CN111711950A - Outsourcing calculation payment method and device based on bitcoin - Google Patents

Outsourcing calculation payment method and device based on bitcoin Download PDF

Info

Publication number
CN111711950A
CN111711950A CN202010441394.XA CN202010441394A CN111711950A CN 111711950 A CN111711950 A CN 111711950A CN 202010441394 A CN202010441394 A CN 202010441394A CN 111711950 A CN111711950 A CN 111711950A
Authority
CN
China
Prior art keywords
encryption algorithm
module
agreement
outsourcer
deposit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010441394.XA
Other languages
Chinese (zh)
Inventor
洪志加
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hongxin Network Technology Co ltd
Original Assignee
Guangdong Hongxin Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hongxin Network Technology Co ltd filed Critical Guangdong Hongxin Network Technology Co ltd
Priority to CN202010441394.XA priority Critical patent/CN111711950A/en
Publication of CN111711950A publication Critical patent/CN111711950A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an outsourcing calculation payment method and device based on bitcoin, wherein the method comprises the following steps: the outsourcer and the miners reach an agreement, the outsourcer pays a deposit to the miners in advance, the deposit is used as compensation for honesty completion of tasks but no payment of the miners, and the agreement is encrypted through an encryption algorithm and then is sent to a block chain of the bitcoin network through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. The outsourcing calculation payment method and the device based on the bitcoin have the following beneficial effects that: the wireless data transmission system has multiple wireless data transmission modes and high data transmission safety.

Description

Outsourcing calculation payment method and device based on bitcoin
Technical Field
The invention relates to the field of block chains, in particular to an outsourcing calculation payment method and device based on bitcoin.
Background
The bitcoin is a peer-to-peer decentralized electronic cash system, which can be handled directly by the user without a bank. The bitcoin is suitable for outsourcing calculation, and due to the advantages of the bitcoin, under the condition that honest miners complete related calculation tasks, the miners can obtain corresponding rewards no matter how a malicious outsourcing merchant operates. However, the traditional outsourcing calculation payment method based on the bitcoin has a single data transmission mode and does not adopt security measures, so that the security of data transmission is not high.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method and an apparatus for outsourcing calculation payment based on bitcoin, which have multiple wireless data transmission modes and high security of data transmission, in order to overcome the above-mentioned drawbacks of the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a outsourcing calculation payment method based on bitcoin is constructed, and comprises the following steps:
A) the outsourcer and the miners reach an agreement, the outsourcer pays a deposit to the miners in advance, the deposit is used as compensation for honesty completion of tasks but no payment of the miners, and the agreement is encrypted through an encryption algorithm and then is sent to a block chain of the bitcoin network through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
B) after the agreement is finished, if two parties of the agreement can obey the agreement honestly within a set time period, the miners obtain bitcoin with specified money as reward, and the outsourcers retrieve the deposit; if the outsourcer does not comply with the agreement default, the miners are not paid the bitcoin of the specified amount as a reward, or do not respond within the set time period, the miners obtain the deposit as compensation; if the mineworker is not in agreement, is not completing the calculation task, or is remunerated, but is not returning the deposit to the outsourcer in coordination with the outsourcer, the outsourcer can also retrieve the deposit without the mineworker being remunerated.
In the outsourcing calculation payment method based on bitcoin, the encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm, 3DES encryption algorithm, ECC encryption algorithm, RC2 encryption algorithm, RC4 encryption algorithm, IDEA encryption algorithm or BLOWFSH encryption algorithm.
In the outsourcing calculation payment method based on bitcoin, the set time period is 15 days.
The invention also relates to a device for realizing the outsourcing calculation payment method based on the bitcoin, which comprises the following steps:
a protocol encryption transmission unit: the method is used for an outsourcer and a miner to reach an agreement, the outsourcer pays a deposit in advance to the miner, the deposit is used as compensation for honestly completing tasks but not obtaining a reward of the miner, and the agreement is encrypted through an encryption algorithm and then is sent to a block chain of a bitcoin network through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
a protocol completion unit: after the agreement is finished, if two parties of the agreement can obey the agreement honestly within a set time period, the miners obtain bitcoin with specified money as reward, and the outsourcers retrieve the deposit; if the outsourcer does not comply with the agreement default, the miners are not paid the bitcoin of the specified amount as a reward, or do not respond within the set time period, the miners obtain the deposit as compensation; if the mineworker is not in agreement, is not completing the calculation task, or is remunerated, but is not returning the deposit to the outsourcer in coordination with the outsourcer, the outsourcer can also retrieve the deposit without the mineworker being remunerated.
In the device of the present invention, the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, or a BLOWFISH encryption algorithm.
In the device of the present invention, the set time period is 15 days.
The outsourcing calculation payment method and the device based on the bitcoin have the following beneficial effects that: the outsourcer and the miners reach an agreement, the outsourcer pays the deposit to the miners in advance, the deposit is used as compensation for honest completion of tasks but no payment is obtained for the miners, and the agreement is encrypted through an encryption algorithm and then is sent to a block chain of the bit coin network through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; the invention provides a plurality of wireless communication modes, adopts an encryption algorithm for encryption, and can improve the security of data transmission, so that the invention has a plurality of wireless data transmission modes and higher security of data transmission.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of a method in one embodiment of a bitcoin-based outsourced computing payment method and apparatus of the present invention;
fig. 2 is a schematic structural diagram of the device in the embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the bit currency based outsourcing calculation payment method and device, a flow chart of the bit currency based outsourcing calculation payment method is shown in fig. 1. In fig. 1, the outsourcing calculation payment method based on bitcoin includes the following steps:
step S01, the outsourcer and the miners reach an agreement, the outsourcer pays the deposit money to the miners in advance, the deposit money is used as compensation for honest completion of tasks but no payment of the miners, and the agreement is encrypted by an encryption algorithm and then is sent to a block chain of the bitcoin network through a wireless communication module: in the step, the outsourcer and the miners reach an agreement, the outsourcer pays a certain deposit to the miners in advance, the deposit is used as compensation for honest completion of tasks but no payment of the miners, and the agreement is encrypted through an encryption algorithm and then is sent to a block chain of the bitcoin network through a wireless communication module. The encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm, 3DES encryption algorithm, ECC encryption algorithm, RC2 encryption algorithm, RC4 encryption algorithm, IDEA encryption algorithm or BLOWFSH encryption algorithm. The protocol is encrypted and then transmitted, so that the data transmission safety is high.
The DES encryption algorithm is a block cipher, data is encrypted by taking 64 bits as a block, the key length of the DES encryption algorithm is 56 bits, and the same algorithm is used for encryption and decryption. The DES encryption algorithm is to keep secret a key, while the public algorithm includes encryption and decryption algorithms. In this way, only a person who has mastered the same key as the sender can interpret the ciphertext data encrypted by the DES encryption algorithm. Thus, deciphering the DES encryption algorithm is actually the encoding of the search key. For a 56 bit long key, the number of operations is 256 if the search is done exhaustively. As the capabilities of computer systems continue to evolve, the security of the DES encryption algorithm is much weaker than it would have been if it had just appeared, yet it can still be considered sufficient from the practical standpoint of non-critical nature. However, the DES encryption algorithm is now only used for authentication of old systems, and new encryption standards are more selected.
The AES encryption algorithm is an advanced encryption standard in cryptography, the encryption algorithm adopts a symmetric block cipher system, the minimum support of the key length is 128, 192 and 256, the block length is 128 bits, and the algorithm is easy to realize by various hardware and software. This encryption algorithm is a block encryption standard adopted by the federal government in the united states to replace the original DES, has been analyzed by many parties and is widely used throughout the world. The AES encryption algorithm is designed to support 128/192/256 bit (/32 ═ nb) data block sizes (i.e., packet lengths); the cipher length of 128/192/256 bits (/32 ═ nk) is supported, and in a 10-bit system, 34 × 1038, 62 × 1057 and 1.1 × 1077 keys are corresponded.
The RSA encryption algorithm is currently the most influential public key encryption algorithm and is generally considered to be one of the most elegant public key schemes at present. The RSA encryption algorithm, the first algorithm that can be used for both encryption and parity signing, is resistant to all cryptographic attacks known so far, and has been recommended by the ISO as the public key data encryption standard. The RSA encryption algorithm is based on a very simple number theory fact: it is easy to multiply two large prime numbers, but it is then desirable, but it is then extremely difficult to factorize their product, so the product can be made public as an encryption key.
The Base64 encryption algorithm is one of the most common encoding modes for transmitting 8-bit byte codes on a network, and the Base64 encoding can be used for transmitting longer identification information under the HTTP environment. For example, in the JAVAPERSISTENCE system HIBEMATE, Base64 was used to encode a longer unique identifier as a string used as a parameter in HTTP forms and HTTP GETTL. In other applications, it is also often necessary to encode the binary data into a form suitable for placement in a URL (including a hidden form field). In this case, the encoding by Base64 is not only relatively short, but also has the property of being unreadable, i.e., the encoded data cannot be directly seen by human eyes.
The MD5 encryption algorithm is a hash function widely used in the field of computer security to provide integrity protection for messages. A brief description of the MD5 encryption algorithm may be: the MD5 encryption algorithm processes incoming information in 512-bit packets, each of which is divided into 16 32-bit sub-packets, and after a series of processing, the output of the algorithm consists of four 32-bit packets, which are concatenated to produce a 128-bit hash value. The MD5 encryption algorithm is widely used for password authentication and key identification of various software. The MD5 encryption algorithm uses a hash function, and its typical application is to digest a piece of information to prevent tampering. A typical application of the MD5 encryption algorithm is to generate a finger print for a piece of Message to prevent "tampering". The use of the MD5 encryption algorithm also prevents "repudiation" by the author of the document if there is a third party certificate authority, a so-called digital signature application. The MD5 encryption algorithm is also widely used for login authentication of operating systems, such as UNIX, various BSD system login passwords, digital signatures, and so on.
The idea behind the SHA1 encryption algorithm is to receive a piece of plaintext and then convert it into a (usually smaller) piece of ciphertext in an irreversible manner, which can also be simply understood as the process of taking a string of input codes (called a pre-map or message) and converting them into a short, fixed-bit output sequence, i.e., a hash value (also called a message digest or a message authentication code). The security of the one-way hash function is that the operation process that generates the hash value has a strong one-way property. If a password is embedded in the input sequence, anyone cannot generate the correct hash value without knowing the password, thereby ensuring its security. The SHA1 encryption algorithm input message is unlimited in length, and the output generated is a 160-bit message digest. The input is processed in 512-bit packets. The SHA1 encryption algorithm is irreversible, anti-collision, and has good avalanche effect.
The digital signature can be realized by a Hash algorithm, the principle of the digital signature is that a plaintext to be transmitted is converted into message digests (different plaintext correspond to different message digests) through a function operation (Hash), the message digests are encrypted and then transmitted to a receiver together with the plaintext, the receiver generates a new message digest for the received plaintext and decrypts and compares the new message digest with the message digest sent by the sender, the comparison result shows that the plaintext is not changed consistently, and if the comparison result shows that the plaintext is tampered.
The HMAC encryption algorithm is a key-dependent Hash-based message authentication Code (Hash-based message authentication Code), and the HMAC encryption algorithm uses a Hash algorithm (MD5, SHA1, etc.) and takes a key and a message as inputs to generate a message digest as an output. The key owned by both the HMAC sender and the HMAC receiver is calculated, and a third party without the key cannot calculate the correct hash value, so that the data can be prevented from being tampered.
The 3DES encryption algorithm is a symmetric DES-based algorithm, and three times of encryption is performed on a block of data by using three different keys, so that the intensity is higher.
The ECC encryption algorithm is also an asymmetric encryption algorithm, the main advantage being that it provides a comparable or higher level of security in some cases using a smaller key than other methods, such as the RSA encryption algorithm. One disadvantage, however, is that the encryption and decryption operations are implemented longer than other mechanisms (the ECC encryption algorithm is more costly to the CPU than the RSA encryption algorithm).
The RC2 encryption algorithm and the RC4 encryption algorithm encrypt large amounts of data with variable-length keys faster than the DES encryption algorithm. The IDEA encryption algorithm is an international data encryption algorithm and provides very strong security using a 128-bit key. The BLOWFSH encryption algorithm uses a variable-length key, the length can reach 448 bits, and the running speed is high.
The wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase wireless communication mode's flexibility, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires highly to communication quality. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The outsourcing calculation payment method based on the bitcoin has multiple wireless data transmission modes and can meet the requirements of users on the diversified data transmission modes.
Step S02, if the protocol can be complied with by two parties in integrity in the set time period, the miners will obtain the bitcoin with the appointed amount as the reward, and the outsourcers will get the deposit back; if the outsourcer does not obey the agreement default, the specific money with the specified amount is not paid to the miners as the reward, or no response is made within the set time period, the miners obtain the guarantee money as the compensation; if the miners do not comply with the agreement, do not complete the calculation task, or get the return, but return the deposit to the outsourcer without cooperating with the outsourcer, the outsourcer can also retrieve the deposit and the miners get the return: in this step, after the agreement is completed, in a set time period, if both parties (outsourcers and miners) of the agreement can obey the agreement honestly, the miners obtain the bit coins with the specified money as the reward, and the outsourcers take back the deposit; if the outsourcer does not obey the agreement default, the specific money with the specified amount is not paid to the miners as the reward, or no response is made within the set time period, the miners obtain the guarantee money as the compensation; if the miners do not comply with the agreement, do not complete the calculation task, or get the return, but return the deposit to the outsourcer without cooperating with the outsourcer, the outsourcer can also retrieve the deposit and the miners get no return. The above-mentioned set period of time was 15 days.
The embodiment also relates to a device for realizing the bit currency-based outsourcing calculation payment method, and the structural schematic diagram of the device is shown in fig. 2. In fig. 2, the apparatus includes a protocol encryption transmission unit 1 and a protocol completion unit 1; the agreement encryption transmission unit 1 is used for enabling an outsourcer and a miner to achieve an agreement, the outsourcer pays a guarantee fund to the miner in advance, the guarantee fund is used as compensation for the miner for honestly completing tasks but not obtaining a reward, and the agreement is encrypted through an encryption algorithm and then is sent to a block chain of the bitcoin network through the wireless communication module. The encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm, 3DES encryption algorithm, ECC encryption algorithm, RC2 encryption algorithm, RC4 encryption algorithm, IDEA encryption algorithm or BLOWFSH encryption algorithm. The protocol is encrypted and then transmitted, so that the data transmission safety is high.
The DES encryption algorithm is a block cipher, data is encrypted by taking 64 bits as a block, the key length of the DES encryption algorithm is 56 bits, and the same algorithm is used for encryption and decryption. The DES encryption algorithm is to keep secret a key, while the public algorithm includes encryption and decryption algorithms. In this way, only a person who has mastered the same key as the sender can interpret the ciphertext data encrypted by the DES encryption algorithm. Thus, deciphering the DES encryption algorithm is actually the encoding of the search key. For a 56 bit long key, the number of operations is 256 if the search is done exhaustively. As the capabilities of computer systems continue to evolve, the security of the DES encryption algorithm is much weaker than it would have been if it had just appeared, yet it can still be considered sufficient from the practical standpoint of non-critical nature. However, the DES encryption algorithm is now only used for authentication of old systems, and new encryption standards are more selected.
The AES encryption algorithm is an advanced encryption standard in cryptography, the encryption algorithm adopts a symmetric block cipher system, the minimum support of the key length is 128, 192 and 256, the block length is 128 bits, and the algorithm is easy to realize by various hardware and software. This encryption algorithm is a block encryption standard adopted by the federal government in the united states to replace the original DES, has been analyzed by many parties and is widely used throughout the world. The AES encryption algorithm is designed to support 128/192/256 bit (/32 ═ nb) data block sizes (i.e., packet lengths); the cipher length of 128/192/256 bits (/32 ═ nk) is supported, and in a 10-bit system, 34 × 1038, 62 × 1057 and 1.1 × 1077 keys are corresponded.
The RSA encryption algorithm is currently the most influential public key encryption algorithm and is generally considered to be one of the most elegant public key schemes at present. The RSA encryption algorithm, the first algorithm that can be used for both encryption and parity signing, is resistant to all cryptographic attacks known so far, and has been recommended by the ISO as the public key data encryption standard. The RSA encryption algorithm is based on a very simple number theory fact: it is easy to multiply two large prime numbers, but it is then desirable, but it is then extremely difficult to factorize their product, so the product can be made public as an encryption key.
The Base64 encryption algorithm is one of the most common encoding modes for transmitting 8-bit byte codes on a network, and the Base64 encoding can be used for transmitting longer identification information under the HTTP environment. For example, in the JAVAPERSISTENCE system HIBEMATE, Base64 was used to encode a longer unique identifier as a string used as a parameter in HTTP forms and HTTP GETTL. In other applications, it is also often necessary to encode the binary data into a form suitable for placement in a URL (including a hidden form field). In this case, the encoding by Base64 is not only relatively short, but also has the property of being unreadable, i.e., the encoded data cannot be directly seen by human eyes.
The MD5 encryption algorithm is a hash function widely used in the field of computer security to provide integrity protection for messages. A brief description of the MD5 encryption algorithm may be: the MD5 encryption algorithm processes incoming information in 512-bit packets, each of which is divided into 16 32-bit sub-packets, and after a series of processing, the output of the algorithm consists of four 32-bit packets, which are concatenated to produce a 128-bit hash value. The MD5 encryption algorithm is widely used for password authentication and key identification of various software. The MD5 encryption algorithm uses a hash function, and its typical application is to digest a piece of information to prevent tampering. A typical application of the MD5 encryption algorithm is to generate a finger print for a piece of Message to prevent "tampering". The use of the MD5 encryption algorithm also prevents "repudiation" by the author of the document if there is a third party certificate authority, a so-called digital signature application. The MD5 encryption algorithm is also widely used for login authentication of operating systems, such as UNIX, various BSD system login passwords, digital signatures, and so on.
The idea behind the SHA1 encryption algorithm is to receive a piece of plaintext and then convert it into a (usually smaller) piece of ciphertext in an irreversible manner, which can also be simply understood as the process of taking a string of input codes (called a pre-map or message) and converting them into a short, fixed-bit output sequence, i.e., a hash value (also called a message digest or a message authentication code). The security of the one-way hash function is that the operation process that generates the hash value has a strong one-way property. If a password is embedded in the input sequence, anyone cannot generate the correct hash value without knowing the password, thereby ensuring its security. The SHA1 encryption algorithm input message is unlimited in length, and the output generated is a 160-bit message digest. The input is processed in 512-bit packets. The SHA1 encryption algorithm is irreversible, anti-collision, and has good avalanche effect.
The digital signature can be realized by a Hash algorithm, the principle of the digital signature is that a plaintext to be transmitted is converted into message digests (different plaintext correspond to different message digests) through a function operation (Hash), the message digests are encrypted and then transmitted to a receiver together with the plaintext, the receiver generates a new message digest for the received plaintext and decrypts and compares the new message digest with the message digest sent by the sender, the comparison result shows that the plaintext is not changed consistently, and if the comparison result shows that the plaintext is tampered.
The HMAC encryption algorithm is a key-dependent Hash-based message authentication Code (Hash-based message authentication Code), and the HMAC encryption algorithm uses a Hash algorithm (MD5, SHA1, etc.) and takes a key and a message as inputs to generate a message digest as an output. The key owned by both the HMAC sender and the HMAC receiver is calculated, and a third party without the key cannot calculate the correct hash value, so that the data can be prevented from being tampered.
The 3DES encryption algorithm is a symmetric DES-based algorithm, and three times of encryption is performed on a block of data by using three different keys, so that the intensity is higher.
The ECC encryption algorithm is also an asymmetric encryption algorithm, the main advantage being that it provides a comparable or higher level of security in some cases using a smaller key than other methods, such as the RSA encryption algorithm. One disadvantage, however, is that the encryption and decryption operations are implemented longer than other mechanisms (the ECC encryption algorithm is more costly to the CPU than the RSA encryption algorithm).
The RC2 encryption algorithm and the RC4 encryption algorithm encrypt large amounts of data with variable-length keys faster than the DES encryption algorithm. The IDEA encryption algorithm is an international data encryption algorithm and provides very strong security using a 128-bit key. The BLOWFSH encryption algorithm uses a variable-length key, the length can reach 448 bits, and the running speed is high.
The wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase wireless communication mode's flexibility, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires highly to communication quality. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The device method has multiple wireless data transmission modes and can meet the requirements of users on diversified data transmission modes.
The agreement completion unit 2 is used for obtaining the bitcoin with the appointed amount as the reward by the miners and the outsourcers can take back the guarantee money if the two parties of the agreement can obey the agreement honestly within the set time period after the agreement is completed; if the outsourcer does not obey the agreement default, the specific money with the specified amount is not paid to the miners as the reward, or no response is made within the set time period, the miners obtain the guarantee money as the compensation; if the miners do not comply with the agreement, do not complete the calculation task, or get the return, but return the deposit to the outsourcer without cooperating with the outsourcer, the outsourcer can also retrieve the deposit and the miners get no return. The above-mentioned set period of time was 15 days.
In short, in this embodiment, as the outsourcer and the miners reach an agreement, the outsourcer pays the deposit to the miners in advance, the deposit is used as compensation for the miners for truthfully completing tasks but not obtaining the payment, and the agreement is encrypted by the encryption algorithm and then sent to the block chain of the bitcoin network through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; the invention provides a plurality of wireless communication modes, adopts an encryption algorithm for encryption, and can improve the security of data transmission, so that the invention has a plurality of wireless data transmission modes and higher security of data transmission.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (6)

1. An outsourcing calculation payment method based on bitcoin is characterized by comprising the following steps:
A) the outsourcer and the miners reach an agreement, the outsourcer pays a deposit to the miners in advance, the deposit is used as compensation for honesty completion of tasks but no payment of the miners, and the agreement is encrypted through an encryption algorithm and then is sent to a block chain of the bitcoin network through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
B) after the agreement is finished, if two parties of the agreement can obey the agreement honestly within a set time period, the miners obtain bitcoin with specified money as reward, and the outsourcers retrieve the deposit; if the outsourcer does not comply with the agreement default, the miners are not paid the bitcoin of the specified amount as a reward, or do not respond within the set time period, the miners obtain the deposit as compensation; if the mineworker is not in agreement, is not completing the calculation task, or is remunerated, but is not returning the deposit to the outsourcer in coordination with the outsourcer, the outsourcer can also retrieve the deposit without the mineworker being remunerated.
2. A bitcoin-based outsourced computing payment method according to claim 1, wherein the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm or a BLOWFISH encryption algorithm.
3. A bitcoin-based outsourced computing payment method according to claim 2, wherein the set period of time is 15 days.
4. An apparatus for implementing a bitcoin-based outsourced computing payment method according to claim 1, comprising:
a protocol encryption transmission unit: the method is used for an outsourcer and a miner to reach an agreement, the outsourcer pays a deposit in advance to the miner, the deposit is used as compensation for honestly completing tasks but not obtaining a reward of the miner, and the agreement is encrypted through an encryption algorithm and then is sent to a block chain of a bitcoin network through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
a protocol completion unit: after the agreement is finished, if two parties of the agreement can obey the agreement honestly within a set time period, the miners obtain bitcoin with specified money as reward, and the outsourcers retrieve the deposit; if the outsourcer does not comply with the agreement default, the miners are not paid the bitcoin of the specified amount as a reward, or do not respond within the set time period, the miners obtain the deposit as compensation; if the mineworker is not in agreement, is not completing the calculation task, or is remunerated, but is not returning the deposit to the outsourcer in coordination with the outsourcer, the outsourcer can also retrieve the deposit without the mineworker being remunerated.
5. The apparatus of claim 4, wherein the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, or a BLOWFSH encryption algorithm.
6. The apparatus of claim 5, wherein the set period of time is 15 days.
CN202010441394.XA 2020-05-22 2020-05-22 Outsourcing calculation payment method and device based on bitcoin Withdrawn CN111711950A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010441394.XA CN111711950A (en) 2020-05-22 2020-05-22 Outsourcing calculation payment method and device based on bitcoin

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010441394.XA CN111711950A (en) 2020-05-22 2020-05-22 Outsourcing calculation payment method and device based on bitcoin

Publications (1)

Publication Number Publication Date
CN111711950A true CN111711950A (en) 2020-09-25

Family

ID=72537359

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010441394.XA Withdrawn CN111711950A (en) 2020-05-22 2020-05-22 Outsourcing calculation payment method and device based on bitcoin

Country Status (1)

Country Link
CN (1) CN111711950A (en)

Similar Documents

Publication Publication Date Title
CN109743171B (en) Key series method for solving multi-party digital signature, timestamp and encryption
US5764766A (en) System and method for generation of one-time encryption keys for data communications and a computer program product for implementing the same
US11956367B2 (en) Cryptographic method for verifying data
JP2022521525A (en) Cryptographic method for validating data
CA2819211C (en) Data encryption
Vyakaranal et al. Performance analysis of symmetric key cryptographic algorithms
CN111432403A (en) Data auditing method and device based on block chain
CN113055376A (en) Block chain data protection system
CN105635114B (en) A kind of password method of calibration and system
CN111800784A (en) Block chain cloud service system based on cloud computing
CN111683061A (en) Block chain-based Internet of things equipment access control method and device
CN111931194A (en) Security monitoring big data processing method and device based on cloud computing
CN108599922B (en) Novel method for generating integrity authentication code of message containing secret key
CN111800384A (en) Financial service application management method and device based on block chain
CN111967955A (en) Electronic financial wind-controlled payment system based on block chain and 5G network technology
CN111641494A (en) Method and device for realizing global block chain
CN111654859A (en) Mobile block chain resource allocation method and device
CN111711950A (en) Outsourcing calculation payment method and device based on bitcoin
CN111768266A (en) Shopping system for commodities in shopping mall based on block chain and 5G network technology
CN111654854A (en) Remote data optimized transmission method and system based on cloud computing system
CN111695890A (en) Charging method and device based on block chain and cloud platform
CN111698679A (en) Data searching method and device based on block chain as service platform
CN111698219A (en) Block chain ledger implementation method and device based on material spectral characteristics
CN111800785A (en) Cloud forensics process recording method and device based on block chain
CN111682944A (en) Block chain network-based certificate revocation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200925