CN110740038A - Block chain and communication method, gateway, communication system and storage medium thereof - Google Patents

Block chain and communication method, gateway, communication system and storage medium thereof Download PDF

Info

Publication number
CN110740038A
CN110740038A CN201810786957.1A CN201810786957A CN110740038A CN 110740038 A CN110740038 A CN 110740038A CN 201810786957 A CN201810786957 A CN 201810786957A CN 110740038 A CN110740038 A CN 110740038A
Authority
CN
China
Prior art keywords
user
gateway
communication data
communication
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810786957.1A
Other languages
Chinese (zh)
Other versions
CN110740038B (en
Inventor
柴鹏辉
姜南
张伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201810786957.1A priority Critical patent/CN110740038B/en
Publication of CN110740038A publication Critical patent/CN110740038A/en
Application granted granted Critical
Publication of CN110740038B publication Critical patent/CN110740038B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The method comprises the steps of storing a user identifier and a user public key sent by a gateway in a block chain storage mode, responding to a link entering request sent by the gateway, searching the stored user public key by using the user identifier carried by the link entering request, decrypting signature data of communication data by using the searched user public key, comparing the decrypted communication data with the communication data requesting to enter the link, storing the communication data carried by the link entering request to the content corresponding to the user identifier if the comparison result is , and then distributing a chain code corresponding to the communication data.

Description

Block chain and communication method, gateway, communication system and storage medium thereof
Technical Field
The present disclosure relates to the field of communications, and in particular, to kinds of block chains, a communication method, a gateway, a communication system, and a storage medium thereof.
Background
The gateway provides communication interface to outside, and users can communicate through the gateway, the data of users and the gateway can be transmitted in the public network, and the security of data transmission is difficult to guarantee because the public network is open network environments.
Disclosure of Invention
technical problems to be solved by the present disclosure are to prevent the communication data from being tampered.
According to aspects of the present disclosure, blockchain-based communication methods are proposed, including:
the method comprises the steps that a user identification and a public key of the user are sent by a block chain storage gateway;
the block chain responds to a chaining request sent by the gateway, and searches the stored public key of the user by using the user identifier carried by the chaining request, wherein the chaining request carries the user identifier, communication data and signature data of the communication data, and the signature data of the communication data is obtained by signing the communication data by using a private key of the user;
the blockchain decrypts the signature data of the communication data carried by the chaining request by using the searched public key of the user, compares the decrypted communication data with the communication data requesting to be chained, and if the comparison result is , the authentication is passed;
under the condition that the block chain passes the authentication, storing the communication data carried by the chaining request to the content corresponding to the user identifier;
and the block chain is allocated with a chain code corresponding to the communication data.
Optionally, the identity of the user is an authorization code generated by the gateway for each session of the user.
According to still aspects of the present disclosure, blockchain-based communication methods are proposed, including:
the gateway acquires a public key of a user;
the gateway writes the identification of the user and the public key of the user into a block chain;
the gateway receives a communication request sent by a client of the user, wherein the communication request carries communication data, signature data of the communication data and an identifier of the user, and the signature data of the communication data is obtained by signing the communication data by using a private key of the user;
the gateway sends a chaining request to the block chain, wherein the chaining request carries the identification of the user, the communication data and the signature data of the communication data, so that the block chain carries out signature verification and chaining operation based on the information carried by the chaining request;
and the gateway records the chain code of the communication data in the block chain.
Optionally, the identity of the user is an authorization code generated by the gateway for each session of the user;
the communication method further comprises: and the gateway verifies the authorization code sent by the client of the user, and sends a chaining request to the block chain under the condition that the authorization code passes verification.
Optionally, the public key of the user is obtained by the gateway responding to an authorization request sent by the client of the user and decrypting the authorization request by using the private key of the gateway,
wherein the authorization request carries the public key of the user, and the authorization request is encrypted by the public key of the gateway.
Optionally, the public key of the gateway is obtained by the gateway responding to a registration request sent by the client of the user, verifying a user name and a password carried in the registration request, and returning the user name and the password to the client of the user when the user name and the password pass the verification.
Optionally, the public key and the private key of the gateway are generated by an authority that invokes the block chain.
Optionally, the communication method further includes:
the gateway decrypts the communication request with a private key of the gateway, wherein the communication request is encrypted by the user's client using a public key of the gateway.
According to still aspects of the present disclosure, blockchains for communication are presented, including a plurality of blockchain nodes;
wherein any blockchain nodes are configured to:
storing the user identification and the user public key sent by the gateway;
responding to a chaining request sent by the gateway, and searching a stored public key of the user by using the user identifier carried by the chaining request, wherein the chaining request carries the user identifier, communication data and signature data of the communication data, and the signature data of the communication data is obtained by signing the communication data by using a private key of the user;
decrypting the signature data of the communication data carried by the chaining request by using the searched public key of the user, comparing the decrypted communication data with the communication data requesting to be chained, and if the comparison result is correct, passing the authentication;
under the condition that the authentication is passed, storing the communication data carried by the chaining request to the content corresponding to the user identification;
and allocating the chain code corresponding to the communication data.
Optionally, the identity of the user is an authorization code generated by the gateway for each session of the user.
According to still aspects of the present disclosure, gateways for communication are presented, comprising:
the acquisition module is used for acquiring a public key of a user;
a write-in module, configured to write the identifier of the user and the public key of the user into a block chain;
the receiving module is used for receiving a communication request sent by a client of the user, wherein the communication request carries communication data, signature data of the communication data and an identifier of the user, and the signature data of the communication data is obtained by signing the communication data by using a private key of the user;
a sending module, configured to send a chaining request to the blockchain, where the chaining request carries the identifier of the user, the communication data, and the signature data of the communication data, so that the blockchain performs signature verification and chaining operation based on information carried by the chaining request;
and the recording module is used for recording the chain code of the communication data in the block chain.
Optionally, the identity of the user is an authorization code generated by the gateway for each session of the user;
the gateway further comprises: the sending module sends a send-in-chain request to the blockchain when the authorization code passes the verification.
Optionally, the public key of the user is obtained by the gateway responding to an authorization request sent by the client of the user and decrypting the authorization request by using the private key of the gateway,
wherein the authorization request carries the public key of the user, and the authorization request is encrypted by the public key of the gateway.
Optionally, the public key of the gateway is obtained by the gateway responding to a registration request sent by the client of the user, verifying a user name and a password carried in the registration request, and returning the user name and the password to the client of the user when the user name and the password pass the verification.
According to still aspects of the present disclosure, blockchains for communication are presented, including a plurality of blockchain nodes;
wherein, arbitrary block link points include:
a memory; and
a processor coupled to the memory, the processor configured to perform any of the aforementioned communication methods based on instructions stored in the memory.
According to still aspects of the present disclosure, gateways for communication are presented, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform any of the aforementioned communication methods based on instructions stored in the memory.
According to still another aspects of the present disclosure, a communication system is presented, comprising:
the gateway of any of ;
and the number of the first and second groups,
the blockchain of any item previously described.
According to yet another aspects of the present disclosure, computer readable storage media are proposed, having stored thereon a computer program that, when executed by a processor, implements the steps of any of the aforementioned communication method.
The scheme of the disclosure can confirm the integrity of the communication data, prevent the communication data from being tampered, and confirm the source of the communication data, so that the sender of the communication data cannot be repudiated.
Drawings
The drawings that will be used in the description of the embodiments or the related art will be briefly described below. The present disclosure will be more clearly understood from the following detailed description, which proceeds with reference to the accompanying drawings,
it should be apparent that the drawings in the following description are merely embodiments of the present disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without inventive exercise.
Fig. 1 is a flow chart of some embodiments of a blockchain-based communication method according to the present disclosure.
Fig. 2 is a flowchart illustrating another exemplary embodiments of the blockchain-based communication method of the present disclosure.
Fig. 3 is a schematic diagram of some embodiments of a communication system 300 according to the present disclosure.
Fig. 4 is a schematic diagram of some embodiments of the gateway 310 of the present disclosure.
Fig. 5 is a schematic diagram of some embodiments of a blockchain 320 of the present disclosure.
Fig. 6 is a schematic diagram of another embodiments of the gateway 310 or blockchain 320 of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure.
FIG. 1 is a flow chart of a communication method according to some embodiments of the present disclosure, as shown in FIG. 1, the method of the embodiments includes steps 110-150.
At step 110, the gateway obtains the public key of the user.
In embodiments, the user's public key and corresponding private key may be generated, for example, by the user's client.
In embodiments, the client of the user sends an authorization request to the gateway, where the authorization request carries the public key of the user, and the authorization request is encrypted by the public key of the gateway, thereby ensuring the security of the public key transmission of the user.
The public key of the gateway is used for responding a registration request sent by a client of a user, verifying a user name and a password carried in the registration request and returning the user name and the password to the client of the user under the condition that the user name and the password pass the verification.
The public key and the private key of the gateway may be generated by a Certificate Authority (CA) of the gateway call block chain, for example.
In step 120, the gateway writes the user's identification and the user's public key to the blockchain. The information in the blockchain is not easily tampered.
In step 130, the blockchain stores the user's identification and the user's public key sent by the gateway.
In step 140, the gateway receives a communication request sent by the client of the user, where the communication request carries communication data, signature data of the communication data, and an identifier of the user, and the signature data of the communication data is obtained by signing the communication data with a private key of the user.
In embodiments, the identifier of the user may be, for example, an authorization code generated by the gateway for each session of the user, the gateway sends the generated authorization code to the client of the user, the communication request sent by the client of the user may carry the authorization code, for example, the gateway verifies the authorization code sent by the client of the user, so as to confirm the validity of the session of the user, and if the authorization code is verified, the gateway performs the sending of the chaining request to the blockchain in step 140.
In embodiments, to further increase the security of information transfer, the communication request may be encrypted by the user's client using the gateway's public key and, in response, the gateway may decrypt the communication request using the gateway's private key.
In step 150, the gateway sends an inbound link request to the blockchain, where the inbound link request carries the user identifier, the communication data, and the signature data of the communication data.
In step 160, the blockchain performs signature verification and chaining operations based on the information carried by the chaining request.
Specifically, the stored public key of the user is found by using the user identifier carried by the chaining request, the signature data of the communication data is decrypted by using the public key of the user, the decrypted communication data and the communication data requesting to be chained are compared, if the comparison result is met and the authentication is passed, the communication data is written into the content corresponding to the user identifier in the block chain, the chain code of the communication data in the block chain is distributed and returned to the gateway, and if the comparison result is not , the authentication is not passed, and the communication data requesting to be chained can be discarded.
In embodiments, in order to reduce the amount of data to be transmitted and further to improve the security of data transmission, the chaining request may carry the user's identification, the communication data, and the signature data of the digest information of the communication data (i.e., the data obtained by signing the digest information of the communication data). correspondingly, the blockchain generates the digest information of the communication data requesting the chaining, decrypts the signature data of the digest information of the communication data using the user's public key, compares the decrypted digest information of the communication data with the generated digest information of the communication data requesting the chaining, and if the comparison result results, writes the communication data into the content corresponding to the user's identification in the blockchain.
The content written into the blockchain may be synchronized into the various nodes of the blockchain through a blockchain synchronization technique.
At step 170, the gateway records the chain code of the communication data in the block chain. The communication data of the corresponding user can be inquired from the block chain through the chain code.
The above-described embodiments can confirm the integrity of communication data, prevent the communication data from being tampered with, and can confirm the source of the communication data so that the sender of the communication data cannot be repudiated.
FIG. 2 is a flow chart of another embodiments of the communication method of the present disclosure, as shown in FIG. 2, the method of the present embodiment includes steps 210-2120.
In step 210, the gateway receives a registration request sent by a client of a user, where the registration request carries a user name and a password.
In step 220, the gateway verifies the user name and password carried in the registration request, and if the verification is passed, an authorization mechanism of the block chain is called to generate a public key and a private key of the gateway.
In step 230, if the registration is successful, the gateway returns a registration success response to the client, and the registration success response carries the public key of the gateway, so that the client obtains the public key of the gateway; if the registration fails, the gateway returns a registration failure response to the client.
In step 240, the client of the user generates the public key and the private key of the user, and sends an authorization request to the gateway, where the authorization request carries the public key of the user, and the authorization request is encrypted by the public key of the gateway, thereby ensuring the security of the public key transmission of the user.
In step 250, the gateway responds to the authorization request sent by the client of the user, decrypts the authorization request by using the private key of the gateway to obtain the public key of the user, and generates an authorization code of the session for the user. The gateway writes the authorization code of the user and the public key of the user into the block chain.
In step 260, the gateway returns an authorization response to the user's client, where the authorization response carries an authorization code, so that the user's client obtains the authorization code of the session.
In step 270, the gateway receives a communication request sent by the client of the user, where the communication request carries communication data, signature data of the communication data, and an authorization code of the user, and the signature data of the communication data is obtained by signing the communication data with a private key of the user.
In step 280, the gateway verifies the authorization code sent by the user's client to confirm the user's legitimacy.
In step 290, if the authorization code verification passes, the gateway sends a chaining request to the blockchain, where the chaining request carries the authorization code of the user, the communication data, and the signature data of the communication data.
In step 2100, the blockchain searches the stored public key of the user by using the authorization code of the user carried in the chaining request, decrypts the signature data of the communication data by using the public key of the user, compares the decrypted communication data with the communication data requesting to be chained, writes the communication data into the content corresponding to the user identifier in the blockchain if the comparison result is satisfied and the authentication is passed, distributes and returns the chain code of the communication data in the blockchain, if the comparison result is not satisfied, the authentication is not passed, and the communication data requesting to be chained can be discarded.
In step 2110, the gateway records the chain code of the communication data in the block chain. The communication data of the corresponding user can be inquired from the block chain through the chain code.
In step 2120, the gateway returns a communication response to the client of the user, and if the communication data is successfully linked, the communication response may carry a chain code of the communication data in the block chain.
Optionally, times of the public key and the private key of the user and the authorization code of the user can be generated for each session of the user, respectively, that is, the public key and the private key of the user and the authorization code of the user used in different sessions with users can be different.
Optionally, in order to reduce the amount of data to be transmitted and further improve the security of data transmission , the chaining request may carry the user's identification, the communication data, and the signature data of the digest information of the communication data (i.e., the data obtained by signing the digest information of the communication data). correspondingly, the blockchain generates the digest information of the communication data requesting the chaining, decrypts the signature data of the digest information of the communication data using the user's public key, compares the decrypted digest information of the communication data with the generated digest information of the communication data requesting the chaining, and writes the communication data into the content corresponding to the user's identification in the blockchain if the comparison result is satisfied.
The above-described embodiments can confirm the integrity of communication data, prevent the communication data from being tampered with, and can confirm the source of the communication data so that the sender of the communication data cannot be repudiated.
Fig. 3 is a schematic diagram of some embodiments of a communication system 300 according to the present disclosure.
As shown in fig. 3, the communication system 300 of this embodiment includes: a gateway 310 and a blockchain 320. The gateway 310 is communicatively coupled to a blockchain 320.
The gateway 310 and the blockchain 320 are described separately below.
Fig. 4 is a schematic diagram of some embodiments of the gateway 310 of the present disclosure.
As shown in fig. 4, the gateway 310 of this embodiment includes: modules 311 to 315. Optionally, a module 316 may also be included.
The obtaining module 311 is configured to obtain a public key of the user.
A writing module 312, configured to write the user identifier and the public key of the user into the block chain.
The receiving module 313 is configured to receive a communication request sent by a client of a user, where the communication request carries communication data, signature data of the communication data, and an identifier of the user, and the signature data of the communication data is obtained by signing the communication data with a private key of the user.
A sending module 314, configured to send a chaining request to the blockchain, where the chaining request carries an identifier of a user, communication data, and signature data of the communication data, so that the blockchain performs signature verification and chaining operation based on information carried by the chaining request (that is, the blockchain finds the stored public key of the user by using the identifier of the user, decrypts the signature data of the communication data by using the public key of the user, compares the decrypted communication data with the communication data requesting to be chained, and if the comparison result is , writes the communication data into content corresponding to the identifier of the user in the blockchain, and returns a chain code of the communication data in the blockchain).
The recording module 315 is configured to record a chain code of the communication data in the block chain.
In some embodiments, the user's identity may be an authorization code generated by the gateway for each session of the user, a verification module 316 for verifying the authorization code sent by the user's client, and correspondingly, the sending module 314 sends a chaining request to the blockchain if the authorization code is verified.
In embodiments, the public key of the user is obtained by the gateway responding to an authorization request sent by the client of the user and decrypting the authorization request by using the private key of the gateway, where the authorization request carries the public key of the user and is encrypted by the public key of the gateway.
In embodiments, the public key of the gateway is used for verifying the user name and password carried in the registration request in response to the registration request sent by the client of the user, and is returned to the client of the user when the verification is passed.
Fig. 5 is a schematic diagram of some embodiments of a blockchain 320 of the present disclosure.
As shown in fig. 5, the block chain 320 of this embodiment includes: a plurality of blockchain nodes 1, …, n. Synchronization of information between multiple blockchain nodes 1, …, n may be performed using a blockchain synchronization technique.
Wherein any blockchain nodes 1, …, n are configured to:
storing the identification (such as an authorization code) of the user and the public key of the user, which are sent by the gateway;
responding to a chaining request sent by a gateway, and searching a stored public key of a user by using a user identifier carried by the chaining request, wherein the chaining request carries the user identifier, communication data and signature data of the communication data, and the signature data of the communication data is obtained by signing the communication data by using a private key of the user;
decrypting the signature data of the communication data carried by the chaining request by using the searched public key of the user, comparing the decrypted communication data with the communication data requesting to be chained, and if the comparison result is correct, passing the authentication;
under the condition that the authentication is passed, storing the communication data carried by the chaining request to the content corresponding to the user identification;
and allocating the chain code corresponding to the communication data.
Fig. 6 is a schematic diagram of another embodiments of the gateway 310 or blockchain 320 of the present disclosure.
As shown in fig. 6, the gateway 310 or the blockchain 320 of this embodiment includes a memory 610 and a processor 620 coupled to the memory 610, wherein the processor 620 is configured to execute the communication method of any embodiments described above based on instructions stored in the memory 610.
Memory 610 may include, for example, system memory, fixed non-volatile storage media, and the like. The system memory stores, for example, an operating system, an application program, a Boot Loader (Boot Loader), and other programs.
The gateway 310 or blockchain 320 may also include an input output interface 630, a network interface 640, a storage interface 650, and the like. These interfaces 630, 640, 650 and the connections between the memory 610 and the processor 620 may be, for example, via a bus 660. The input/output interface 630 provides a connection interface for input/output devices such as a display, a mouse, a keyboard, and a touch screen. The network interface 640 provides a connection interface for various networking devices. The storage interface 650 provides a connection interface for external storage devices such as an SD card and a usb disk.
The present disclosure also proposes computer-readable storage media having stored thereon a computer program which, when executed by a processor, implements the steps of the communication method in any of the aforementioned embodiments.
Furthermore, the present disclosure may take the form of a computer program product embodied on or more computer-usable non-transitory storage media having computer-usable program code embodied therein (including, but not limited to, disk storage, CD-ROM, optical storage, etc.).
It is to be understood that each flow and/or block in the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions which can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flow diagram flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only exemplary of the present disclosure and is not intended to limit the present disclosure, so that any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (18)

1, A communication method based on block chain, comprising:
the method comprises the steps that a user identification and a public key of the user are sent by a block chain storage gateway;
the block chain responds to a chaining request sent by the gateway, and searches the stored public key of the user by using the user identifier carried by the chaining request, wherein the chaining request carries the user identifier, communication data and signature data of the communication data, and the signature data of the communication data is obtained by signing the communication data by using a private key of the user;
the blockchain decrypts the signature data of the communication data carried by the chaining request by using the searched public key of the user, compares the decrypted communication data with the communication data requesting to be chained, and if the comparison result is , the authentication is passed;
under the condition that the block chain passes the authentication, storing the communication data carried by the chaining request to the content corresponding to the user identifier;
and the block chain is allocated with a chain code corresponding to the communication data.
2. The communication method of claim 1, wherein the identification of the user is an authorization code generated by the gateway for each session of the user.
3, block chain based communication methods, comprising:
the gateway acquires a public key of a user;
the gateway writes the identification of the user and the public key of the user into a block chain;
the gateway receives a communication request sent by a client of the user, wherein the communication request carries communication data, signature data of the communication data and an identifier of the user, and the signature data of the communication data is obtained by signing the communication data by using a private key of the user;
the gateway sends a chaining request to the block chain, wherein the chaining request carries the identification of the user, the communication data and the signature data of the communication data, so that the block chain carries out signature verification and chaining operation based on the information carried by the chaining request;
and the gateway records the chain code of the communication data in the block chain.
4. The communication method of claim 3, wherein the identification of the user is an authorization code generated by the gateway for each session of the user;
further comprising:
and the gateway verifies the authorization code sent by the client of the user, and sends a chaining request to the block chain under the condition that the authorization code passes verification.
5. The communication method of claim 3,
the public key of the user is obtained by the gateway responding to an authorization request sent by the client of the user and decrypting the authorization request by using the private key of the gateway,
wherein the authorization request carries the public key of the user, and the authorization request is encrypted by the public key of the gateway.
6. The communication method of claim 5,
and the public key of the gateway is used for responding a registration request sent by the client of the user by the gateway, verifying a user name and a password carried in the registration request and returning the user name and the password to the client of the user under the condition that the verification is passed.
7. The communication method of claim 5,
the public key and the private key of the gateway are generated by an authority that calls the block chain.
8. The communication method of claim 3, further comprising:
the gateway decrypts the communication request with a private key of the gateway, wherein the communication request is encrypted by the user's client using a public key of the gateway.
9, A blockchain for communication, comprising a plurality of blockchain nodes;
wherein any blockchain nodes are configured to:
storing the user identification and the user public key sent by the gateway;
responding to a chaining request sent by the gateway, and searching a stored public key of the user by using the user identifier carried by the chaining request, wherein the chaining request carries the user identifier, communication data and signature data of the communication data, and the signature data of the communication data is obtained by signing the communication data by using a private key of the user;
decrypting the signature data of the communication data carried by the chaining request by using the searched public key of the user, comparing the decrypted communication data with the communication data requesting to be chained, and if the comparison result is correct, passing the authentication;
under the condition that the authentication is passed, storing the communication data carried by the chaining request to the content corresponding to the user identification;
and allocating the chain code corresponding to the communication data.
10. The blockchain of claim 9, wherein the identification of the user is an authorization code generated by the gateway for each session of the user.
A gateway for communications of the type 11, , comprising:
the acquisition module is used for acquiring a public key of a user;
a write-in module, configured to write the identifier of the user and the public key of the user into a block chain;
the receiving module is used for receiving a communication request sent by a client of the user, wherein the communication request carries communication data, signature data of the communication data and an identifier of the user, and the signature data of the communication data is obtained by signing the communication data by using a private key of the user;
a sending module, configured to send a chaining request to the blockchain, where the chaining request carries the identifier of the user, the communication data, and the signature data of the communication data, so that the blockchain performs signature verification and chaining operation based on information carried by the chaining request;
and the recording module is used for recording the chain code of the communication data in the block chain.
12. The gateway of claim 11, wherein the identification of the user is an authorization code generated by the gateway for each session of the user;
further comprising: a verification module for verifying the authorization code sent by the client of the user,
and the sending module sends a chaining request to the block chain under the condition that the authorization code passes the verification.
13. The gateway of claim 11, wherein,
the public key of the user is obtained by the gateway responding to an authorization request sent by the client of the user and decrypting the authorization request by using the private key of the gateway,
wherein the authorization request carries the public key of the user, and the authorization request is encrypted by the public key of the gateway.
14. The gateway of claim 13, wherein,
and the public key of the gateway is used for responding a registration request sent by the client of the user by the gateway, verifying a user name and a password carried in the registration request and returning the user name and the password to the client of the user under the condition that the verification is passed.
15, A blockchain for communication, comprising a plurality of blockchain nodes;
wherein, arbitrary block link points include:
a memory; and
a processor coupled to the memory, the processor configured to perform the communication method of any of claims 1-2 based on instructions stored in the memory.
A gateway for communications of the type 16, , comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the communication method of any of claims 3-8 based on instructions stored in the memory.
A communications system of the type 17, , comprising:
the gateway of any of claims 11-14, 16;
and the number of the first and second groups,
the blockchain of any of claims 9-10, 15.
18, computer readable storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the communication method of any of claims 1-8 to .
CN201810786957.1A 2018-07-18 2018-07-18 Blockchain and communication method, gateway, communication system and storage medium thereof Active CN110740038B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810786957.1A CN110740038B (en) 2018-07-18 2018-07-18 Blockchain and communication method, gateway, communication system and storage medium thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810786957.1A CN110740038B (en) 2018-07-18 2018-07-18 Blockchain and communication method, gateway, communication system and storage medium thereof

Publications (2)

Publication Number Publication Date
CN110740038A true CN110740038A (en) 2020-01-31
CN110740038B CN110740038B (en) 2023-05-30

Family

ID=69234274

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810786957.1A Active CN110740038B (en) 2018-07-18 2018-07-18 Blockchain and communication method, gateway, communication system and storage medium thereof

Country Status (1)

Country Link
CN (1) CN110740038B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113452516A (en) * 2020-03-27 2021-09-28 山东浪潮质量链科技有限公司 Block chain-based asymmetric key generation and distribution method, equipment and medium
CN113709128A (en) * 2021-08-19 2021-11-26 山东新一代信息产业技术研究院有限公司 IROS system communication method and device based on block chain
CN113761585A (en) * 2020-06-17 2021-12-07 北京沃东天骏信息技术有限公司 Data processing method, device and system
CN113872986A (en) * 2021-10-15 2021-12-31 南方电网数字电网研究院有限公司 Power distribution terminal authentication method, system, device, computer equipment and storage medium
CN114785529A (en) * 2022-06-20 2022-07-22 广东名阳信息科技有限公司 Method and system for establishing trusted communication link based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040139314A1 (en) * 2000-06-15 2004-07-15 Cook David P. Automatic delivery selection for electronic content
CN101626294A (en) * 2008-07-07 2010-01-13 华为技术有限公司 Certifying method based on identity, method, equipment and system for secure communication
CN107994991A (en) * 2017-10-31 2018-05-04 深圳市轱辘车联数据技术有限公司 A kind of data processing method, data processing server and storage medium
CN108200079A (en) * 2018-01-19 2018-06-22 深圳四方精创资讯股份有限公司 Block chain method for secret protection and device based on symmetrical and asymmetric Hybrid Encryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040139314A1 (en) * 2000-06-15 2004-07-15 Cook David P. Automatic delivery selection for electronic content
CN101626294A (en) * 2008-07-07 2010-01-13 华为技术有限公司 Certifying method based on identity, method, equipment and system for secure communication
CN107994991A (en) * 2017-10-31 2018-05-04 深圳市轱辘车联数据技术有限公司 A kind of data processing method, data processing server and storage medium
CN108200079A (en) * 2018-01-19 2018-06-22 深圳四方精创资讯股份有限公司 Block chain method for secret protection and device based on symmetrical and asymmetric Hybrid Encryption

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113452516A (en) * 2020-03-27 2021-09-28 山东浪潮质量链科技有限公司 Block chain-based asymmetric key generation and distribution method, equipment and medium
CN113761585A (en) * 2020-06-17 2021-12-07 北京沃东天骏信息技术有限公司 Data processing method, device and system
CN113709128A (en) * 2021-08-19 2021-11-26 山东新一代信息产业技术研究院有限公司 IROS system communication method and device based on block chain
CN113872986A (en) * 2021-10-15 2021-12-31 南方电网数字电网研究院有限公司 Power distribution terminal authentication method, system, device, computer equipment and storage medium
CN113872986B (en) * 2021-10-15 2023-10-24 南方电网数字电网科技(广东)有限公司 Power distribution terminal authentication method and device and computer equipment
CN114785529A (en) * 2022-06-20 2022-07-22 广东名阳信息科技有限公司 Method and system for establishing trusted communication link based on block chain
CN114785529B (en) * 2022-06-20 2022-10-04 广东名阳信息科技有限公司 Method and system for establishing trusted communication link based on block chain

Also Published As

Publication number Publication date
CN110740038B (en) 2023-05-30

Similar Documents

Publication Publication Date Title
CN110933108B (en) Data processing method and device based on block chain network, electronic equipment and storage medium
CN106850699B (en) A kind of mobile terminal login authentication method and system
US10601801B2 (en) Identity authentication method and apparatus
CN110740038B (en) Blockchain and communication method, gateway, communication system and storage medium thereof
CN107742212B (en) Asset verification method, device and system based on block chain
US7620824B2 (en) Data communicating apparatus, data communicating method, and program
US20210120392A1 (en) Virtual key binding method and system
CN110677376B (en) Authentication method, related device and system and computer readable storage medium
CN108347428B (en) Registration system, method and device of application program based on block chain
CN106060078B (en) User information encryption method, register method and verification method applied to cloud platform
CN111314172B (en) Block chain-based data processing method, device, equipment and storage medium
KR102137122B1 (en) Security check method, device, terminal and server
CN110099064A (en) A kind of document handling method based on Internet of Things, device, equipment and storage medium
CN109361508A (en) Data transmission method, electronic equipment and computer readable storage medium
CN109120611B (en) User authentication method, apparatus, system and medium for address generation server
CN109981650B (en) Transfer method and system for general certificates in block chain
CN113609213B (en) Method, system, device and storage medium for synchronizing device keys
CN103825724A (en) Identification type password system and method for updating and recovering private key automatically
CN110049032A (en) A kind of the data content encryption method and device of two-way authentication
CN115664655A (en) TEE credibility authentication method, device, equipment and medium
CN106656507A (en) Method and device for electronic authentication based on mobile terminal
US20190305940A1 (en) Group shareable credentials
CN112182009A (en) Data updating method and device of block chain and readable storage medium
CN112565236A (en) Information authentication method, device, computer equipment and storage medium
CN112261002A (en) Data interface docking method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant