CN111586035A - Hash operation service method and system for block chain mining machine - Google Patents

Hash operation service method and system for block chain mining machine Download PDF

Info

Publication number
CN111586035A
CN111586035A CN202010369384.XA CN202010369384A CN111586035A CN 111586035 A CN111586035 A CN 111586035A CN 202010369384 A CN202010369384 A CN 202010369384A CN 111586035 A CN111586035 A CN 111586035A
Authority
CN
China
Prior art keywords
random number
hash
hash value
code
task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010369384.XA
Other languages
Chinese (zh)
Other versions
CN111586035B (en
Inventor
林锑杭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Putian Zhuhuo Information Technology Co ltd
Original Assignee
Putian Zhuhuo Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Putian Zhuhuo Information Technology Co ltd filed Critical Putian Zhuhuo Information Technology Co ltd
Priority to CN202010369384.XA priority Critical patent/CN111586035B/en
Publication of CN111586035A publication Critical patent/CN111586035A/en
Application granted granted Critical
Publication of CN111586035B publication Critical patent/CN111586035B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses a block chain mining machine Hash operation service method, which relates to the field of computational power service and comprises the following steps: firstly, acquiring a first hash value sent by a sender, and acquiring a secret code sent by a receiver; the secret code is longer than the transmission code; then, carrying out hash operation on the combined character string of the secret code and the variable first random number to solve a second hash value; when the second hash value is the same as the first hash value, obtaining the first random number corresponding to the second hash value which is the same as the first hash value; and finally, obtaining the transmission code corresponding to the first random number according to the first random number. Meanwhile, the invention also provides a block chain mining machine Hash operation service system. In the invention, because the transmission code is shorter and the secret code is longer, the calculation power required by the receiver to know the transmission code is lower than the calculation power of a third party for cracking the secret code, and the possibility of tampering the transmission code is reduced.

Description

Hash operation service method and system for block chain mining machine
Technical Field
The invention relates to the field of computing power service, in particular to a block chain mining machine Hash operation service method and system.
Background
The Internet of things (IoT), i.e., "Internet of things," is an extended and expanded network based on the Internet, and combines various information sensing devices with the Internet to form a huge network, thereby realizing the intercommunication of people, machines and things at any time and any place.
With the development of the Internet of things, various Internet of things sensors are connected with a background server, and data interaction is realized; the central control center of the internet of things receives various data sent by the terminal sensor, and the data can be tampered in the transmission process to influence the data correctness.
In summary, in the prior art, information data collected by the internet of things has a risk of being tampered in a transmission process, and data reliability is damaged.
Disclosure of Invention
In view of some defects in the prior art, the technical problem to be solved by the present invention is to provide a hash operation service method for a blockchain mining machine, which aims to solve the risk of tampering in the data transmission process in the prior art, and to improve the credibility of the received data.
In order to achieve the above object, the present invention provides a block chain mining machine hash operation service method, including:
acquiring a first hash value sent by a sender, and acquiring a secret code sent by a receiver; wherein the sender possesses the secret code; the first hash value is obtained by the sender through hash operation according to the combined character string of the secret code and the transmission code; the first byte length of the secret code is longer than the second byte length of the transmission code, and the transmission code is data to be transmitted;
carrying out Hash operation on the combined character string of the secret code and the variable first random number to solve a second Hash value; when the second hash value is the same as the first hash value, obtaining the first random number corresponding to the second hash value which is the same as the first hash value;
and obtaining the transmission code corresponding to the first random number according to the first random number.
In the technical scheme, a sender combines a secret code and a transmission code and carries out Hash solution, a receiver carries out Hash collision analysis on the corresponding transmission code, and as the first byte length of the secret code is longer than the second byte length of the transmission code, the secret code is known for the receiver or a Hash operation server, and the transmission code can be obtained only by carrying out Hash collision with a small quantity; for the third party, if the secret code is unknown, a huge number of hash collisions are required to obtain the secret code; therefore, the risk that the data is tampered by a third party is reduced, and the reliability of the data is improved.
In a specific embodiment, the method further comprises:
acquiring a first task request of the receiver; the first task request comprises: carrying out Hash operation on the character string and the target Hash value; the target hash value is the first hash value, and the hash operation character string comprises a variable value string and a fixed value string; the fixed value string comprises the secret code, and the variable value string is the first random number;
sending a first task feedback to the receiver; the first task feedback comprises the string of variable values or task error feedback;
and sending a task settlement bill to the receiver or receiving the task settlement paid by the receiver.
In the technical scheme, the Hash operation service party receives and executes the tasks and obtains corresponding settlement rewards, so that the sustainability of the Hash operation service is realized.
In a specific embodiment, the method further comprises:
and after the first random number is exhausted, if the second hash value is the same as the first hash value without the first random number, outputting a text transmission error.
In the technical scheme, for the hash value which is sent by the sender in error, corresponding random numbers cannot be obtained through exhaustion so as to report errors of transmission errors, and error reminding is realized.
In one embodiment, the transmission code has a byte length equal to the byte length of the first random number.
In the technical scheme, by setting the byte lengths of the two to be equal, the uncertainty of the first random digit can be reduced, the hash collision times can be reduced, the calculation force requirement can be reduced, and the system efficiency can be improved.
In a specific embodiment, the method further comprises:
acquiring the second byte length sent by the sender or the receiver for the transmission coding;
and determining the byte length of the first random number as the second byte length according to the second byte length.
In the technical scheme, the Hash operation server side can obtain the number of bits of the transmission codes, reduce the uncertainty of the first random number, reduce the Hash collision times, reduce the calculation force requirement and improve the system efficiency.
In a second aspect of the present invention, there is provided a block chain miner hash operation service system, including:
the data receiving module is used for acquiring a first hash value sent by a sender and acquiring a secret code sent by a receiver; wherein the sender possesses the secret code; the first hash value is obtained by the sender through hash operation according to the combined character string of the secret code and the transmission code; the first byte length of the secret code is longer than the second byte length of the transmission code, and the transmission code is data to be transmitted;
the Hash operation module is used for carrying out Hash operation on the combined character string of the secret code and the variable first random number to solve a second Hash value; when the second hash value is the same as the first hash value, obtaining the first random number corresponding to the second hash value which is the same as the first hash value;
and the code determining module is used for obtaining the transmission code corresponding to the first random number according to the first random number.
In a specific embodiment, the system further comprises:
the task obtaining module is used for obtaining a first task request of the receiver; the first task request comprises: carrying out Hash operation on the character string and the target Hash value; the target hash value is the first hash value, and the hash operation character string comprises a variable value string and a fixed value string; the fixed value string comprises the secret code, and the variable value string is the first random number; the task acquisition module comprises the data receiving module;
the task feedback module is used for sending first task feedback to the receiver; the first task feedback comprises the string of variable values or task error feedback;
and the task settlement module is used for sending a task settlement bill to the receiver or receiving the task settlement paid by the receiver.
In a specific embodiment, the system further comprises:
and the error feedback module is used for outputting a text transmission error if the second hash value is the same as the first hash value without the first random number after the first random number is exhausted.
In one embodiment, the transmission code has a byte length equal to the byte length of the first random number.
In a specific embodiment, the data receiving module further includes:
a random number length receiving unit, configured to obtain the second byte length sent by the sender or the receiver for the transmission coding;
and the random number length determining unit is used for determining the byte length of the first random number as the second byte length according to the second byte length.
The invention has the beneficial effects that: in the invention, a sender combines a secret code and a transmission code and carries out Hash solution, a receiver carries out Hash collision analysis on the corresponding transmission code, and as the first byte length of the secret code is longer than the second byte length of the transmission code, the secret code is known for the receiver or a Hash operation server, and the transmission code can be obtained only by Hash collision with a small quantity; for the third party, if the secret code is unknown, a huge number of hash collisions are required to obtain the secret code; therefore, the risk that the data is tampered by a third party is reduced, and the reliability of the data is improved.
Drawings
Fig. 1 is a schematic flow chart of a block chain mining machine hash operation service method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a Hash operation encryption process in one scenario of the present invention;
FIG. 3 is a schematic diagram of a Hash operation encryption process in another scenario of the present invention;
fig. 4 is a block diagram of a block chain mining machine hash operation service system according to an embodiment of the present invention.
Detailed Description
The invention is further illustrated by the following examples in conjunction with the accompanying drawings:
as shown in fig. 1 to 4, in a first embodiment of the present invention, a block chain mining machine hash operation service method is provided, including:
acquiring a first hash value sent by a sender, and acquiring a secret code sent by a receiver; wherein the sender possesses the secret code; the first hash value is obtained by the sender through hash operation according to the combined character string of the secret code and the transmission code; the first byte length of the secret code is longer than the second byte length of the transmission code, and the transmission code is data to be transmitted;
carrying out Hash operation on the combined character string of the secret code and the variable first random number to solve a second Hash value; when the second hash value is the same as the first hash value, obtaining the first random number corresponding to the second hash value which is the same as the first hash value;
and obtaining the transmission code corresponding to the first random number according to the first random number.
Preferably, in this embodiment, the method further includes:
acquiring a first task request of the receiver; the first task request comprises: carrying out Hash operation on the character string and the target Hash value; the target hash value is the first hash value, and the hash operation character string comprises a variable value string and a fixed value string; the fixed value string comprises the secret code, and the variable value string is the first random number;
sending a first task feedback to the receiver; the first task feedback comprises the string of variable values or task error feedback;
and sending a task settlement bill to the receiver or receiving the task settlement paid by the receiver.
In this embodiment, the method further includes:
and after the first random number is exhausted, if the second hash value is the same as the first hash value without the first random number, outputting a text transmission error.
In an optional case, if the receiver or the blockchain mining machine server does not know the byte length of the transmission code, the transmission code may be transmitted by using a test method, that is, a test is started from a first random number performed by one bit, and if the solution is not satisfied, the bit number of the first random number is increased; furthermore, to avoid downtime, an upper number of bits of the first random number may be set, for example 4 bytes or 8 bytes.
Optionally, the byte length of the transmission code is equal to the byte length of the first random number.
Optionally, the method further includes:
acquiring the second byte length sent by the sender or the receiver for the transmission coding;
and determining the byte length of the first random number as the second byte length according to the second byte length.
In addition, in a further embodiment, the transmission code is preset, and the byte length of the first random number is also preset to be equal to the preset byte length of the transmission code; in addition, a default byte length of the first random number may be set, and the default byte length may be used as the byte length of the first random number when a new second byte length is not received.
It should be noted that, in an application scenario, the technology provided in this embodiment is applied to IP address transmission; namely, the IP address of the Internet of things equipment can be modified in the transmission process, encryption and retransmission are carried out through hash operation, and the transmitted IP address is reversely analyzed through the first random number obtained through the hash operation in the analysis process.
In another application scenario, the technology provided by the embodiment is applied to the instruction encoding encryption transmission; namely, a group of instruction codes is preset in the communication algorithm, different instruction codes represent different instructions, and after hash encryption transmission, reverse analysis is carried out to obtain related instruction codes.
In addition, the technology provided by the embodiment can also be applied to other text transmission, and the embodiment does not limit the application field and the application scene.
In practical application, because the first byte length of the secret code is longer than the second byte length of the transmission code, for a third party, the decoding calculation power of the secret code is far greater than that of a receiver with the secret code, so that the decoding difficulty of the secret code is extremely high. Meanwhile, the success of ore excavation is judged only by taking the first digits as 0 according to the Hash operation rule different from the bit currency network, in the embodiment, the first Hash value and the second Hash value are required to be completely consistent, and the calculation force requirement of third party cracking is greatly improved.
Taking an actual scene as an example, assuming that the first hash value is a 16-bit system with 40 bits, the secret code is also a 16-bit system with 40 bits, and the transmission code is 4 bytes (8-bit 16-bit system); for the receiver, the first hash value, the secret code and the transmission code are known, and the total hash operation times are 232Secondly, the calculation force requirement is 4 GH; for the third party, the secret code is unknown, the first hash value and the transmission code are known, and the total hash operation times are 2160Second, instant force demand of 2100An EH; that is, the cyber dynamics of Biguo currency is about 100EH/S according to 5/4/2020/month, and 2 is required28Can be cracked in trillion years.
In addition, it is worth mentioning that the third party cracking difficulty can be further improved by improving the number of bits of the secret code.
As shown in fig. 1 to 4, in a second embodiment of the present invention, there is provided a block chain mining machine hash operation service system, including:
the data receiving module is used for acquiring a first hash value sent by a sender and acquiring a secret code sent by a receiver; wherein the sender possesses the secret code; the first hash value is obtained by the sender through hash operation according to the combined character string of the secret code and the transmission code; the first byte length of the secret code is longer than the second byte length of the transmission code, and the transmission code is data to be transmitted;
the Hash operation module is used for carrying out Hash operation on the combined character string of the secret code and the variable first random number to solve a second Hash value; when the second hash value is the same as the first hash value, obtaining the first random number corresponding to the second hash value which is the same as the first hash value;
and the code determining module is used for obtaining the transmission code corresponding to the first random number according to the first random number.
Preferably, the system further comprises:
the task obtaining module is used for obtaining a first task request of the receiver; the first task request comprises: carrying out Hash operation on the character string and the target Hash value; the target hash value is the first hash value, and the hash operation character string comprises a variable value string and a fixed value string; the fixed value string comprises the secret code, and the variable value string is the first random number; the task acquisition module comprises the data receiving module;
the task feedback module is used for sending first task feedback to the receiver; the first task feedback comprises the string of variable values or task error feedback;
and the task settlement module is used for sending a task settlement bill to the receiver or receiving the task settlement paid by the receiver.
In this embodiment, the system further includes:
and the error feedback module is used for outputting a text transmission error if the second hash value is the same as the first hash value without the first random number after the first random number is exhausted.
In an optional case, if the receiver or the blockchain mining machine server does not know the byte length of the transmission code, the transmission code may be transmitted by using a test method, that is, a test is started from a first random number performed by one bit, and if the solution is not satisfied, the bit number of the first random number is increased; furthermore, to avoid downtime, an upper number of bits of the first random number may be set, for example 4 bytes or 8 bytes.
Optionally, the byte length of the transmission code is equal to the byte length of the first random number.
Optionally, the data receiving module further includes:
a random number length receiving unit, configured to obtain the second byte length sent by the sender or the receiver for the transmission coding;
and the random number length determining unit is used for determining the byte length of the first random number as the second byte length according to the second byte length.
In addition, in a further embodiment, the transmission code is preset, and the byte length of the first random number is also preset to be equal to the preset byte length of the transmission code; in addition, a default byte length of the first random number may be set, and the default byte length may be used as the byte length of the first random number when a new second byte length is not received.
It should be noted that, in an application scenario, the technology provided in this embodiment is applied to IP address transmission; namely, the IP address of the Internet of things equipment can be modified in the transmission process, encryption and retransmission are carried out through hash operation, and the transmitted IP address is reversely analyzed through the first random number obtained through the hash operation in the analysis process.
In another application scenario, the technology provided by the embodiment is applied to the instruction encoding encryption transmission; namely, a group of instruction codes is preset in the communication algorithm, different instruction codes represent different instructions, and after hash encryption transmission, reverse analysis is carried out to obtain related instruction codes.
In addition, the technology provided by the embodiment can also be applied to other text transmission, and the embodiment does not limit the application field and the application scene.
In practical application, because the first byte length of the secret code is longer than the second byte length of the transmission code, for a third party, the decoding calculation power of the secret code is far greater than that of a receiver with the secret code, so that the decoding difficulty of the secret code is extremely high. Meanwhile, the success of ore excavation is judged only by taking the first digits as 0 according to the Hash operation rule different from the bit currency network, in the embodiment, the first Hash value and the second Hash value are required to be completely consistent, and the calculation force requirement of third party cracking is greatly improved.
Taking an actual scene as an example, assuming that the first hash value is a 16-bit system with 40 bits, the secret code is also a 16-bit system with 40 bits, and the transmission code is 4 bytes (8-bit 16-bit system); for the receiver, the first hash value, the secret code and the transmission code are known, and the total hash operation times are 232Secondly, the calculation force requirement is 4 GH; for the third party, the secret code is unknown, the first hash value and the transmission code are known, and the total hash operation times are 2160Second, instant force demand of 2100An EH; that is, the cyber dynamics of Biguo currency is about 100EH/S according to 5/4/2020/month, and 2 is required28Can be cracked in trillion years.
In addition, it is worth mentioning that the third party cracking difficulty can be further improved by improving the number of bits of the secret code.
As shown in fig. 2, taking practical application as an example, sending environmental data of internet of things home, and combining the environmental data into a transmission code 1FD5a926(16 system);
assuming the secret code is: 123-: 7B11171a19F 1187D;
the combined string of the secret code and the transmission code is: 7B11171A19F1187D1FD5A926, hashed by SHA1 gave: the first hash value c4fcd373e99716b56155997ed3089a64f61eb 722;
at this time, the hash operation server knows the first hash value and the secret code, and only needs to perform hash collision with a random number (4 bytes) until a second hash value obtained by the hash collision is equal to the first hash value, so as to obtain the transmission code.
As shown in fig. 3, taking practical application as an example, the IP address (transmission code), device ID, and security code parameters are as follows:
IP address: 218.005.018.202, the 16-ary representation of the IP address is: DA0512 CA;
device ID: 201-: C9736C 6B;
secret encoding: 123-: 7B11171a19F 1187D;
the combined character string of the IP address, the equipment ID and the secret code is as follows: DA0512CAC9736C6B7B11171A19F1187D, which is hashed by SHA1, and the following results are obtained: hash value 093df291a7160b0321813f5ed7811553a6658ce 4;
for manufacturers, the IP address needs to be set as a random number, and the device ID and the secret code are combined to perform hash operation, so as to obtain the IP address corresponding to the hash value;
for a third party cracking unit, the secret code is needed to be used as a random number to be cracked, and the secret code is matched with the IP address and the secret code provided by the third party, and the cracking time is longer due to the longer length of the secret code; when the length of the secret code is 64 bits, the required cracking time is 2 compared with the manufacturer server32Doubling; in practical scenarios, the length of the secret code may be further set according to needs, for example, 96 bits or 128 bits.
In the case, the first hash value is obtained by carrying out hash operation on the combination of the IP address of the equipment, the ID of the equipment and the secret code, for a manufacturer server, the IP address can be back-calculated by only carrying out random number solution on the IP address of 32 bits, the number of times of hash operation required to be carried out is 4G times at most, namely, the hash operation can be completed by an ore machine with 4GH/S computing power in 1S, and the efficiency is high; for a third party who does not know the secret code, the required cracking time is determined by the number of the bits of the secret code, the cracking cost is increased to be higher than the smuggling cost, and the correctness of the data is ensured.
It is also worth mentioning that in this case, in addition to the secret code, the transport code (IP address), there is also a device ID, in this case the device ID may be sent at the same time as the first hash value. Of course, when the secret codes corresponding to the respective device IDs are the same, the device ID may not be transmitted. And directly hash the security code and the transmission code. In addition, when the number of the device IDs is limited and the format is fixed, the IP address and the device ID may be combined as a secret code to perform hash collision solution. In addition, the sequence of the secret code and the transmission code is also preset, the secret code can be in the front, or the transmission code can be in the front, and only the presetting in a specific scene is needed.
The foregoing detailed description of the preferred embodiments of the invention has been presented. It should be understood that numerous modifications and variations could be devised by those skilled in the art in light of the present teachings without departing from the inventive concepts. Therefore, the technical solutions available to those skilled in the art through logic analysis, reasoning and limited experiments based on the prior art according to the concept of the present invention should be within the scope of protection defined by the claims.

Claims (10)

1. A block chain mining machine Hash operation service method is characterized by comprising the following steps:
acquiring a first hash value sent by a sender, and acquiring a secret code sent by a receiver; wherein the sender possesses the secret code; the first hash value is obtained by the sender through hash operation according to the combined character string of the secret code and the transmission code; the first byte length of the secret code is longer than the second byte length of the transmission code, and the transmission code is data to be transmitted;
carrying out Hash operation on the combined character string of the secret code and the variable first random number to solve a second Hash value; when the second hash value is the same as the first hash value, obtaining the first random number corresponding to the second hash value which is the same as the first hash value;
and obtaining the transmission code corresponding to the first random number according to the first random number.
2. A block-chain-miner hash service method as recited in claim 1, the method further comprising:
acquiring a first task request of the receiver; the first task request comprises: carrying out Hash operation on the character string and the target Hash value; the target hash value is the first hash value, and the hash operation character string comprises a variable value string and a fixed value string; the fixed value string comprises the secret code, and the variable value string is the first random number;
sending a first task feedback to the receiver; the first task feedback comprises the string of variable values or task error feedback;
and sending a task settlement bill to the receiver or receiving the task settlement paid by the receiver.
3. A block-chain-miner hash service method as recited in claim 1, the method further comprising:
and after the first random number is exhausted, if the second hash value is the same as the first hash value without the first random number, outputting a text transmission error.
4. A block-chain-miner hash service method as claimed in claim 1, wherein a byte length of the transmission code is equal to a byte length of the first random number.
5. A block-chain-miner hash service method as recited in claim 4, wherein the method further comprises:
acquiring the second byte length sent by the sender or the receiver for the transmission coding;
and determining the byte length of the first random number as the second byte length according to the second byte length.
6. A block chain mining machine hash operation service system, the system comprising:
the data receiving module is used for acquiring a first hash value sent by a sender and acquiring a secret code sent by a receiver; wherein the sender possesses the secret code; the first hash value is obtained by the sender through hash operation according to the combined character string of the secret code and the transmission code; the first byte length of the secret code is longer than the second byte length of the transmission code, and the transmission code is data to be transmitted;
the Hash operation module is used for carrying out Hash operation on the combined character string of the secret code and the variable first random number to solve a second Hash value; when the second hash value is the same as the first hash value, obtaining the first random number corresponding to the second hash value which is the same as the first hash value;
and the code determining module is used for obtaining the transmission code corresponding to the first random number according to the first random number.
7. A block-chain-miner hash operation service system as claimed in claim 6, wherein said system further comprises:
the task obtaining module is used for obtaining a first task request of the receiver; the first task request comprises: carrying out Hash operation on the character string and the target Hash value; the target hash value is the first hash value, and the hash operation character string comprises a variable value string and a fixed value string; the fixed value string comprises the secret code, and the variable value string is the first random number; the task acquisition module comprises the data receiving module;
the task feedback module is used for sending first task feedback to the receiver; the first task feedback comprises the string of variable values or task error feedback;
and the task settlement module is used for sending a task settlement bill to the receiver or receiving the task settlement paid by the receiver.
8. A block-chain-miner hash operation service system as claimed in claim 6, wherein said system further comprises:
and the error feedback module is used for outputting a text transmission error if the second hash value is the same as the first hash value without the first random number after the first random number is exhausted.
9. A block-chain-miner hash service system as claimed in claim 6, wherein the transmission code is of a byte length equal to that of the first random number.
10. A block-chain-miner hash service system as recited in claim 9, wherein the data receiving module further includes:
a random number length receiving unit, configured to obtain the second byte length sent by the sender or the receiver for the transmission coding;
and the random number length determining unit is used for determining the byte length of the first random number as the second byte length according to the second byte length.
CN202010369384.XA 2020-05-05 2020-05-05 Hash operation service method and system for block chain mining machine Active CN111586035B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010369384.XA CN111586035B (en) 2020-05-05 2020-05-05 Hash operation service method and system for block chain mining machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010369384.XA CN111586035B (en) 2020-05-05 2020-05-05 Hash operation service method and system for block chain mining machine

Publications (2)

Publication Number Publication Date
CN111586035A true CN111586035A (en) 2020-08-25
CN111586035B CN111586035B (en) 2022-04-19

Family

ID=72127650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010369384.XA Active CN111586035B (en) 2020-05-05 2020-05-05 Hash operation service method and system for block chain mining machine

Country Status (1)

Country Link
CN (1) CN111586035B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112637160A (en) * 2020-12-14 2021-04-09 杭州趣链科技有限公司 Login verification method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017119668A1 (en) * 2016-01-06 2017-07-13 조선대학교산학협력단 Data transmission apparatus and method enabling non-repudiation for transmission message
CN107169764A (en) * 2017-05-10 2017-09-15 山东大学 Fair data trade method based on block chain
CN110223064A (en) * 2019-05-27 2019-09-10 四川大学 A kind of undeniable safety data transmission method based on block chain
CN110650018A (en) * 2019-09-06 2020-01-03 南京南瑞继保工程技术有限公司 Message tamper-proof method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017119668A1 (en) * 2016-01-06 2017-07-13 조선대학교산학협력단 Data transmission apparatus and method enabling non-repudiation for transmission message
CN107169764A (en) * 2017-05-10 2017-09-15 山东大学 Fair data trade method based on block chain
CN110223064A (en) * 2019-05-27 2019-09-10 四川大学 A kind of undeniable safety data transmission method based on block chain
CN110650018A (en) * 2019-09-06 2020-01-03 南京南瑞继保工程技术有限公司 Message tamper-proof method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112637160A (en) * 2020-12-14 2021-04-09 杭州趣链科技有限公司 Login verification method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN111586035B (en) 2022-04-19

Similar Documents

Publication Publication Date Title
CN107483419B (en) Method, device and system for authenticating access terminal by server, server and computer readable storage medium
CN102752115B (en) Challenge code generating method and device, dynamic password authentication method and system
CN107392583B (en) Two-dimensional code graphic data generation method and device
US20200342439A1 (en) Method, client device and pos terminal for offline transaction
CN110601815B (en) Block chain data processing method and equipment
CN110602214B (en) Evidence storing and processing method, device, equipment and medium of judicial chain
US20110320359A1 (en) secure communication method and device based on application layer for mobile financial service
US20150149777A1 (en) Mobile terminal, terminal and authentication method using security cookie
CN102082664A (en) Network data safety transmission system and network data safety transmission method
CN104580112A (en) Service authentication method and system, and server
CN105741116B (en) A kind of quick payment method, apparatus and system
CN111586035B (en) Hash operation service method and system for block chain mining machine
CN104506543B (en) A kind of security certification system and its authentication method based on optical signal
CN111402456B (en) Unlocking method and device
CN111614619A (en) Block chain code scanning input method, code scanning gun and computer readable storage medium
CN114157693A (en) Power-on authentication method of communication equipment, communication module and server
CN110417804B (en) Bidirectional identity authentication encryption communication method and system suitable for single-chip microcomputer implementation
CN107294704B (en) Password generation method, password execution method and terminal
CN114830572A (en) Data transmission method, device, equipment, system and storage medium
CN105635160A (en) Method for designing changeable data network communication
KR20090038467A (en) An apparatus and a method for reporting the error of each level of the tunnel data packet in a communication network
CN109951565B (en) Data transmission method, device, medium and electronic equipment of supply chain management system
WO2016076558A1 (en) Certification pattern determination method and payment method using same
CN112583662A (en) Host survival detection method, device, equipment and storage medium
CN108289100B (en) A kind of safety access method, terminal device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant