A kind of method for sending information, processing method and processing deviceTechnical field
The present invention relates to Internet technical field, more particularly to a kind of method for sending information, processing method and processing device.
Background technology
Anonymous communication demand in the Internet, applications is extensive, such as electronic voting, the Internet bank, electronics securities trading and electricitySub- commercial affairs etc..User wishes to protect the identity information of communication user when carrying out data transmission, prevents attacker's monitoring and analyzeCommunication data.And in traditional internet, unique procotol is owned by when each user is using network service(Internet Protocol, IP) address, each transmitting message includes data-source IP address and purpose IP address.AttackPerson can be by monitoring sender and recipients corresponding with the transmitting message discovery message in analysis network, therefore is difficult to realizeAnonymous communication.
Existing Anonymous communication mechanism mainly includes onion (tor) network anonymous communication, VPN (VirtualPrivate Network, VPN) encryption anonymous communication and bit letter (Bitmessage) anonymous communication etc..Hidden for tor networksName communication, its anonymity and onion number of nodes positive correlation, it is therefore desirable to large-scale infrastructure is safeguarded, moreover, tor networksThe threat of malicious node is highly prone to, when any node in tor networks is the malicious node that attacker builds, will be threatenedTo the path of information flow and the anonymity of information transmission of tor networks.Anonymous communication is encrypted for VPN, is present in tor networksSimilar the problem of, it is also required to extra VPN infrastructure, and when user's payment VPN service fees, also easily causesThe leakage of identity information, in addition, there is also can institutionalized risk for the supplier of VPN services.Believe anonymous communication for bit, itsSpecial structure one is needed to be used for the peer-to-peer network (Peer to Peer, P2P) of anonymous communication, according to the node in P2P networksAddress carries out the communication between node, although bit letter anonymous communication can be protected using " anonymity " of P2P nodes addressThe anonymity of communication is demonstrate,proved, but, existing substantial amounts of research at present has shown that the anonymity existing defects of the node address in P2P networks,There are a variety of methods, can to get a glimpse of node address associated with user real identification.
To sum up, existing anonymous information communication means all has the problem of anonymity is not enough.
The content of the invention
The present invention provides a kind of method for sending information, processing method and processing device, the anonymity to improve anonymous information communicationProperty.
The embodiment of the present invention provides a kind of method for sending information, including:
Receive the information to be transmitted and transmission objectives of user's input;
The encryption key of transmission objectives is obtained, and information to be transmitted is encrypted using encryption key;
Using the information to be transmitted after encryption as Transaction Information additional information parameter;The transacting targeted and friendship of Transaction InformationThe transmission objectives of the additional information parameter of easy information is different;
Transaction Information is sent by block catenary system.
Optionally, using the information to be transmitted after encryption as after the additional information parameter of Transaction Information, in addition to:
Generate public private key pair;
Transaction Information is signed using the private key in public private key pair;Comprising public and private in Transaction Information after signatureThe public key information of key centering.
Optionally, information to be transmitted is encrypted using encryption key, including:
The text or index of the information to be transmitted are encrypted using the encryption key;
Using the information to be transmitted after encryption as Transaction Information additional information parameter, including:
Using the text of the information to be transmitted after encryption or index as Transaction Information additional information parameter.
Optionally, the encryption key of transmission objectives is obtained, and information to be transmitted is encrypted using encryption key, is wrappedInclude:
Obtain the current encryption key of transmission objectives;
Current encryption key, the encryption key after being updated are updated according to preset rules;
Information to be transmitted is encrypted using the encryption key after renewal.
The embodiment of the present invention provides a kind of information processing method, including:
Receive from block catenary system and transmit the Transaction Information of coming;The additional letter of the transacting targeted and Transaction Information of Transaction InformationThe transmission objectives for ceasing parameter is different;The additional information parameter of Transaction Information is to use treating after the encryption keys of transmission objectivesTransmit information;
Utilize the additional information parameter in decryption key decryption Transaction Information;
In successful decryption, the information content in additional information parameter is extracted.
Optionally, before using the additional information parameter in decryption key decryption Transaction Information, in addition to:
Obtain the public key information in Transaction Information;Public key is the public key in the public private key pair that sender generates;
According to the signature of public key verifications Transaction Information;
When being verified, the additional information parameter in decrypted transaction information.
Optionally, the information content in additional information parameter is extracted, including:
Extract the text or index of information to be transmitted in additional information parameter.
Optionally, after the information content in extraction additional information parameter, in addition to:
Obtain decruption key;
Decruption key is updated according to preset rules.
The embodiment of the present invention provides a kind of information transmitting apparatus, including:
Transmit-Receive Unit, information to be transmitted and transmission objectives for receiving user's input;
Processing unit, the encryption key for obtaining transmission objectives, and information to be transmitted is added using encryption keyIt is close;
Processing unit, be additionally operable to using the information to be transmitted after encryption as Transaction Information additional information parameter;Transaction letterThe transmission objectives of the transacting targeted additional information parameter from Transaction Information of breath is different;
Transmit-Receive Unit, is additionally operable to send Transaction Information by block catenary system.
Optionally, processing unit is additionally operable to:
Generate public private key pair;
Transaction Information is signed using the private key in public private key pair;Comprising public and private in Transaction Information after signatureThe public key information of key centering.
Optionally, processing unit specifically for:
The text or index of the information to be transmitted are encrypted using the encryption key;
Using the text of the information to be transmitted after encryption or index as Transaction Information additional information parameter.
Optionally, processing unit specifically for:
Obtain the current encryption key of transmission objectives;
Current encryption key, the encryption key after being updated are updated according to preset rules;
Information to be transmitted is encrypted using the encryption key after renewal.
The embodiment of the present invention provides a kind of information processor, including:
Transmit-Receive Unit, the Transaction Information of coming is transmitted for receiving from block catenary system;The transacting targeted and friendship of Transaction InformationThe transmission objectives of the additional information parameter of easy information is different;The additional information parameter of Transaction Information is the encryption using transmission objectivesInformation to be transmitted after key encryption;
Processing unit, for utilizing the additional information parameter in decryption key decryption Transaction Information;
Processing unit, is additionally operable in successful decryption, extracts the information content in additional information parameter.
Optionally, processing unit is additionally operable to:
Obtain the public key information in Transaction Information;Public key is the public key in the public private key pair that sender generates;
According to the signature of public key verifications Transaction Information;
When being verified, the additional information parameter in decrypted transaction information.
Optionally, processing unit specifically for:
Extract the text or index of information to be transmitted in additional information parameter.
Optionally, processing unit is additionally operable to:
Obtain decruption key;
Decruption key is updated according to preset rules.
Transaction Information it is transacting targeted different from transmission objectives so that even if attacker can crack in block catenary system saveIncidence relation between dot address and user real identification, can only also obtain transacting targeted user real identification, and can not obtainTake the user real identification of transmission objectives.Moreover, the address for not having transmission objectives in Transaction Information in the embodiment of the present invention is believedBreath, recipient are by whether successful decryption determines whether to extract the information content in ciphertext data, rather than is transmitted by recognizingThe means of address determine whether to extract the information content in ciphertext data, even if so as to not have the ground of transmission objectives in Transaction InformationLocation information, also can guarantee that transmission objectives can be properly received the information to be transmitted entrained by Transaction Information.Therefore, the present invention is implementedTechnical scheme disclosed in example can strengthen the anonymity of anonymous communication.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, makes required in being described below to embodimentAccompanying drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for thisFor the those of ordinary skill in field, without having to pay creative labor, it can also be obtained according to these accompanying drawingsHis accompanying drawing.
Fig. 1 is a kind of bit coin network system architecture schematic diagram provided in an embodiment of the present invention;
Fig. 2 is a kind of method for sending information schematic flow sheet provided in an embodiment of the present invention;
Fig. 3 is a kind of information processing method schematic flow sheet provided in an embodiment of the present invention;
Fig. 4 is a kind of information transmission flow schematic diagram provided in an embodiment of the present invention;
Fig. 5 is a kind of message processing flow schematic diagram provided in an embodiment of the present invention;
Fig. 6 is a kind of information transmitting apparatus structural representation provided in an embodiment of the present invention;
Fig. 7 is a kind of information transmitting apparatus structural representation provided in an embodiment of the present invention.
Embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with accompanying drawing the present invention is made intoOne step it is described in detail, it is clear that described embodiment is only embodiment of the invention a part of, rather than whole implementationExample.Based on the embodiment in the present invention, what those of ordinary skill in the art were obtained under the premise of creative work is not madeAll other embodiment, belongs to the scope of protection of the invention.
The technical scheme that the embodiment of the present invention is provided is applied to most block catenary systems, and block catenary system is a kind ofAcentric network system, most common is bit coin network system.Fig. 1 is a kind of bit coin provided in an embodiment of the present inventionThe simple system architecture for showing bit coin network, bit coin net in actual applications in network system architecture schematic diagram, Fig. 1Network system architecture can be more much more complex than shown in Fig. 1.As shown in figure 1, bit coin network system is made up of multiple terminals, in the systemIn and in the absence of central server or the equipment with similar functions, each terminal in system is " equality ", all may be usedTo build, send and receive Transaction Information.If terminal bit coin network to be added, need to install specific in the terminalBit coin software, when bit coin running software, the terminal just adds bit coin network.Terminal is in bit coin network systemIn the presence of a unique address, this address can be voluntarily inputted by user by bit coin Software Create after a string of characters,It is portable with transacting targeted address information in Transaction Information when the transaction of bit coin is carried out between terminal.According to transacting targetedAddress information, bit coin network system takes midsequent forward mode to transmit Transaction Information, i.e., when a system node receives oneAfter individual Transaction Information, the transacting targeted address information in Transaction Information judges whether it is the address information of oneself, if notIt is then to broadcast the Transaction Information to neighbouring system node.Bit coin network system is a kind of relatively conventional block linkworkSystem, in addition to bit coin network system, such as the other digital coin systems in ether mill also all have similar principle and feature,It should be included among the embodiment of the present invention.
Based on the above-mentioned block catenary system framework by taking bit coin network system as an example, the embodiment of the present invention provides a kind of informationSending method.Fig. 2 is a kind of method for sending information schematic flow sheet provided in an embodiment of the present invention, as shown in Fig. 2 including followingStep:
S201:Receive the information to be transmitted and transmission objectives of user's input.
S202:The encryption key of transmission objectives is obtained, and information to be transmitted is encrypted using encryption key.
S203:Using the information to be transmitted after encryption as Transaction Information additional information parameter;The transaction mesh of Transaction InformationMark is different from the transmission objectives of the additional information parameter of Transaction Information.
S204:The Transaction Information is sent by block catenary system.
In specific implementation process, block catenary system can be bit coin network system or ether mill network system,Can also be block catenary system for specially being built for anonymous transmission, etc., the embodiment of the present invention is not construed as limiting to this.It is optional, block catenary system is bit coin network system, bit coin network system is that current coverage is most wide, it is the most ripe to develop,The block catenary system that operation is stablized the most, technical scheme provided in an embodiment of the present invention may be directly applied to bit coin network systemIn, the above-mentioned advantage of bit coin network system can be made full use of, what the performance embodiment of the present invention was brought to the full extent carriesThe technique effect of high anonymous communication anonymity.When Transaction Information is transmitted in block catenary system, generate the Transaction Information isSystem node is sender, and the system node of any one non-sent side can serve as the recipient of the Transaction Information, and transmitTarget is then one in numerous recipients of the Transaction Information.
In S201 specific implementation process, information to be transmitted is that user is intended to the anonymous information for being transferred to transmission objectives.For example, user A is intended to inform user B " 4 park entrances will be shown in tomorrow afternoon ", then, user A is sender, and information to be transmitted is justIt is " 4 park entrances will be shown in tomorrow afternoon ", and user B is the transmission objectives for needing to receive the information to be transmitted.
In S202 specific implementation process, it is under line or other logical that the encryption key of transmission objectives can be that sender passes throughLetter approach is obtained, and should ensure that encryption key can not be known by third party in objective.Encryption key can be sender and transmissionThe private key that target is arranged in advance, encryption and decryption are all carried out or sender and transmission mesh using this private keyEncryption key or the message receiver public key address of the cipher key pair of agreement are marked, wherein, public key address is in block linkworkThe identity of user in block catenary system equivalent to system node address in system, system node by block chain software (such asBit coin software in bit coin network system) generate public key address and private key corresponding with the public key address, the public private key pairIt is commonly used in the purposes such as authentication, digital signature in block catenary system.
Optionally, transmission Transaction Information is all updated to current encryption key each time, using the encryption after renewalInformation to be transmitted is encrypted key, specifically includes:Obtain the current encryption key of transmission objectives;According to preset rules moreNew current encryption key, the encryption key after being updated;Information to be transmitted is added using the encryption key after renewalIt is close.For example, current encryption key is A, preset rules are " Jia 2 on the basis of current encryption key ", then after updatingEncryption key be A+2, carried out after the transmission of Transaction Information, when transmitting again, current encryption key is A+2, rootIt is updated according to preset rules, the encryption key after being updated is A+4.
The Transaction Information built each time is all encrypted using new encryption key, reduces encryption key by attackerThe risk for obtaining and Transaction Information being cracked, so as to improve the anonymity of communication.Moreover, updated according to preset rules,So that sender and transmission objectives need to only carry out one-time pad encryption key transmission, subsequently according to preset rules to current encryption keyIt is updated, so as to reduce the risk obtained in encryption key transmittance process by third party, further increases communicationAnonymity.
In S203 specific implementation process, additional information parameter, one can be provided with the Transaction Information of block catenary systemAs be used for it is to be passed after being encrypted in record exchange hour, the transaction information such as reason, the embodiment of the present invention using this reference recordDefeated information.For example, in bit coin network system, additional information parameter is OP_RETURN parameters, Transaction Information is being builtWhen, just need the information record to be transmitted after encryption among OP_RETURN parameters.It is noted that the transaction of Transaction InformationTarget is different from transmission objectives, for example, user A transmits message to user B, then the transmission objectives of Transaction Information is user B, and is handed overThe transacting targeted of easy information is user C.Optionally, can be by the way that the transaction address information in Transaction Information be set into user CAddress information realize, can also arbitrarily input any transaction address information because the purpose of this Transaction Information be realizeUser A and is not necessary to guaranty that this Transaction Information is bound to realize between user A and other users to user B message transmissionProcess of exchange.Certainly, directly by user A to the user B message transmitted conceal in user D and user C or user A and user C itBetween arm's length dealing information in method, be also contained in the embodiment of the present invention, the application is no longer repeated this one by one.
In S204 specific implementation process, sender sends Transaction Information to block catenary system, specifically using wideTransaction Information is sent to neighbouring system node by the form broadcast, and in neighbouring system node non-transmitting target, there is neighbouringSystem node proceeds broadcast forwarding, i.e. relay forwarding.Because block catenary system uses relay forwarding pattern transmission letterAlmost all of system node will all receive this Transaction Information in breath, block catenary system.
Corresponding with above- mentioned information sending method, the embodiment of the present invention also provides a kind of information processing method.Fig. 3 is thisA kind of information processing method schematic flow sheet that inventive embodiments are provided, as shown in figure 3, comprising the following steps:
S301:Receive from block catenary system and transmit the Transaction Information of coming;The transacting targeted and Transaction Information of Transaction InformationThe transmission objectives of additional information parameter is different;The additional information parameter of Transaction Information is the encryption keys using transmission objectivesInformation to be transmitted afterwards.
S302:Utilize the additional information parameter in decryption key decryption Transaction Information.
S303:In successful decryption, the information content in additional information parameter is extracted.
In specific implementation process, because block catenary system uses relay forwarding pattern transmission information, a transaction letterBreath can almost be transferred to system nodes all in block catenary system, and above- mentioned information processing method is in block catenary systemWhat the system node of any non-sent side was performed as receiving point.
In S301 specific implementation process, the system node in block catenary system can receive many Transaction Informations, theseThere are some to be destined to the system node in Transaction Information, there are some not to be destined to the system node.With prior artUnlike, transacting targeted different from transmission objectives, the additional information ginseng of Transaction Information of the Transaction Information of the embodiment of the present inventionNumber is the information to be transmitted after the encryption keys using transmission objectives.
In S302 specific implementation process, system node after Transaction Information is received, except to judge oneself whether beIt is transacting targeted in Transaction Information, also to judge whether oneself is the transmission objectives that information to be transmitted is received in Transaction Information.In the Transaction Information that the embodiment of the present invention is provided, information to be transmitted is carry in its additional information parameter, system node is being receivedTo after Transaction Information, to judge oneself whether be Transaction Information transmission objectives, need to first using decryption key decryption merchandise letterAdditional information parameter in breath.Decruption key be with S202, used encryption key when information to be transmitted is encryptedCorresponding decruption key.Optionally, system node can be true according to the sender's public key address information carried in Transaction InformationDetermine caller information, and then determine the decruption key of encryption key corresponding with sender.
Alternatively, when there are the preset rules for updating encryption key between system node and the sender of agreement, systemThe information to be transmitted that used decruption key sends for the sender that the last time receives agreement during node decryption Transaction InformationAfterwards, the decruption key obtained is updated.Specifically, system node is after the information to be transmitted that the sender for receiving agreement sends,Decruption key is obtained, decruption key is updated according to preset rules.This be in order to ensure between encryption key and decruption key updateUniformity, it is ensured that decruption key is capable of the encrypted result of consistent successful decryption encryption key.For example, system node A and systemThere are preset rules 1 between node B, then system node A obtains solution after the information to be transmitted of system node B transmissions is receivedKey, decruption key is updated according to preset rules 1.
In S303 specific implementation process, whether the decryption of additional information parameter is succeeded can be according to default standard to solutionClose result is judged.For example, the result of successful decryption all possesses certain feature, such as first 3 are 111, or decryption knotFruit is alphanumeric combined crosswise, or the result of successful decryption is the sequence of regular length, or is wrapped in decrypted resultContaining key value made an appointment etc..Certainly, different criterions correspond to sender may need when building Transaction InformationCorrespondence to increase certain information in additional information parameter, the embodiment of the present invention is not repeated this one by one.In successful decryptionWhen, extract the information content in decrypted result, i.e., foregoing information to be transmitted.Optionally, in non-successful decryption, illustrate that this isSystem node is not the transmission objectives of the Transaction Information, now, the transaction is broadcasted to neighbouring system node using the form of broadcastInformation.
In the above-described embodiments, Transaction Information is transacting targeted different from transmission objectives so that even if attacker can breakThe incidence relation between block catenary system interior joint address and user real identification is solved, transacting targeted user can only be also obtained trueReal identity, and the user real identification of transmission objectives can not be obtained.Moreover, not passed in Transaction Information in the embodiment of the present inventionThe address information of defeated target, recipient by whether successful decryption determine whether extract ciphertext data in the information content, withoutIt is by recognizing that the means of transmission address determine whether to extract the information content in ciphertext data, even if so as to not have in Transaction InformationThere is the address information of transmission objectives, also can guarantee that transmission objectives can be properly received the information to be transmitted entrained by Transaction Information.Therefore, the technical scheme disclosed in the embodiment of the present invention can strengthen the anonymity of anonymous communication.
In block catenary system, because system node is large number of, it there is violated system node and forge Transaction InformationProblem.Optionally, after S203, in addition to:Generate public private key pair;Transaction Information is carried out using the private key in public private key pairSignature;The public key information in public private key pair is included in Transaction Information after signature.In specific implementation process, public private key pair canBy sender according to block chain protocol generation.Accordingly, before S302, in addition to:Obtain the public key information in Transaction Information;Public key is the public key in the public private key pair that described sender is generated;According to the signature of public key verifications Transaction Information;It is being verifiedWhen, the additional information parameter in decrypted transaction information.In block catenary system, the private key of system node only has system node itselfKnow, after being signed using private key to Transaction Information, when using public key verifications by when, just illustrate that this Transaction Information must beCome from the corresponding system node of public key information, if because public key information is not corresponding with private key information, just can not by checking, fromAnd the difficulty that violated system node forges Transaction Information is substantially increased, be conducive to improving the security of the system.
In embodiments of the present invention, the information to be transmitted after the additional information reference record encryption of Transaction Information is utilized.SoAnd, because original additional information parameter is the function for carrying out " taking a message ", it is only used for transmitting shorter information, for example,The additional information parameter of Transaction Information in bit coin network system can only store 83 bytes, beyond treating for 83 byte lengthsTransmission information will be unable to complete documentation in additional information parameter.The embodiment of the present invention provides a kind of side solved the above problemsMethod, optionally, the text or index of the information to be transmitted are encrypted using the encryption key;Will be to be passed after encryptionThe text of defeated information or index as Transaction Information additional information parameter.In specific implementation process, for being capable of complete documentationShorter information to be transmitted in additional information parameter directly can encrypt the text of information to be transmitted, and by after encryptionText as Transaction Information additional information parameter, and for can not complete documentation it is longer to be passed in additional information parameterDefeated information, the index of information to be transmitted can be encrypted, and using the index after encryption as Transaction Information additional informationParameter.For example, for longer information to be transmitted, first can be stored among cloud disk, afterwards by the cloud of the information to be transmittedDisk link is encrypted, and the cloud disk after encryption is linked the additional information parameter as Transaction Information.Accordingly, system nodeAfter successful decryption, optionally, the text or index of information to be transmitted in the additional information parameter are extracted.Pass through above-mentioned sideMethod so that no matter information to be transmitted length it is longer or shorter, the technical side that can be provided by the embodiment of the present inventionCase is transmitted, so as to expand the scope of application of the embodiment of the present invention.
In order to further illustrate technical scheme that the embodiment of the present invention is provided, the embodiment of the present invention also provides following one kindPossible implementation.It should be understood that a kind of following possible implementation is simply to illustrate that what the embodiment of the present invention was providedTechnical scheme, not representing the embodiment of the present invention only includes or is only applicable to a kind of following situation.
A kind of possible implementation
Fig. 4 is a kind of information transmission flow schematic diagram provided in an embodiment of the present invention, as shown in figure 4, comprising the following steps:
S401:Receive information to be transmitted and transmission objectives.
S402:Obtain the public key information of target to be transmitted.
S403:Encrypt information to be transmitted.
S404:Transaction Information is constructed, the information to be transmitted after encryption is regard as the additional information parameter of Transaction Information, transactionThe transmission objectives of the additional information parameter of the transacting targeted and Transaction Information of information is different.
S405:According to block chain agreement, public private key pair is generated.
S406:Transaction Information is signed using the private key in public private key pair.
S407:The Transaction Information after signature is sent to block catenary system.
Fig. 5 is a kind of message processing flow schematic diagram provided in an embodiment of the present invention, as shown in figure 5, comprising the following steps:
S501:Receive from block catenary system and transmit the Transaction Information of coming.
S502:Verify the signature in Transaction Information.
S503:If signature verification passes through, S504 is performed, otherwise, S507 is performed.
S504:Additional information parameter in decrypted transaction information.
S505:If successful decryption, S506 is performed, otherwise, S508 is performed.
S506:Extract the information content in additional information parameter.
S507:Abandon the Transaction Information.
S508:The Transaction Information is broadcasted to adjacent node.
In a kind of above-mentioned possible implementation, Transaction Information it is transacting targeted different from transmission objectives, attacker withoutMethod obtains any information of transmission objectives from Transaction Information, so as to improve the anonymity of communication.In addition, sender's private keyTransaction Information is signed, and recipient is only handled Transaction Information of the signature verification after, to signature verification notThe Transaction Information passed through is then directly abandoned, and the difficulty that attacker forges Transaction Information is improved, so as to improve the safety of systemProperty.
Based on identical technical concept, the embodiment of the present invention also provides a kind of information transmitting apparatus, and the device can be realizedAny one above-mentioned embodiment.Fig. 6 is a kind of information transmitting apparatus structural representation provided in an embodiment of the present invention, such as Fig. 6 institutesShow, dispensing device 600 includes:Transmit-Receive Unit 601 and processing unit 602, wherein,
Transmit-Receive Unit 601, information to be transmitted and transmission objectives for receiving user's input;
Processing unit 602, the encryption key for obtaining transmission objectives, and information to be transmitted is carried out using encryption keyEncryption;
Processing unit 602, be additionally operable to using the information to be transmitted after encryption as Transaction Information additional information parameter;TransactionThe transmission objectives of the additional information parameter of the transacting targeted and Transaction Information of information is different;
Transmit-Receive Unit 601, is additionally operable to send Transaction Information by block catenary system.
Optionally, processing unit 602 is additionally operable to:
Generate public private key pair;
Transaction Information is signed using the private key in public private key pair;Comprising public and private in Transaction Information after signatureThe public key information of key centering.
Optionally, processing unit 602 specifically for:
The text or index of the information to be transmitted are encrypted using the encryption key;
Using the text of the information to be transmitted after encryption or index as Transaction Information additional information parameter.
Optionally, processing unit 602 specifically for:
Obtain the current encryption key of transmission objectives;
Current encryption key, the encryption key after being updated are updated according to preset rules;
Information to be transmitted is encrypted using the encryption key after renewal.
Based on identical technical concept, the embodiment of the present invention also provides a kind of information processor, and the device can be realizedAny one above-mentioned embodiment.Fig. 7 is a kind of information transmitting apparatus structural representation provided in an embodiment of the present invention, such as Fig. 7 institutesShow, dispensing device 700 includes:Transmit-Receive Unit 701 and processing unit 702, wherein,
Transmit-Receive Unit 701, the Transaction Information of coming is transmitted for receiving from block catenary system;Transaction Information it is transacting targeted withThe transmission objectives of the additional information parameter of Transaction Information is different;The additional information parameter of Transaction Information is adding using transmission objectivesInformation to be transmitted after key encryption;
Processing unit 702, for utilizing the additional information parameter in decryption key decryption Transaction Information;
Processing unit 702, is additionally operable in successful decryption, extracts the information content in additional information parameter.
Optionally, processing unit 702 is additionally operable to:
Obtain the public key information in Transaction Information;Public key is the public key in the public private key pair that sender generates;
According to the signature of public key verifications Transaction Information;
When being verified, the additional information parameter in decrypted transaction information.
Optionally, processing unit 702 specifically for:
Extract the text or index of information to be transmitted in additional information parameter.
Optionally, processing unit 702 is additionally operable to:
Obtain decruption key;
Decruption key is updated according to preset rules.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program productFigure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagramJourney and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be providedThe processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produceA raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for realThe device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spyDetermine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring toMake the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram orThe function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meterSeries of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer orThe instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram oneThe step of function of being specified in individual square frame or multiple square frames.
, but those skilled in the art once know basic creation although preferred embodiments of the present invention have been describedProperty concept, then can make other change and modification to these embodiments.So, appended claims are intended to be construed to include excellentSelect embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present inventionGod and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologiesWithin, then the present invention is also intended to comprising including these changes and modification.