司 Block chain-based electronic signature method, system, device and readable storage medium
CN113179165B (en) * 2021-03-25 2022-08-05 广东工业大学 Block chain-based mobile network key management and communication method, device and medium
CN113507495B (en) * 2021-05-31 2022-03-25 暨南大学 Vehicle-mounted Ethernet secure communication method and system based on block chain
GB2608840A (en) * 2021-07-13 2023-01-18 Nchain Licensing Ag Message exchange system
CN113612616A (en) * 2021-07-27 2021-11-05 北京沃东天骏信息技术有限公司 Vehicle communication method and device based on block chain
CN113709128A (en) * 2021-08-19 2021-11-26 山东新一代信息产业技术研究院有限公司 IROS system communication method and device based on block chain
CN113709725B (en) * 2021-08-25 2023-03-24 中国联合网络通信集团有限公司 Number portability method, operator node and computer readable medium
CN113852469B (en) * 2021-09-24 2024-03-22 成都质数斯达克科技有限公司 Method, device, equipment and readable storage medium for transmitting data between block chain nodes
CN114285555A (en) * 2021-12-15 2022-04-05 支付宝(杭州)信息技术有限公司 Multicast method and device based on block chain
CN114422118A (en) * 2021-12-17 2022-04-29 浙江中控技术股份有限公司 Industrial controller multicast communication key distribution method and system
CN114334110B (en) * 2021-12-28 2023-01-17 中国联合网络通信集团有限公司 Reservation method, block chain system, electronic device and computer readable medium
CN115150071B (en) * 2022-06-20 2024-10-01 中国联合网络通信集团有限公司 Identity authentication method, device, equipment and storage medium
CN115189972A (en) * 2022-09-13 2022-10-14 四块科技(深圳)有限公司 Method and device for guaranteeing safe excavation of nodes and storage medium
CN115714666B (en) * 2022-10-19 2023-08-04 上海蜂高科技有限公司 Encryption method based on robot communication and block chain consensus control
CN116032793B (en) * 2022-11-17 2024-04-02 中国联合网络通信集团有限公司 Information processing method, information processing device, electronic equipment and computer readable medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488675A (en) * 2015-11-25 2016-04-13 布比(北京)网络技术有限公司 Distributed shared general ledger construction method of block chain
CN105931052A (en) * 2016-04-21 2016-09-07 四川大学 Virtual currency transaction validation method based on block chain multi-factor cross-validation
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
WO2016200885A1 (en) * 2015-06-08 2016-12-15 Blockstream Corporation Cryptographically concealing amounts transacted on a ledger while preserving a network's ability to verify the transaction
CN106452785A (en) * 2016-09-29 2017-02-22 财付通支付科技有限公司 Block chain network, branch node and block chain network application method
CN106789908A (en) * 2016-11-23 2017-05-31 江苏通付盾科技有限公司 Block common recognition method for building up and system in block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016200885A1 (en) * 2015-06-08 2016-12-15 Blockstream Corporation Cryptographically concealing amounts transacted on a ledger while preserving a network's ability to verify the transaction
CN105488675A (en) * 2015-11-25 2016-04-13 布比(北京)网络技术有限公司 Distributed shared general ledger construction method of block chain
CN105931052A (en) * 2016-04-21 2016-09-07 四川大学 Virtual currency transaction validation method based on block chain multi-factor cross-validation
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106452785A (en) * 2016-09-29 2017-02-22 财付通支付科技有限公司 Block chain network, branch node and block chain network application method
CN106789908A (en) * 2016-11-23 2017-05-31 江苏通付盾科技有限公司 Block common recognition method for building up and system in block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Nikos Fotiou;George C. Polyzos.Decentralized name-based security for content distribution using blockchains.《2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)》.2016, *
基于区块链的IMIX传输系统的设计与实现;陈何清;《中国优秀硕士学位论文全文库 信息科技辑》;20161015;第I138-87页 *

Also Published As

Publication number Publication date
CN108737430A (en) 2018-11-02

Similar Documents

Publication Publication Date Title
CN108737430B (en) Encryption communication method and system for block chain node
CN108768630B (en) Encryption communication method and system for block chain node
CN108876374B (en) Block chain network identity document authentication method and system
US10554420B2 (en) Wireless connections to a wireless access point
CN108684041B (en) System and method for login authentication
CN107770159B (en) Vehicle accident data recording method and related device and readable storage medium
US20220394026A1 (en) Network identity protection method and device, and electronic equipment and storage medium
WO2018021708A1 (en) Public key-based service authentication method and system
CN113411190B (en) Key deployment, data communication, key exchange and security reinforcement method and system
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN111246474B (en) Base station authentication method and device
CN115277168B (en) Method, device and system for accessing server
CN111865993B (en) Identity authentication management method, distributed system and readable storage medium
CN104243452B (en) A kind of cloud computing access control method and system
CN116136911A (en) Data access method and device
CN110138558B (en) Transmission method and device of session key and computer-readable storage medium
CN114338091B (en) Data transmission method, device, electronic equipment and storage medium
US11240661B2 (en) Secure simultaneous authentication of equals anti-clogging mechanism
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN114422266A (en) IDaaS system based on dual verification mechanism
CN113965425B (en) Access method, device and equipment of Internet of things equipment and computer readable storage medium
Feng et al. Autonomous vehicles' forensics in smart cities
US11251943B2 (en) Sharing a secret between an isolated device and a network connected device
CN112242976B (en) Identity authentication method and device
CN112769789A (en) Encryption communication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing

Applicant after: IALLCHAIN Co.,Ltd.

Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing.

Applicant before: IALLCHAIN Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200717

Termination date: 20210525

CF01 Termination of patent right due to non-payment of annual fee