技术领域technical field
本发明涉及区块链技术领域,尤其涉及一种基于区块链的信息传输方法、终端、设备及可读存储介质。The present invention relates to the technical field of block chains, in particular to a block chain-based information transmission method, terminal, device and readable storage medium.
背景技术Background technique
传统的信息传输系统,在信息传输过程中,特别是在信息交易过程中,无法保证信息的机密性,及时在不同用户之间使用秘密共享技术来保证信息的机密性,但是也不能防止各个用户之间联合起来提高虚假信息。如传统的拍卖系统均基于中心化模式,传统的拍卖系统主要包括物品出售者、物品、拍卖者和竞标者四个角色,物品出售者发布第二信息,并委托第三方机构(拍卖者)拍卖商品,竞标者加入拍卖系统,并对物品出价,物品最终属于出家最高的竞标者。匿名拍卖场景中,竞标者信息对外保密,只公布中标者信息,从而保障竞标者隐私。为了防止不诚实的拍卖者与竞标者联合欺骗物品出售者,分布式拍卖系统应运而生,分布式拍卖系统设置了多个拍卖者,拍卖者使用秘密共享技术共同解密竞标者发布的投标信息。The traditional information transmission system, in the process of information transmission, especially in the process of information transaction, cannot guarantee the confidentiality of information, and uses secret sharing technology between different users in time to ensure the confidentiality of information, but it cannot prevent each user from join forces to increase disinformation. For example, the traditional auction system is based on a centralized model. The traditional auction system mainly includes four roles: item seller, item, auctioneer and bidder. The item seller releases the second information and entrusts a third-party organization (auctioneer) to auction Items, bidders join the auction system and place bids on items, which ultimately go to the highest bidder. In the anonymous auction scenario, the information of the bidders is kept confidential, and only the information of the winning bidder is published, thereby protecting the privacy of the bidders. In order to prevent dishonest auctioneers and bidders from jointly deceiving item sellers, a distributed auction system came into being. The distributed auction system sets up multiple auctioneers, and the auctioneers use secret sharing technology to jointly decrypt the bidding information issued by the bidders.
综上所述,现有的分布式信息传输系统成本高,且存在无法保证信息的机密性。To sum up, the existing distributed information transmission system is costly and cannot guarantee the confidentiality of information.
发明内容Contents of the invention
本发明的主要目的在于提供一种基于区块链的信息传输方法、终端、设备及可读存储介质,旨在解决现有的分布式信息传输系统成本高,且存在无法保证信息的机密性的技术问题。The main purpose of the present invention is to provide a block chain-based information transmission method, terminal, equipment and readable storage medium, aiming at solving the problem of high cost of the existing distributed information transmission system and the inability to guarantee the confidentiality of information technical problem.
为实现上述目的,本发明提供一种基于区块链的信息传输方法,所述基于区块链的信息传输方法包括步骤:In order to achieve the above object, the present invention provides a block chain-based information transmission method, the block chain-based information transmission method comprising steps:
当接收到第二终端发送的加入预设信息群的加入请求后,调用群签名算法为所述第二终端生成第二终端私钥,并获取第一终端发送的第一终端公钥;After receiving the joining request sent by the second terminal to join the preset information group, call the group signature algorithm to generate the second terminal private key for the second terminal, and obtain the first terminal public key sent by the first terminal;
将所述第二终端私钥和所述第一终端公钥发送给所述第二终端,以供所述第二终端根据所获取的第一信息、所接收的所述第二终端私钥和所述第一终端公钥生成信息签名和信息字符串,并返回所述信息签名和所述信息字符串;sending the second terminal private key and the first terminal public key to the second terminal, for the second terminal to use the acquired first information, the received second terminal private key and the received second terminal public key The first terminal public key generates an information signature and an information string, and returns the information signature and the information string;
当接收到所述信息签名和所述信息字符串后,将所述信息签名和所述信息字符串写入区块链中;After receiving the information signature and the information string, write the information signature and the information string into the block chain;
其中,所述第二终端根据所获取的第一信息、所接收的所述第二终端私钥和所述第一终端公钥生成信息签名和信息字符串的步骤包括:Wherein, the step of generating an information signature and an information string by the second terminal according to the acquired first information, the received private key of the second terminal and the public key of the first terminal includes:
所述第二终端获取第一信息,计算所述第一信息的第一哈希值;The second terminal acquires first information, and calculates a first hash value of the first information;
所述第二终端获取预设的加密密钥,根据所述加密密钥加密所述第一信息,生成与所述第一信息对应的密文,计算所述密文的第二哈希值;The second terminal acquires a preset encryption key, encrypts the first information according to the encryption key, generates a ciphertext corresponding to the first information, and calculates a second hash value of the ciphertext;
采用所述第一终端公钥加密所述加密密钥,得到加密后的所述加密密钥,并计算加密后的所述加密密钥的第三哈希值;Encrypting the encryption key by using the first terminal public key to obtain the encrypted encryption key, and calculating a third hash value of the encrypted encryption key;
将所述密文、加密后的所述加密密钥、所述第一哈希值、所述第二哈希值和所述第三哈希值拼接成信息字符串;splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value, and the third hash value into an information string;
从所述区块链中获取预存的群公钥,基于群签名算法,根据所述第二终端私钥、所述群公钥和所述信息字符串生成信息签名。Obtain the pre-stored group public key from the block chain, and generate an information signature based on the second terminal private key, the group public key, and the information string based on a group signature algorithm.
优选地,所述当接收到第二终端发送的加入预设信息群的加入请求后,调用群签名算法为所述第二终端生成第二终端私钥,并获取第一终端发送的第一终端公钥的步骤之前,还包括:Preferably, after receiving the joining request sent by the second terminal to join the preset information group, call the group signature algorithm to generate the second terminal private key for the second terminal, and obtain the first terminal private key sent by the first terminal Before the public key steps, also include:
当接收到第一终端发送的第二信息和第一终端公钥后,创建信息群,并调用群签名算法生成信息群的群公钥和群主私钥;After receiving the second information and the first terminal public key sent by the first terminal, create an information group, and call a group signature algorithm to generate a group public key and a group owner's private key of the information group;
将所述第二信息和所述群公钥写入所述区块链中,并将所述群主私钥返回给所述第一终端。Writing the second information and the group public key into the blockchain, and returning the group owner private key to the first terminal.
优选地,所述将所述第二终端私钥和所述第一终端公钥发送给所述第二终端,以供所述第二终端根据所获取的第一信息、所接收的所述第二终端私钥和所述第一终端公钥生成信息签名和信息字符串,并返回所述信息签名和所述信息字符串的步骤之前,还包括:Preferably, the second terminal private key and the first terminal public key are sent to the second terminal for the second terminal to use according to the obtained first information and the received first terminal key. Before the second terminal private key and the first terminal public key generate an information signature and an information character string, and return the information signature and the information character string, further include:
判断所述第二信息对应物品的价值是否小于或者等于预设价值;judging whether the value of the item corresponding to the second information is less than or equal to the preset value;
若所述物品的价值小于或者等于所述预设价值,则执行所述将所述第二终端私钥和所述第一终端公钥发送给所述第二终端的步骤;If the value of the item is less than or equal to the preset value, then performing the step of sending the second terminal private key and the first terminal public key to the second terminal;
若所述物品的价值大于所述预设价值,审核所述第二终端对应的用户是否符合预设条件;If the value of the item is greater than the preset value, checking whether the user corresponding to the second terminal meets the preset condition;
若所述第二终端对应的用户符合所述竞标条件,则执行所述将所述第二终端私钥和所述第一终端公钥发送给所述第二终端的步骤。If the user corresponding to the second terminal meets the bidding condition, the step of sending the private key of the second terminal and the public key of the first terminal to the second terminal is performed.
优选地,所述当接收到第一终端发送的第二信息和第一终端公钥后,创建信息群,并调用群签名算法生成信息群的群公钥和群主私钥的步骤包括:Preferably, after receiving the second information and the first terminal public key sent by the first terminal, creating an information group, and calling the group signature algorithm to generate the group public key and the group owner's private key of the information group include:
当接收到第一终端发送的第二信息和第一终端公钥后,根据所述第二信息检测所述第二信息对应的物品是否合法;After receiving the second information sent by the first terminal and the public key of the first terminal, detecting whether the item corresponding to the second information is legal according to the second information;
若确定所述物品合法,则创建信息群,并调用群签名算法生成信息群的群公钥和群主私钥。If it is determined that the item is legal, an information group is created, and the group signature algorithm is called to generate the group public key and the group owner's private key of the information group.
优选地,所述当接收到第一终端发送的第二信息和第一终端公钥后,根据所述第二信息检测所述第二信息对应的物品是否合法的步骤之后,还包括:Preferably, after receiving the second information sent by the first terminal and the public key of the first terminal, after the step of detecting whether the item corresponding to the second information is legal according to the second information, it further includes:
若确定所述物品非法,则生成提示信息,并将所述提示信息发送给所述第一终端,以供所述第一终端根据所述提示信息提示对应用户所述物品非法。If it is determined that the item is illegal, generating prompt information, and sending the prompt information to the first terminal, so that the first terminal prompts a corresponding user that the item is illegal according to the prompt information.
优选地,所述当接收到所述信息签名和所述信息字符串后,将所述信息签名和所述信息字符串写入区块链中的步骤之后,还包括:Preferably, after the step of writing the information signature and the information string into the block chain after receiving the information signature and the information string, it also includes:
当接收到所述第一终端发送的获取所述第二信息对应物品用户对应的身份信息、第一信息和信息字符串的字符串标识后,将获取所述第二信息对应物品用户的所述身份信息、所述第一信息和所述字符串标识写入所述区块链中。After receiving the identity information corresponding to the item user corresponding to the second information, the first information, and the string identification of the information string sent by the first terminal, it will acquire the item user’s ID corresponding to the second information The identity information, the first information and the character string identifier are written into the block chain.
优选地,所述当接收到所述信息签名和所述信息字符串后,将所述信息签名和所述信息字符串写入区块链中的步骤之后,还包括:Preferably, after the step of writing the information signature and the information string into the block chain after receiving the information signature and the information string, it also includes:
当接收到监管终端发送的追踪非法第一信息的追踪请求后,将所述追踪请求发送给所述第一终端,以供所述第一终端根据所述追踪请求确定所述非法第一信息对应的非法信息群,根据所述非法信息群的群主私钥确定所述非法第一信息对应的用户。After receiving the tracking request sent by the supervisory terminal for tracking illegal first information, the tracking request is sent to the first terminal, so that the first terminal can determine the corresponding illegal first information according to the tracking request. the illegal information group, and determine the user corresponding to the illegal first information according to the private key of the group owner of the illegal information group.
此外,为实现上述目的,本发明还提供一种基于区块链的信息传输方法,所述基于区块链的信息传输方法包括以下步骤:In addition, in order to achieve the above object, the present invention also provides a blockchain-based information transmission method, the blockchain-based information transmission method comprising the following steps:
当第二终端接收到第三方系统发送的第二终端私钥和第一终端的第一终端公钥后,获取第一信息和预设的加密密钥;After receiving the second terminal private key and the first terminal public key of the first terminal sent by the third-party system, the second terminal obtains the first information and the preset encryption key;
计算所述第一信息的第一哈希值,并根据所述加密密钥加密所述第一信息,生成与所述第一信息对应的密文,计算所述密文的第二哈希值;calculating a first hash value of the first information, encrypting the first information according to the encryption key, generating a ciphertext corresponding to the first information, and calculating a second hash value of the ciphertext ;
采用所述第一终端公钥加密所述加密密钥,得到加密后的所述加密密钥,并计算加密后的所述加密密钥的第三哈希值;Encrypting the encryption key by using the first terminal public key to obtain the encrypted encryption key, and calculating a third hash value of the encrypted encryption key;
将所述密文、加密后的所述加密密钥、所述第一哈希值、所述第二哈希值和所述第三哈希值拼接成信息字符串;splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value, and the third hash value into an information string;
从区块链中获取预存的群公钥,基于群签名算法,根据所述第二终端私钥、所述群公钥和所述信息字符串生成信息签名,并将所述信息签名和所述信息字符串发送给所述第三方系统,以供所述第三方系统将所述信息签名和所述信息字符串写入所述区块链中。Obtain the pre-stored group public key from the blockchain, generate an information signature based on the second terminal private key, the group public key, and the information string based on the group signature algorithm, and combine the information signature with the The information string is sent to the third-party system for the third-party system to write the information signature and the information string into the block chain.
进一步地,所述当第二终端接收到第一终端发送的第二终端私钥和第二公钥后,获取第一信息和预设的加密密钥的步骤之前,还包括:Further, after the second terminal receives the second terminal private key and the second public key sent by the first terminal, before the step of obtaining the first information and the preset encryption key, it also includes:
当所述第二终端侦测到加入所述第三方系统创建的信息群的加入请求后,将所述加入请求发送给所述第三方系统,以供所述第三方系统调用群签名算法,生成第二终端私钥,并返回所述第二终端私钥和所述第一终端发送的第一终端公钥。When the second terminal detects a joining request to join the information group created by the third-party system, it sends the joining request to the third-party system for the third-party system to call a group signature algorithm to generate The private key of the second terminal, and return the private key of the second terminal and the public key of the first terminal sent by the first terminal.
此外,为实现上述目的,本发明还提供一种基于区块链的信息传输终端,所述基于区块链的信息传输终端包括:In addition, in order to achieve the above purpose, the present invention also provides a block chain-based information transmission terminal, the block chain-based information transmission terminal includes:
获取模块,用于当接收到第三方系统发送的第二终端私钥和第一终端的第一终端公钥后,获取第一信息和预设的加密密钥;An acquisition module, configured to acquire the first information and the preset encryption key after receiving the second terminal private key and the first terminal public key of the first terminal sent by the third-party system;
计算模块,用于计算所述第一信息的第一哈希值;a calculation module, configured to calculate a first hash value of the first information;
加密模块,用于根据所述加密密钥加密所述第一信息,生成与所述第一信息对应的密文;An encryption module, configured to encrypt the first information according to the encryption key, and generate ciphertext corresponding to the first information;
所述计算模块还用于计算所述密文的第二哈希值;The calculation module is also used to calculate a second hash value of the ciphertext;
所述加密模块还用于采用所述第一终端公钥加密所述加密密钥,得到加密后的所述加密密钥;The encryption module is further configured to use the first terminal public key to encrypt the encryption key to obtain the encrypted encryption key;
所述计算模块还用于计算加密后的所述加密密钥的第三哈希值;The calculation module is also used to calculate a third hash value of the encrypted encryption key;
拼接模块,用于将所述密文、加密后的所述加密密钥、所述第一哈希值、所述第二哈希值和所述第三哈希值拼接成信息字符串;A splicing module, configured to splice the ciphertext, the encrypted encryption key, the first hash value, the second hash value, and the third hash value into an information string;
生成模块,用于从区块链中获取预存的群公钥,基于群签名算法,根据所述第二终端私钥、所述群公钥和所述信息字符串生成信息签名;A generating module, configured to obtain a prestored group public key from the block chain, and generate an information signature based on the second terminal private key, the group public key and the information string based on the group signature algorithm;
发送模块,用于将所述信息签名和所述信息字符串发送给所述第三方系统,以供所述第三方系统将所述信息签名和所述信息字符串写入所述区块链中。A sending module, configured to send the information signature and the information string to the third-party system, so that the third-party system writes the information signature and the information string into the block chain .
此外,为实现上述目的,本发明还提供一种基于区块链的信息传输设备,所述基于区块链的信息传输设备包括存储器、处理器和存储在所述存储器上并可在所述处理器上运行的基于区块链的信息传输程序,所述基于区块链的信息传输程序被所述处理器执行时实现如上所述的基于区块链的信息传输方法的步骤。In addition, in order to achieve the above object, the present invention also provides a block chain-based information transmission device, the block chain-based information transmission device includes a memory, a processor and a A block chain-based information transmission program running on the processor, and when the block chain-based information transmission program is executed by the processor, the steps of the block chain-based information transmission method as described above are implemented.
此外,为实现上述目的,本发明还提供一种计算机可读存储介质,所述计算机可读存储介质上存储有基于区块链的信息传输程序,所述基于区块链的信息传输程序被处理器执行时实现如上所述的基于区块链的信息传输方法的步骤。In addition, in order to achieve the above object, the present invention also provides a computer-readable storage medium, on which a block chain-based information transmission program is stored, and the block-chain-based information transmission program is processed When the server executes, it realizes the steps of the information transmission method based on the block chain as described above.
本发明利用区块链的去中心化和账簿共享的特性,且信息字符串和信息签名是由第三方系统以统一的账户身份发布到区块链中,在区块链中不会暴露第二终端对应用户的身份,也不会暴露第二终端对应用户的信息,保证了第一信息的机密性,且通过区块链的去中心化特性,降低了信息传输过程中的通信开销,降低了信息传输的成本。The present invention utilizes the characteristics of decentralization and account book sharing of the block chain, and the information string and information signature are issued to the block chain by a third-party system with a unified account identity, and the second The identity of the terminal corresponding to the user will not expose the information of the second terminal corresponding to the user, which ensures the confidentiality of the first information, and through the decentralization of the blockchain, the communication overhead in the process of information transmission is reduced, and the The cost of information transmission.
附图说明Description of drawings
图1是本发明实施例方案涉及的硬件运行环境的结构示意图;Fig. 1 is a schematic structural diagram of the hardware operating environment involved in the solution of the embodiment of the present invention;
图2为本发明基于区块链的信息传输方法第一实施例的流程示意图;FIG. 2 is a schematic flow diagram of the first embodiment of the blockchain-based information transmission method of the present invention;
图3为本发明基于区块链的信息传输方法第二实施例的流程示意图。FIG. 3 is a schematic flowchart of a second embodiment of the blockchain-based information transmission method of the present invention.
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The realization of the purpose of the present invention, functional characteristics and advantages will be further described in conjunction with the embodiments and with reference to the accompanying drawings.
具体实施方式Detailed ways
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
如图1所示,图1是本发明实施例方案涉及的硬件运行环境的结构示意图。As shown in FIG. 1 , FIG. 1 is a schematic structural diagram of a hardware operating environment involved in the solution of the embodiment of the present invention.
需要说明的是,图1即可为基于区块链的信息传输设备的硬件运行环境的结构示意图。本发明实施例基于区块链的信息传输设备可以是PC,便携计算机等终端设备。It should be noted that FIG. 1 is a schematic structural diagram of a hardware operating environment of a blockchain-based information transmission device. The information transmission device based on the block chain in the embodiment of the present invention can be a terminal device such as a PC or a portable computer.
如图1所示,该基于区块链的信息传输设备可以包括:处理器1001,例如CPU,网络接口1004,用户接口1003,存储器1005,通信总线1002。其中,通信总线1002用于实现这些组件之间的连接通信。用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储装置。As shown in FIG. 1 , the blockchain-based information transmission device may include: a processor 1001 , such as a CPU, a network interface 1004 , a user interface 1003 , a memory 1005 , and a communication bus 1002 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface. Optionally, the network interface 1004 may include a standard wired interface and a wireless interface (such as a WI-FI interface). The memory 1005 can be a high-speed RAM memory, or a stable memory (non-volatile memory), such as a disk memory. Optionally, the memory 1005 may also be a storage device independent of the aforementioned processor 1001 .
本领域技术人员可以理解,图1中示出的基于区块链的信息传输设备结构并不构成对基于区块链的信息传输设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。Those skilled in the art can understand that the block chain-based information transmission device structure shown in Figure 1 does not constitute a limitation on the block chain-based information transmission device, and may include more or less components than those shown in the illustration, Or combine certain components, or different component arrangements.
如图1所示,作为一种计算机存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及基于区块链的信息传输程序。其中,操作系统是管理和控制基于区块链的信息传输设备硬件和软件资源的程序,支持基于区块链的信息传输程序以及其它软件或程序的运行。As shown in FIG. 1 , the memory 1005 as a computer storage medium may include an operating system, a network communication module, a user interface module, and an information transmission program based on blockchain. Among them, the operating system is a program that manages and controls the hardware and software resources of the blockchain-based information transmission device, and supports the operation of the blockchain-based information transmission program and other software or programs.
在图1所示的基于区块链的信息传输设备中,用户接口1003主要用于接收第一终端、第二终端和监管终端发送的请求、数据等;网络接口1004主要用于连接后台服务器,与后台服务器进行数据通信;而处理器1001可以用于调用存储器1005中存储的基于区块链的信息传输程序,并执行以下操作:In the blockchain-based information transmission device shown in Figure 1, the user interface 1003 is mainly used to receive requests, data, etc. sent by the first terminal, the second terminal and the supervision terminal; the network interface 1004 is mainly used to connect to the background server, Perform data communication with the background server; and the processor 1001 can be used to call the block chain-based information transmission program stored in the memory 1005, and perform the following operations:
当接收到第二终端发送的加入预设信息群的加入请求后,调用群签名算法为所述第二终端生成第二终端私钥,并获取第一终端发送的第一终端公钥;After receiving the joining request sent by the second terminal to join the preset information group, call the group signature algorithm to generate the second terminal private key for the second terminal, and obtain the first terminal public key sent by the first terminal;
将所述第二终端私钥和所述第一终端公钥发送给所述第二终端,以供所述第二终端根据所获取的第一信息、所接收的所述第二终端私钥和所述第一终端公钥生成信息签名和信息字符串,并返回所述信息签名和所述信息字符串;sending the second terminal private key and the first terminal public key to the second terminal, for the second terminal to use the acquired first information, the received second terminal private key and the received second terminal public key The first terminal public key generates an information signature and an information string, and returns the information signature and the information string;
当接收到所述信息签名和所述信息字符串后,将所述信息签名和所述信息字符串写入区块链中;After receiving the information signature and the information string, write the information signature and the information string into the block chain;
其中,所述第二终端根据所获取的第一信息、所接收的所述第二终端私钥和所述第一终端公钥生成信息签名和信息字符串的步骤包括:Wherein, the step of generating an information signature and an information string by the second terminal according to the acquired first information, the received private key of the second terminal and the public key of the first terminal includes:
所述第二终端获取第一信息,计算所述第一信息的第一哈希值;The second terminal acquires first information, and calculates a first hash value of the first information;
所述第二终端获取预设的加密密钥,根据所述加密密钥加密所述第一信息,生成与所述第一信息对应的密文,计算所述密文的第二哈希值;The second terminal acquires a preset encryption key, encrypts the first information according to the encryption key, generates a ciphertext corresponding to the first information, and calculates a second hash value of the ciphertext;
采用所述第一终端公钥加密所述加密密钥,得到加密后的所述加密密钥,并计算加密后的所述加密密钥的第三哈希值;Encrypting the encryption key by using the first terminal public key to obtain the encrypted encryption key, and calculating a third hash value of the encrypted encryption key;
将所述密文、加密后的所述加密密钥、所述第一哈希值、所述第二哈希值和所述第三哈希值拼接成信息字符串;splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value, and the third hash value into an information string;
从所述区块链中获取预存的群公钥,基于群签名算法,根据所述第二终端私钥、所述群公钥和所述信息字符串生成信息签名。Obtain the pre-stored group public key from the block chain, and generate an information signature based on the second terminal private key, the group public key, and the information string based on a group signature algorithm.
进一步地,所述当接收到第二终端发送的加入预设信息群的加入请求后,调用群签名算法为所述第二终端生成第二终端私钥,并获取第一终端发送的第一终端公钥的步骤之前,处理器1001还可以用于调用存储器1005中存储的基于区块链的信息传输程序,并执行以下步骤:Further, after receiving the joining request sent by the second terminal to join the preset information group, call the group signature algorithm to generate the second terminal private key for the second terminal, and obtain the first terminal private key sent by the first terminal. Before the step of the public key, the processor 1001 can also be used to call the block chain-based information transmission program stored in the memory 1005, and perform the following steps:
当接收到第一终端发送的第二信息和第一终端公钥后,创建信息群,并调用群签名算法生成信息群的群公钥和群主私钥;After receiving the second information and the first terminal public key sent by the first terminal, create an information group, and call a group signature algorithm to generate a group public key and a group owner's private key of the information group;
将所述第二信息和所述群公钥写入所述区块链中,并将所述群主私钥返回给所述第一终端。Writing the second information and the group public key into the blockchain, and returning the group owner private key to the first terminal.
进一步地,所述将所述第二终端私钥和所述第一终端公钥发送给所述第二终端,以供所述第二终端根据所获取的第一信息、所接收的所述第二终端私钥和所述第一终端公钥生成信息签名和信息字符串,并返回所述信息签名和所述信息字符串的步骤之前,处理器1001还可以用于调用存储器1005中存储的基于区块链的信息传输程序,并执行以下步骤:Further, the second terminal private key and the first terminal public key are sent to the second terminal for the second terminal to use according to the obtained first information and the received first terminal key. The second terminal private key and the first terminal public key generate an information signature and an information character string, and before the step of returning the information signature and the information character string, the processor 1001 may also be used to call the information stored in the memory 1005 based on The information transmission program of the blockchain, and perform the following steps:
判断所述第二信息对应物品的价值是否小于或者等于预设价值;judging whether the value of the item corresponding to the second information is less than or equal to the preset value;
若所述物品的价值小于或者等于所述预设价值,则执行所述将所述第二终端私钥和所述第一终端公钥发送给所述第二终端的步骤;If the value of the item is less than or equal to the preset value, then performing the step of sending the second terminal private key and the first terminal public key to the second terminal;
若所述物品的价值大于所述预设价值,审核所述第二终端对应的用户是否符合预设条件;If the value of the item is greater than the preset value, checking whether the user corresponding to the second terminal meets the preset condition;
若所述第二终端对应的用户符合所述竞标条件,则执行所述将所述第二终端私钥和所述第一终端公钥发送给所述第二终端的步骤。If the user corresponding to the second terminal meets the bidding condition, the step of sending the private key of the second terminal and the public key of the first terminal to the second terminal is performed.
进一步地,所述当接收到第一终端发送的第二信息和第一终端公钥后,创建信息群,并调用群签名算法生成信息群的群公钥和群主私钥的步骤包括:Further, after receiving the second information sent by the first terminal and the public key of the first terminal, creating an information group, and calling the group signature algorithm to generate the group public key and the group owner's private key of the information group include:
当接收到第一终端发送的第二信息和第一终端公钥后,根据所述第二信息检测所述第二信息对应的物品是否合法;After receiving the second information sent by the first terminal and the public key of the first terminal, detecting whether the item corresponding to the second information is legal according to the second information;
若确定所述物品合法,则创建信息群,并调用群签名算法生成信息群的群公钥和群主私钥。If it is determined that the item is legal, an information group is created, and the group signature algorithm is called to generate the group public key and the group owner's private key of the information group.
进一步地,所述当接收到第一终端发送的第二信息和第一终端公钥后,根据所述第二信息检测所述第二信息对应的物品是否合法的步骤之后,处理器1001还可以用于调用存储器1005中存储的基于区块链的信息传输程序,并执行以下步骤:Further, after receiving the second information sent by the first terminal and the first terminal public key, after the step of detecting whether the item corresponding to the second information is legal according to the second information, the processor 1001 may also It is used to call the block chain-based information transmission program stored in the memory 1005, and perform the following steps:
若确定所述物品非法,则生成提示信息,并将所述提示信息发送给所述第一终端,以供所述第一终端根据所述提示信息提示对应用户所述物品非法。If it is determined that the item is illegal, generating prompt information, and sending the prompt information to the first terminal, so that the first terminal prompts a corresponding user that the item is illegal according to the prompt information.
进一步地,所述当接收到所述信息签名和所述信息字符串后,将所述信息签名和所述信息字符串写入区块链中的步骤之后,处理器1001还可以用于调用存储器1005中存储的基于区块链的信息传输程序,并执行以下步骤:Further, after the step of writing the information signature and the information string into the block chain after receiving the information signature and the information string, the processor 1001 can also be used to call the memory The information transmission program based on blockchain stored in 1005, and perform the following steps:
当接收到所述第一终端发送的获取所述第二信息对应物品用户对应的身份信息、第一信息和信息字符串的字符串标识后,将获取所述第二信息对应物品用户的所述身份信息、所述第一信息和所述字符串标识写入所述区块链中。After receiving the identity information corresponding to the item user corresponding to the second information, the first information, and the string identification of the information string sent by the first terminal, it will acquire the item user’s ID corresponding to the second information The identity information, the first information and the character string identifier are written into the block chain.
进一步地,所述当接收到所述信息签名和所述信息字符串后,将所述信息签名和所述信息字符串写入区块链中的步骤之后,处理器1001还可以用于调用存储器1005中存储的基于区块链的信息传输程序,并执行以下步骤:Further, after the step of writing the information signature and the information string into the block chain after receiving the information signature and the information string, the processor 1001 can also be used to call the memory The information transmission program based on blockchain stored in 1005, and perform the following steps:
当接收到监管终端发送的追踪非法第一信息的追踪请求后,将所述追踪请求发送给所述第一终端,以供所述第一终端根据所述追踪请求确定所述非法第一信息对应的非法信息群,根据所述非法信息群的群主私钥确定所述非法第一信息对应的用户。After receiving the tracking request sent by the supervisory terminal for tracking illegal first information, the tracking request is sent to the first terminal, so that the first terminal can determine the corresponding illegal first information according to the tracking request. the illegal information group, and determine the user corresponding to the illegal first information according to the private key of the group owner of the illegal information group.
基于上述的结构,提出基于区块链的信息传输方法的各个实施例。基于区块链的信息传输方法应用于基于区块链的信息传输设备,基于区块链的信息传输设备、第一终端、第二终端和监管终端可为PC,便携计算机等终端设备。为了描述的简便,在以下基于区块链的信息传输方法的各个实施例中,以第三方系统(相对第一终端和第二终端而言)执行主体。Based on the above structure, various embodiments of information transmission methods based on blockchain are proposed. The information transmission method based on the blockchain is applied to the information transmission equipment based on the blockchain. The information transmission equipment based on the blockchain, the first terminal, the second terminal and the monitoring terminal can be PCs, portable computers and other terminal equipment. For simplicity of description, in the following embodiments of the blockchain-based information transmission method, a third-party system (relative to the first terminal and the second terminal) executes the main body.
参照图2,图2为本发明基于区块链的信息传输方法第一实施例的流程示意图。Referring to FIG. 2 , FIG. 2 is a schematic flowchart of the first embodiment of the blockchain-based information transmission method of the present invention.
本发明实施例提供了基于区块链的信息传输方法的实施例,需要说明的是,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。The embodiment of the present invention provides an embodiment of a blockchain-based information transmission method. It should be noted that although the logical order is shown in the flowchart, in some cases, it can be executed in a different order than here steps shown or described.
以下对本申请中所用的专业名词进行解释:The professional terms used in this application are explained below:
(1)机构成员是指依法设立的机关、事业、企业、社团及其他依法成立的单位,区块链中的节点隶属机构成员所有,根据区块链中节点信息能够定位所属机构成员。(1) Institutional members refer to legally established agencies, institutions, enterprises, associations, and other legally established units. The nodes in the blockchain are owned by the members of the organization, and the members of the organization can be located according to the node information in the blockchain.
(2)节点特指参与到区块链网络里,进行交易和数据交换的网络节点,每个独立机构成员可以拥有一个到多个交易节点,每个交易节点是一组物理网络,计算机,区块链应用软件以及数据库的组合。节点和节点之间,通过TCP/IP协议互相连接。(2) Nodes specifically refer to the network nodes that participate in the blockchain network for transactions and data exchange. Each independent organization member can have one or more transaction nodes. Each transaction node is a group of physical networks, computers, and districts. A combination of block chain application software and database. Nodes are connected to each other through the TCP/IP protocol.
(3)群签名算法(BBS04)基于双线性密码学为基础,是一种允许群内成员用群成员私钥进行签名的算法,其他人可通过群签名获取签名所在群,但无法追踪具体的签名者信息;群签名算法中,群管理员可在必要时揭露签名者信息,群签名算法有以下特性:①完备性(Soundness and completeness):有效的签名总是验证通过,无效的签名总是验证失败;②不可伪造性(Unforgeable):仅群内成员可产生有效签名;③匿名性(Anonymity):除了群管理员外,其他成员无法根据签名信息获取签名者信息;④可追踪性(Traceability):群管理员可在必要时揭露签名者信息;⑤无关联性(Unlinkability):给定两条或多条签名信息,无法判断这些签名是否由同一个签名者产生;⑥抗联合欺骗性(Unforgeable tracingverification):群内若干个成员无法共谋构造出使得群主无法揭露签名者身份的有效签名。群签名算法主要流程:①生成群:生成群公钥,并为群管理员颁发群主私钥;②群成员加入群:用群管理员的群主私钥和群公钥为群成员生成群成员私钥;③生成群签名:群成员用群成员私钥生成群签名;④群签名验证:其他人通过群公钥验证签名,此时可通过群公钥定位群签名所属的群组,却无法获取具体的签名者信息;⑤群管理员揭露签名者证书:群管理员通过群成员私钥获取签名者证书,揭露签名者(即机构成员)身份信息。(3) The group signature algorithm (BBS04) is based on bilinear cryptography. It is an algorithm that allows members in the group to sign with the private key of the group member. Others can obtain the group where the signature belongs through the group signature, but cannot track the specific In the group signature algorithm, the group administrator can disclose the signer information when necessary. The group signature algorithm has the following characteristics: ①Completeness (Soundness and completeness): Valid signatures are always verified, and invalid signatures are always verified. ②Unforgeable: Only members in the group can generate valid signatures; ③Anonymity: Except for group administrators, other members cannot obtain signer information based on the signature information; ④Traceability (Traceability) ): Group administrators can reveal signer information when necessary; ⑤ Unlinkability: Given two or more signature information, it is impossible to determine whether these signatures are generated by the same signer; ⑥ Anti-joint deception ( Unforgeable tracing verification): Several members in the group cannot conspire to construct a valid signature that prevents the group owner from revealing the identity of the signer. The main process of the group signature algorithm: ①Generate group: generate the group public key, and issue the group owner’s private key to the group administrator; ②Group members join the group: use the group administrator’s group owner’s private key and group public key to generate a group signature for the group members ③Generate group signature: group members use group member private key to generate group signature; ④group signature verification: other people verify signature through group public key. Unable to obtain specific signer information; ⑤ Group administrators revealing signer certificates: Group administrators obtain signer certificates through private keys of group members, and reveal the identity information of signers (that is, organization members).
(4)数字信封技术:(4) Digital envelope technology:
数字信封技术同时利用了非对称加密算法的安全性和对称加密算法的高性能特征,其中非对称加密算法用于密钥交换,对称加密算法用于保障数据的机密性,下面以发送端Alice发送数据Data给客户端Bob为例,数字信封技术主要包括以下流程:The digital envelope technology utilizes both the security of the asymmetric encryption algorithm and the high-performance characteristics of the symmetric encryption algorithm, in which the asymmetric encryption algorithm is used for key exchange, and the symmetric encryption algorithm is used to ensure the confidentiality of the data. The sender Alice sends The data is sent to the client Bob as an example. The digital envelope technology mainly includes the following processes:
①Alice端产生一串随机对称密钥DEK,并采用对称加密算法对Data进行加密,产生密文Cryp_Data;①Alice generates a series of random symmetric key DEK, and uses symmetric encryption algorithm to encrypt Data to generate ciphertext Cryp_Data;
②Alice端用Bob端的公钥Puk_b加密对称密钥DEK,生成Cryp_Key;② Alice uses Bob's public key Puk_b to encrypt the symmetric key DEK to generate Cryp_Key;
③Alice端通过群签名算法,用其私钥Prk_a生成Cryp_Data和Cryp_Key的签名Sig(Cryp_Data&&Cryp_Key);③Alice generates the signature Sig(Cryp_Data&&Cryp_Key) of Cryp_Data and Cryp_Key with its private key Prk_a through the group signature algorithm;
④Alice端将[Cryp_Data,Cryp_Key,Sig(Cryp_Data&&Cryp_Key)]发送给Bob端;④ Alice sends [Cryp_Data, Cryp_Key, Sig(Cryp_Data&&Cryp_Key)] to Bob;
⑤Bob端接收到数据后,首先用Alice端公钥Pub_a验证签名Sig(Cryp_Data&&Cryp_Key)的有效性,若签名验证有效,则用Bob端私钥Prk_b解密Cryp_Key,获取对称密钥DEK;⑤ After receiving the data, Bob first uses Alice’s public key Pub_a to verify the validity of the signature Sig(Cryp_Data&&Cryp_Key). If the signature verification is valid, then uses Bob’s private key Prk_b to decrypt Cryp_Key to obtain the symmetric key DEK;
⑥Bob端获取对称密钥DEK后,解密Cryp_Data获取明文数据Data。⑥ After Bob obtains the symmetric key DEK, he decrypts Cryp_Data to obtain the plaintext data Data.
综上所述,通过数字信封技术,Alice端和Bob端(通信双方)可在不安全的信道上进行机密数据交换。To sum up, through the digital envelope technology, Alice and Bob (communicating parties) can exchange confidential data on an insecure channel.
基于区块链的信息传输方法包括:Blockchain-based information transfer methods include:
步骤S10,当接收到第二终端发送的加入预设信息群的加入请求后,调用群签名算法为所述第二终端生成第二终端私钥,并获取第一终端发送的第一终端公钥。Step S10, after receiving the joining request sent by the second terminal to join the preset information group, call the group signature algorithm to generate the second terminal private key for the second terminal, and obtain the first terminal public key sent by the first terminal .
当第二终端对应用户在区块链中查询到第二信息,并决定参与获取第二信息对应的物品后,如购买第二信息对应物品或者参与拍卖第二信息对应物品等,第二终端对应用户可通过第二终端触发加入所要获取的物品对应信息群的加入请求。当第二终端侦测到加入信息群的加入请求后,将该加入请求发送给第三方系统。当第三方系统接收到第二终端发送的加入请求后,第三方系统为第二终端对应的第二终端对应用户生成第二终端私钥,并获取第一终端发送的第一终端公钥。When the corresponding user of the second terminal inquires the second information in the blockchain and decides to participate in obtaining the item corresponding to the second information, such as purchasing the item corresponding to the second information or participating in the auction of the item corresponding to the second information, etc., the second terminal corresponding The user can trigger a request to join the information group corresponding to the item to be obtained through the second terminal. After the second terminal detects the joining request of joining the information group, it sends the joining request to the third-party system. After the third-party system receives the joining request sent by the second terminal, the third-party system generates a private key of the second terminal for the corresponding user of the second terminal corresponding to the second terminal, and obtains the public key of the first terminal sent by the first terminal.
具体地,当第三方系统接收到第二终端发送的加入信息群的加入请求后,第三方系统调用群签名算法,将群主私钥和群公钥作为群签名算法的输入参数,得到与群主私钥对应的第二终端私钥,即得到第二终端对应用户的第二终端私钥。当第三方系统得到第二终端私钥后,将第二终端私钥和第一终端公钥通过安全信道发送给第二终端。Specifically, when the third-party system receives the request to join the information group sent by the second terminal, the third-party system invokes the group signature algorithm, uses the group owner's private key and the group public key as input parameters of the group signature algorithm, and obtains the The private key of the second terminal corresponding to the master private key is to obtain the private key of the second terminal corresponding to the user of the second terminal. After the third-party system obtains the private key of the second terminal, it sends the private key of the second terminal and the public key of the first terminal to the second terminal through a secure channel.
其中,第一信息为第二终端对应用户在第二终端中输入的信息,第一信息可以是第二终端对应用户需要传输的任意信息。在物品出售或拍卖的场景中,第一信息即为物品信息,包括但不限于物品价格、物品售出时间或者拍卖时间和物品名称。进一步地,第一信息还可包括第二终端的ID(标识)。可以理解的是,通过第二终端的ID,可以唯一确定第二终端。需要说明的是,物品售出时间或者拍卖时间可只具体到某一日,也可具体到具体时间,如具体到小时,或者分钟等。Wherein, the first information is information input by the user corresponding to the second terminal in the second terminal, and the first information may be any information that needs to be transmitted by the user corresponding to the second terminal. In the scenario of item sale or auction, the first information is item information, including but not limited to item price, item sale time or auction time, and item name. Further, the first information may also include an ID (identification) of the second terminal. It can be understood that the second terminal can be uniquely determined through the ID of the second terminal. It should be noted that the sale time or auction time of the item may be specified only on a certain day, or may be specified on a specific time, such as an hour or a minute.
步骤S20,将所述第二终端私钥和所述第一终端公钥发送给所述第二终端,以供所述第二终端根据所获取的第一信息、所接收的所述第二终端私钥和所述第一终端公钥生成信息签名和信息字符串,并返回所述信息签名和所述信息字符串。Step S20, sending the second terminal private key and the first terminal public key to the second terminal for the second terminal to use according to the obtained first information, the received second terminal The private key and the public key of the first terminal generate an information signature and an information string, and return the information signature and the information string.
第三方系统将第二终端私钥和第一终端发送的第一终端公钥发送给第二终端。当第二终端接收到第二终端私钥和第一终端公钥后,第二终端从区块链中获取群公钥,并获取第一信息。第二终端根据第一终端公钥和第一信息生成信息字符串,并根据群公钥、第二终端私钥和信息字符串生成信息签名。当第二终端生成信息签名和信息字符串后,第二终端将信息签名和信息字符串发送给第三方系统。需要说明的是,在本实施例中,第二终端私钥即为群签名算法中的群成员私钥。The third-party system sends the private key of the second terminal and the public key of the first terminal sent by the first terminal to the second terminal. After the second terminal receives the private key of the second terminal and the public key of the first terminal, the second terminal obtains the group public key from the block chain and obtains the first information. The second terminal generates an information string according to the first terminal public key and the first information, and generates an information signature according to the group public key, the second terminal private key and the information string. After the second terminal generates the information signature and the information string, the second terminal sends the information signature and the information string to the third-party system. It should be noted that, in this embodiment, the private key of the second terminal is the private key of the group member in the group signature algorithm.
其中,所述第二终端根据所获取的第一信息、所接收的所述第二终端私钥和所述第一终端公钥生成信息签名和信息字符串的步骤包括:Wherein, the step of generating an information signature and an information string by the second terminal according to the acquired first information, the received private key of the second terminal and the public key of the first terminal includes:
步骤a,所述第二终端获取第一信息,计算所述第一信息的第一哈希值;Step a, the second terminal acquires first information, and calculates a first hash value of the first information;
步骤b,所述第二终端获取预设的加密密钥,根据所述加密密钥加密所述第一信息,生成与所述第一信息对应的密文,计算所述密文的第二哈希值;Step b, the second terminal obtains a preset encryption key, encrypts the first information according to the encryption key, generates a ciphertext corresponding to the first information, and calculates a second hash of the ciphertext Greek value;
当第二终端接收到第二终端私钥和第一终端公钥后,第二终端获取第一信息和预设的加密密钥。其中,预设的加密密钥是由第二终端通过对称加密算法得到的,即该加密密钥为对称密钥。对称加密算法包括但不限于DES(Data Encryption Standard,数据加密标准)和IDEA(International Data Encryption Algorithm,国际数据加密算法)。After the second terminal receives the private key of the second terminal and the public key of the first terminal, the second terminal obtains the first information and the preset encryption key. Wherein, the preset encryption key is obtained by the second terminal through a symmetric encryption algorithm, that is, the encryption key is a symmetric key. The symmetric encryption algorithm includes but not limited to DES (Data Encryption Standard, data encryption standard) and IDEA (International Data Encryption Algorithm, international data encryption algorithm).
当第二终端得到加密密钥和第一信息后,计算第一信息的哈希值,将第一信息的哈希值记为第一哈希值,并通过加密密钥加密第一信息,以生与第一信息对应的密文。可以理解的是,第一信息对应的密文即为加密后的第一信息。当第二终端得到密文后,计算该密文的哈希值,并将该密文的哈希值记为第二哈希值。在本实施例中,计算哈希值所采用的算法包括但不限于MD5(Message-Digest Algorithm 5,信息-摘要算法5)和SHA(Secure HashAlgorithm,安全散列算法)。After the second terminal obtains the encryption key and the first information, it calculates the hash value of the first information, records the hash value of the first information as the first hash value, and encrypts the first information with the encryption key, so that A ciphertext corresponding to the first message is generated. It can be understood that the ciphertext corresponding to the first information is the encrypted first information. After the second terminal obtains the ciphertext, it calculates the hash value of the ciphertext, and records the hash value of the ciphertext as the second hash value. In this embodiment, the algorithms used to calculate the hash value include but are not limited to MD5 (Message-Digest Algorithm 5, Information-Digest Algorithm 5) and SHA (Secure Hash Algorithm, Secure Hash Algorithm).
步骤c,采用所述第一终端公钥加密所述加密密钥,得到加密后的所述加密密钥,并计算加密后的所述加密密钥的第三哈希值;Step c, using the first terminal public key to encrypt the encryption key to obtain the encrypted encryption key, and calculate a third hash value of the encrypted encryption key;
当第二终端接收到第一终端公钥以及得到加密密钥后,第二终端采用第一终端公钥加密该加密密钥,得到加密后的加密密钥,并计算加密后的加密密钥的哈希值,将加密后的加密密钥的哈希值记为第三哈希值。After the second terminal receives the public key of the first terminal and obtains the encryption key, the second terminal encrypts the encryption key with the public key of the first terminal, obtains the encrypted encryption key, and calculates the value of the encrypted encryption key Hash value, record the hash value of the encrypted encryption key as the third hash value.
步骤d,将所述密文、加密后的所述加密密钥、所述第一哈希值、所述第二哈希值和所述第三哈希值拼接成信息字符串;Step d, splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information string;
步骤e,从所述区块链中获取预存的群公钥,基于群签名算法,根据所述第二终端私钥、所述群公钥和所述信息字符串生成信息签名。Step e, obtaining a pre-stored group public key from the blockchain, and generating an information signature based on the second terminal private key, the group public key and the information string based on a group signature algorithm.
第二终端从区块链中获取预先存储的群公钥。当第二终端得到群公钥、第二终端私钥、第一信息对应的密文、加密后的加密密钥、第一哈希值、第二哈希值和第三哈希值后,第二终端将第一信息对应的密文、加密后的加密密钥、第一哈希值、第二哈希值和第三哈希值拼接成信息字符串。当第二终端得到信息字符串后,第二终端调用群签名算法,将群公钥、第二终端私钥和信息字符串作为该群签名算法的输入,得到群签名算法的输出。需要说明的是,群签名算法的输出即为信息签名。当第二终端得到的信息签名和信息字符串后,将信息签名和信息字符串发送给第三方系统。The second terminal obtains the pre-stored group public key from the blockchain. After the second terminal obtains the group public key, the second terminal private key, the ciphertext corresponding to the first information, the encrypted encryption key, the first hash value, the second hash value, and the third hash value, the second The two terminals concatenate the ciphertext corresponding to the first information, the encrypted encryption key, the first hash value, the second hash value, and the third hash value into an information string. After the second terminal obtains the information string, the second terminal invokes the group signature algorithm, uses the group public key, the second terminal private key and the information string as the input of the group signature algorithm, and obtains the output of the group signature algorithm. It should be noted that the output of the group signature algorithm is the information signature. After the second terminal obtains the information signature and the information string, it sends the information signature and the information string to the third-party system.
其中,在将第一信息对应的密文、加密后的加密密钥、第一哈希值、第二哈希值和第三哈希值拼接成信息字符串过程中,可按照密文、加密后的加密密钥、第一哈希值、第二哈希值和第三哈希值的顺序进行拼接,也可不按照密文、加密后的加密密钥、第一哈希值、第二哈希值和第三哈希值的顺序拼接,即拼接密文、加密后的加密密钥、第一哈希值、第二哈希值和第三哈希值得到信息字符串过程中所采用的拼接方式可根据具体需要而设置,在本实施例不限制具体的拼接方式。Among them, in the process of splicing the ciphertext corresponding to the first information, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information string, according to the ciphertext, encryption The order of the encrypted key, the first hash value, the second hash value, and the third hash value is spliced, or not according to the ciphertext, the encrypted encryption key, the first hash value, and the second hash value. Sequential splicing of the hash value and the third hash value, that is, the method used in the process of splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value, and the third hash value to obtain the information string The splicing method can be set according to specific needs, and the specific splicing method is not limited in this embodiment.
步骤S30,当接收到所述信息签名和所述信息字符串后,将所述信息签名和所述信息字符串写入区块链中。Step S30, after receiving the information signature and the information string, write the information signature and the information string into the block chain.
当第三方系统接收到第二终端发送的信息签名和信息字符串后,第三方系统通过统一的账户身份将信息签名和信息字符串写入区块链中。由此可知,信息字符串和信息签名是由第三方系统以统一的账户身份发布到区块链中,因此不会暴露第二终端对应用户的身份,因为其他用户只能知道信息字符串和信息签名是由第三方系统的账户发送的;信息签名是信息字符串的签名,由群签名算法的特性可知,在除群管理员(即第一终端对应用户)外的其他用户验证信息字符串是否处于有效状态过程中,其他用户仅可以确定该信息字符串对应的信息群,但是无法确定具体的第二终端对应用户,且信息字符串是采用密码信封技术产生的,仅第一终端对应用户才可以用群主私钥解密该信息字符串,保证了第一信息的机密性。After the third-party system receives the information signature and information string sent by the second terminal, the third-party system writes the information signature and information string into the blockchain through a unified account identity. It can be seen that the information string and information signature are issued by the third-party system to the blockchain with a unified account identity, so the identity of the corresponding user of the second terminal will not be exposed, because other users can only know the information string and information The signature is sent by the account of the third-party system; the information signature is the signature of the information string. According to the characteristics of the group signature algorithm, other users except the group administrator (that is, the corresponding user of the first terminal) verify whether the information string is In the process of being in the valid state, other users can only determine the information group corresponding to the information string, but cannot determine the specific user corresponding to the second terminal, and the information string is generated using the password envelope technology, only the user corresponding to the first terminal can The information string can be decrypted with the group owner's private key, which ensures the confidentiality of the first information.
需要说明的是,在具体实施例中,本基于区块链的信息传输方法可应用物品拍卖场景中,在物品拍卖场景中,第一终端为出售拍卖品的出售终端,第二终端为参与竞标的竞标终端,信息群为拍卖群,第一信息为竞标信息。利用区块链的去中心化和账簿共享的特性,移除了拍卖者的角色,将竞标结果的统计权限移交给了出售终端对应的出售用户,避免了拍卖者不诚信以及多个拍卖者联合欺骗带来的不公平问题,提高了的拍卖过程中的公平性,降低出售用户拍卖商品的成本。竞标字符串和竞标签名是由可信第三方系统以统一的账户身份发布到区块链中,在区块链中不会暴露竞标用户的身份,也不会暴露竞标用户的竞标价格,保证了竞标信息的机密性,实现了匿名拍卖。通过区块链的共享账簿的特性,记录拍卖过程中所产生的所有竞标信息和最终的中标信息,且竞标信息和中标信息写入数据链后不可修改,防止非法分子伪造数据,保证了拍卖的公平性和可信任性。相对于传统的拍卖方法,本申请通过区块链的去中心化特性,降低了竞标过程中的通信开销。It should be noted that, in a specific embodiment, this blockchain-based information transmission method can be applied in the item auction scenario. In the item auction scenario, the first terminal is the selling terminal for selling the auction items, and the second terminal is the bidding terminal. The bidding terminal of , the information group is the auction group, and the first information is the bidding information. Utilizing the decentralization of the blockchain and the characteristics of account book sharing, the role of the auctioneer is removed, and the statistical authority of the bidding results is transferred to the sales user corresponding to the sales terminal, which avoids the dishonesty of the auctioneer and the joint auction of multiple auctioneers. The unfairness caused by deception improves the fairness in the auction process and reduces the cost of selling users' auctioned goods. Bidding strings and bidding tag names are released to the blockchain by a trusted third-party system with a unified account identity. The identity of the bidding user and the bidding price of the bidding user will not be exposed in the blockchain, ensuring The confidentiality of bidding information enables anonymous auctions. Through the characteristics of the shared account book of the blockchain, all bidding information and final winning information generated during the auction are recorded, and the bidding information and winning information cannot be modified after being written into the data chain, preventing illegal elements from falsifying data and ensuring the integrity of the auction. fairness and trustworthiness. Compared with the traditional auction method, this application reduces the communication overhead in the bidding process through the decentralization of the blockchain.
本实施例利用区块链的去中心化和账簿共享的特性,且信息字符串和信息签名是由第三方系统以统一的账户身份发布到区块链中,在区块链中不会暴露第二终端对应用户的身份,也不会暴露第二终端对应用户的信息,保证了第一信息的机密性,且通过区块链的去中心化特性,降低了信息传输过程中的通信开销,降低了信息传输的成本。This embodiment utilizes the characteristics of decentralization and account book sharing of the blockchain, and the information string and information signature are issued to the blockchain by a third-party system with a unified account identity, and the first-order information will not be exposed in the blockchain. The identity of the user corresponding to the second terminal will not expose the information of the user corresponding to the second terminal, which ensures the confidentiality of the first information, and through the decentralization of the blockchain, the communication overhead in the process of information transmission is reduced, and the the cost of information transmission.
进一步地,为了提高信息传输过程中的安全性,当将信息签名和信息字符串写入区块链中后,第一终端可通过区块链获取与其信息群对应的信息字符串和信息签名。可以理解的是,信息字符串和信息签名与群公钥存在映射关系。因此,第一终端可通过其群公钥确定信息群对应的信息字符串和信息签名。信息群对应至少两条的信息字符串和至少两条的信息签名。当第一终端获取到信息签名和信息字符串后,检验信息签名是否处于有效状态。若信息签名处于有效状态,第一终端则拆分信息字符串,得到信息字符串中的密文、加密后的加密密钥、第一哈希值、第二哈希值和第三哈希值。可以理解的是,第一终端拆分信息字符串的过程是拼接得到信息字符串的逆过程。如当第一终端是按顺序拼接得到信息字符串的,第一终端也按对应的顺序拆分信息字符串。Further, in order to improve the security during information transmission, after writing the information signature and information string into the blockchain, the first terminal can obtain the information string and information signature corresponding to its information group through the blockchain. It can be understood that there is a mapping relationship between the information string and the information signature and the group public key. Therefore, the first terminal can determine the information character string and information signature corresponding to the information group through its group public key. The information group corresponds to at least two information character strings and at least two information signatures. After the first terminal obtains the information signature and the information character string, it checks whether the information signature is valid. If the information signature is valid, the first terminal splits the information string to obtain the ciphertext in the information string, the encrypted encryption key, the first hash value, the second hash value and the third hash value . It can be understood that the process of splitting the information string by the first terminal is the inverse process of obtaining the information string by splicing. For example, when the first terminal splices the information character strings in order, the first terminal also splits the information character strings in a corresponding order.
进一步地,若信息签名处于无效状态,第一终端则丢弃该信息签名和对应的信息字符串,或者丢弃密文,即禁止对应第二终端获取物品。Further, if the information signature is invalid, the first terminal discards the information signature and the corresponding information string, or discards the ciphertext, that is, prohibits the corresponding second terminal from obtaining the item.
第一终端校验信息签名是否处于有效状态的过程可为:调用群签名算法,将群公钥和信息签名作为输入参数,输入至群签名算法中,得到输出结果。若输出结果为第一结果,则确定信息签名处于有效状态;若输出结果为第二结果,则确定信息签名处于无效状态。其中,第一结果和第二结果具体的表现形式可根据具体需要而设置,如第一结果可设置为“true”,第二结果可设置为“false”;或者第一结果可设置为“1”,第二结果可设置为“0”。The process for the first terminal to verify whether the information signature is in a valid state may be: call the group signature algorithm, use the group public key and the information signature as input parameters, input them into the group signature algorithm, and obtain an output result. If the output result is the first result, it is determined that the information signature is in a valid state; if the output result is the second result, it is determined that the information signature is in an invalid state. Among them, the specific expression forms of the first result and the second result can be set according to specific needs, such as the first result can be set to "true", the second result can be set to "false"; or the first result can be set to "1 ", the second result can be set to "0".
当第一终端得到信息字符串中的密文、加密后的加密密钥、第一哈希值、第二哈希值和第三哈希值后,计算该密文对应的哈希值,将该密文的哈希值记为第四哈希值,并计算加密后的加密密钥的哈希值,将该加密密钥的哈希值记为第五哈希值。第一终端判断第四哈希值和第二哈希值是否相同,以及判断第五哈希值和第三哈希值是否相同。若第四哈希值和第二哈希值相同,第一终端则确定密文未被篡改,是完整的;若第四哈希值和第二哈希值不相同,第一终端则确定密文已被篡改,是不完整的。若第五哈希值和第三哈希值相同,第一终端则确定加密后的加密密钥未被篡改,是完整的;若第五哈希值和第三哈希值不相同,第一终端则确定加密后的加密密钥已被篡改,是不完整的。After the first terminal obtains the ciphertext in the information string, the encrypted encryption key, the first hash value, the second hash value, and the third hash value, it calculates the hash value corresponding to the ciphertext, and The hash value of the ciphertext is recorded as the fourth hash value, and the hash value of the encrypted encryption key is calculated, and the hash value of the encryption key is recorded as the fifth hash value. The first terminal judges whether the fourth hash value is the same as the second hash value, and judges whether the fifth hash value is the same as the third hash value. If the fourth hash value is the same as the second hash value, the first terminal determines that the ciphertext has not been tampered with and is complete; if the fourth hash value is different from the second hash value, the first terminal determines that the ciphertext The text has been doctored and is incomplete. If the fifth hash value is the same as the third hash value, the first terminal determines that the encrypted encryption key has not been tampered with and is complete; if the fifth hash value is not the same as the third hash value, the first terminal The terminal determines that the encrypted encryption key has been tampered with and is incomplete.
若确定密文和加密后的加密密钥是完整的,第一终端则采用与第一终端公钥对应拍卖私钥解密加密后的加密密钥,得到原始未加密的加密密钥。可以理解的是,当第一终端采用非对称加密算法生成第一终端公钥时,会对应生成与该第一终端公钥对应的第一终端私钥。在其它实施例中,也可采用第一终端私钥加密该加密密钥,然后采用对应第一终端公钥解密加密后的加密密钥。当得到原始的加密密钥后,采用该加密密钥解密该密文,得到第一信息。需要说明的是,该第一信息是明文信息。If it is determined that the ciphertext and the encrypted encryption key are complete, the first terminal uses the auction private key corresponding to the public key of the first terminal to decrypt the encrypted encryption key to obtain the original unencrypted encryption key. It can be understood that when the first terminal uses an asymmetric encryption algorithm to generate the first terminal public key, it will correspondingly generate the first terminal private key corresponding to the first terminal public key. In other embodiments, the encryption key may also be encrypted by using the first terminal private key, and then the encrypted encryption key may be decrypted by using the corresponding first terminal public key. After the original encryption key is obtained, the ciphertext is decrypted by using the encryption key to obtain the first information. It should be noted that the first information is plaintext information.
进一步地,若密文和加密后的加密密钥是不完整的,第一终端则丢弃与该密文对应的信息签名和对应的信息字符串,或者丢弃密文,即禁止对应第二终端获取物品。Further, if the ciphertext and the encrypted encryption key are incomplete, the first terminal discards the information signature corresponding to the ciphertext and the corresponding information string, or discards the ciphertext, that is, prohibits the corresponding second terminal from obtaining thing.
第一终端计算该第一信息的哈希值,记为第六哈希值,并判断第六哈希值是否处于有效状态。判断第六哈希值是否处于有效状态的过程为:将第六哈希值与第一哈希值进行对比,若第六哈希值与第一哈希值相同,则确定第六哈希值处于有效状态;若第六哈希值与第一哈希值不相同,则确定第六哈希值处于无效状态。若确定第六哈希值处于有效状态,第一终端则在所获取的所有第一信息中查找到最优的第一信息,即查找到获取该物品价格最高的第一信息。可以理解的是,获取该物品价格最高的第一信息为中标信息。当第一终端确定中标信息后,调用群签名算法,通过群主私钥确定中标信息对应用户身份,即调用群签名算法,通过群主私钥,根据中标信息对应的信息签名和/或信息字符串确定中标者。The first terminal calculates a hash value of the first information, records it as a sixth hash value, and determines whether the sixth hash value is in a valid state. The process of judging whether the sixth hash value is valid is: comparing the sixth hash value with the first hash value, and if the sixth hash value is the same as the first hash value, then determine the sixth hash value is in a valid state; if the sixth hash value is different from the first hash value, it is determined that the sixth hash value is in an invalid state. If it is determined that the sixth hash value is valid, the first terminal finds the best first information among all the acquired first information, that is, finds the first information with the highest price of the item. It can be understood that the first information to obtain the highest price of the item is the winning bid information. After the first terminal confirms the bid-winning information, it invokes the group signature algorithm to determine the identity of the user corresponding to the bid-winning information through the group owner's private key, that is, calls the group signature algorithm, uses the group owner's private key, and uses the information signature and/or information characters corresponding to the bid-winning information The string determines the winning bidder.
进一步地,若第六哈希值处于无效状态,第一终端则丢弃对应的第一信息,禁止对应的第二终端参与此次拍卖。Further, if the sixth hash value is in an invalid state, the first terminal discards the corresponding first information, and prohibits the corresponding second terminal from participating in the auction.
进一步地,提出本发明基于区块链的信息传输方法第二实施例。Further, a second embodiment of the blockchain-based information transmission method of the present invention is proposed.
所述基于区块链的信息传输方法第二实施例与所述基于区块链的信息传输方法第一实施例的区别在于,参照图3,基于区块链的信息传输方法还包括:The difference between the second embodiment of the blockchain-based information transmission method and the first embodiment of the blockchain-based information transmission method is that, referring to FIG. 3 , the blockchain-based information transmission method further includes:
步骤S40,当接收到第一终端发送的第二信息和第一终端公钥后,创建信息群,并调用群签名算法生成信息群的群公钥和群主私钥。Step S40, after receiving the second information sent by the first terminal and the public key of the first terminal, create an information group, and call the group signature algorithm to generate the group public key and the group owner's private key of the information group.
步骤S50,将所述第二信息和所述群公钥写入所述区块链中,并将所述群主私钥返回给所述第一终端。Step S50, writing the second information and the group public key into the block chain, and returning the group owner private key to the first terminal.
第一终端对应用户想要拍卖或者售出自己的物品时,第一终端对应用户在第一终端中触发创建信息群的创建请求,并将创建请求、第二信息和第一终端公钥发送给第三方系统。其中,第三方系统为区块链中的机构成员,第二信息就是物品信息,包括但不限于物品的名称、物品的起始价和物品图片,第一终端公钥是由第一终端根据非对称加密算法生成的。在本实施例中,非对称加密算法包括但不限于RSA、ECC(Elliptic curvecryptography,椭圆曲线加密算法)和Diffie-Hellman密钥交换算法。当第三方系统接收到第一终端发送的创建请求、第二信息和第一终端公钥后,根据创建请求创建一个信息群,并调用群签名算法生成信息群的群公钥和群主私钥,并将群主私钥发送给第一终端,将第二信息和第一终端公钥写入区块链中。When the corresponding user of the first terminal wants to auction or sell his own items, the corresponding user of the first terminal triggers the creation request of creating an information group in the first terminal, and sends the creation request, the second information and the public key of the first terminal to the third-party systems. Among them, the third-party system is an institutional member in the blockchain, and the second information is the item information, including but not limited to the name of the item, the starting price of the item, and the picture of the item. The public key of the first terminal is obtained by the first terminal according to the Generated by a symmetric encryption algorithm. In this embodiment, the asymmetric encryption algorithm includes but not limited to RSA, ECC (Elliptic curvecryptography, elliptic curve encryption algorithm) and Diffie-Hellman key exchange algorithm. When the third-party system receives the creation request sent by the first terminal, the second information and the public key of the first terminal, it creates an information group according to the creation request, and calls the group signature algorithm to generate the group public key and the group owner's private key of the information group , and send the private key of the group owner to the first terminal, and write the second information and the public key of the first terminal into the block chain.
进一步地,在第三方系统将群主私钥发送给第一终端过程中,第三方系统通过安全信道发送给第一终端。安全信道可为通过SSL(Secure Sockets Layer,安全套接层)或者TLS(Transport Layer Security,传输层安全)等加密后的信道。当第一终端接收到群主私钥后,第一终端可根据群主私钥追踪信息群中每条信息签名对应第二终端用户的身份。Further, when the third-party system sends the group owner private key to the first terminal, the third-party system sends the private key to the first terminal through a secure channel. The secure channel may be a channel encrypted by SSL (Secure Sockets Layer, secure socket layer) or TLS (Transport Layer Security, transport layer security). After the first terminal receives the group owner's private key, the first terminal can track the identity of the second terminal user corresponding to the signature of each piece of information in the information group according to the group owner's private key.
在第三方系统将第二信息和第一终端公钥写入区块链过程中,第三方系统以统一的账户身份将第二信息和第一终端公钥写入区块链中。需要说明的是,统一的账户身份为一个账户身份,一个账户身份可对应一个信息群,或者对应多个信息群。可以理解的是,当将第二信息写入区块链后,第二终端对应用户可通过区块链浏览器或者第二终端查询到区块链中的第二信息,以决定是否获取该物品。When the third-party system writes the second information and the first terminal public key into the blockchain, the third-party system writes the second information and the first terminal public key into the blockchain with a unified account identity. It should be noted that the unified account identity is one account identity, and one account identity can correspond to one information group, or correspond to multiple information groups. It can be understood that after the second information is written into the block chain, the corresponding user of the second terminal can query the second information in the block chain through the block chain browser or the second terminal to decide whether to obtain the item .
本实施例通过将第二信息写入区块链中,保证第二信息不被修改,防止非法分子伪造第二信息,保证了信息传输过程中的安全性。In this embodiment, by writing the second information into the block chain, it is ensured that the second information will not be modified, preventing illegal elements from forging the second information, and ensuring the security in the process of information transmission.
进一步地,提出本发明基于区块链的信息传输方法第三实施例。Further, a third embodiment of the blockchain-based information transmission method of the present invention is proposed.
所述基于区块链的信息传输方法第三实施例与所述基于区块链的信息传输方法第一或第二实施例的区别在于,基于区块链的信息传输方法还包括:The difference between the third embodiment of the blockchain-based information transmission method and the first or second blockchain-based information transmission method is that the blockchain-based information transmission method further includes:
步骤f,判断所述第二信息对应物品的价值是否小于或者等于预设价值。Step f, judging whether the value of the item corresponding to the second information is less than or equal to a preset value.
当第三方系统接收到第二终端发送的加入信息群的加入请求后,第三方系统获取第二信息对应物品的价值,并判断物品的价值是否小于或者等于预设价值。其中,物品的价值可从第二信息中获取。如在拍卖物品过程中,物品的价值为物品的起始价。预设价值可根据具体需要而设置,如可以设置为50万元,也可设置为80万元等。After the third-party system receives the joining request sent by the second terminal to join the information group, the third-party system obtains the value of the item corresponding to the second information, and judges whether the value of the item is less than or equal to the preset value. Wherein, the value of the item can be obtained from the second information. For example, in the process of auctioning items, the value of the item is the starting price of the item. The preset value can be set according to specific needs, such as 500,000 yuan or 800,000 yuan.
若所述物品的价值小于或者等于所述预设价值,则执行步骤S20。If the value of the item is less than or equal to the preset value, step S20 is executed.
步骤g,若所述物品的价值大于所述预设价值,审核所述第二终端对应的用户是否符合预设条件。Step g, if the value of the item is greater than the preset value, check whether the user corresponding to the second terminal meets the preset condition.
若第三方系统确定物品的价值小于或者等于预设价值,第三方系统则将第二终端私钥和第一终端公钥发送给所述第二终端。若第三方系统确定物品的价值大于预设价值,第三方系统则审核第二终端对应的第二终端对应用户是否符合预设条件。第三方系统审核第二终端对应用户是否符合预设条件的过程为:从第二终端中获取第二终端对应用户的身份信息和验资报告。可以理解的是,第二终端对应用户的身份信息和验资报告可由第二终端对应用户在第二终端中输入。如在拍卖过程中,也可接收第二终端发送的竞标书,在竞标书中提取。If the third-party system determines that the value of the item is less than or equal to the preset value, the third-party system sends the second terminal private key and the first terminal public key to the second terminal. If the third-party system determines that the value of the item is greater than the preset value, the third-party system checks whether the corresponding user of the second terminal corresponding to the second terminal meets the preset condition. The process for the third-party system to check whether the corresponding user of the second terminal meets the preset conditions is to obtain the identity information and capital verification report of the corresponding user of the second terminal from the second terminal. It can be understood that the identity information of the user corresponding to the second terminal and the capital verification report can be input by the user corresponding to the second terminal in the second terminal. For example, during the auction process, the bidding document sent by the second terminal may also be received and extracted from the bidding document.
当获取到第二终端对应用户的身份信息后,第三方系统调用身份信息查验接口,以查验该身份信息的真实性。该查验接口可对接公安系统,即在公安系统中查验身份信息的真实性。若第三方系统通过查验接口查验到与第二终端对应用户身份信息一致的信息,则确定第二终端对应用户的身份信息为真实的;若第三方系统通过查验接口未查验到与第二终端对应用户身份信息一致的信息,则确定第二终端对应用户对应的身份信息为虚假的。自然人的身份信息为姓名和身份证号码,个体工商户和公司的身份信息可为统一社会信用代码和公司名称。After acquiring the identity information of the user corresponding to the second terminal, the third-party system calls the identity information checking interface to check the authenticity of the identity information. The verification interface can be connected to the public security system, that is, the authenticity of identity information can be verified in the public security system. If the third-party system checks the information that is consistent with the identity information of the user corresponding to the second terminal through the check interface, it is determined that the identity information of the user corresponding to the second terminal is true; If the user identity information is consistent, it is determined that the identity information corresponding to the user of the second terminal is false. The identity information of natural persons is the name and ID number, and the identity information of individual industrial and commercial households and companies can be the unified social credit code and company name.
当获取到第二终端对应用户的验资报告后,第三方系统提取验资报告中的验资机构名称,并判断预先存储的验资机构名称集合中是否存在与所提取的验资机构名称一致的机构名称。若预先存储的验资机构名称集合中存在与所提取的验资机构名称一致的机构名称,第三方系统则获取验资报告中资产评估价,并判断资产评估价是否大于物品的价值。若资产评估价大于物品的价值,第三方系统则确定第二终端对应用户符合预设条件;若资产评估价小于或者等于物品的价值,第三方系统则确定第二终端对应用户未符合预设条件。若确定预先存储的验资机构名称集合中未存在与所提取的验资机构名称一致的机构名称,第三方系统则确定第二终端对应用户未符合预设条件。After obtaining the capital verification report corresponding to the user of the second terminal, the third-party system extracts the name of the capital verification institution in the capital verification report, and judges whether there is an institution name consistent with the extracted capital verification institution name in the pre-stored collection of capital verification institution names. If there is an institution name in the pre-stored collection of capital verification institution names that is consistent with the extracted capital verification institution name, the third-party system will obtain the asset appraisal price in the capital verification report and determine whether the asset appraisal price is greater than the value of the item. If the asset evaluation price is greater than the value of the item, the third-party system determines that the user corresponding to the second terminal meets the preset conditions; if the asset evaluation price is less than or equal to the value of the item, the third-party system determines that the user corresponding to the second terminal does not meet the preset conditions . If it is determined that there is no institution name consistent with the extracted capital verification institution name in the pre-stored capital verification institution name set, the third-party system determines that the corresponding user of the second terminal does not meet the preset conditions.
可以理解的是,为了提高信息传输的安全性,避免虚假信息的传输,在判断第二终端对应用户是否符合预设条件过程中,还可以进一步获取第二终端对应用户的负债情况和信用情况等信息进行判断。It is understandable that in order to improve the security of information transmission and avoid the transmission of false information, in the process of judging whether the corresponding user of the second terminal meets the preset conditions, the debt status and credit status of the corresponding user of the second terminal can be further obtained. information to judge.
若所述第二终端对应的用户符合所述竞标条件,则执行步骤S20。If the user corresponding to the second terminal meets the bidding condition, step S20 is executed.
若确定第二终端对应用户符合预设条件,第三方系统则将第二终端私钥和第一终端公钥发送给所述第二终端。若确定第二终端对应用户未符合预设条件,第三方系统则拒绝为第二终端对应用户生成第二终端私钥,以禁止该第二终端对应用户传输信息。If it is determined that the user corresponding to the second terminal meets the preset condition, the third-party system sends the private key of the second terminal and the public key of the first terminal to the second terminal. If it is determined that the corresponding user of the second terminal does not meet the preset conditions, the third-party system refuses to generate a second terminal private key for the corresponding user of the second terminal, so as to prohibit the corresponding user of the second terminal from transmitting information.
本实施例通过根据物品的价值来决定是否审核第二终端对应用户。当物品的价值小于预设价值时,不对第二终端对应用户进行审核;当物品的价值大于或者等于预设价值时,对第二终端对应用户进行审核,只要在第二终端对应用户通过审核后,才为第二终端对应用户生成第二终端私钥,允许第二终端对应用户参与获取物品,避免某些用户恶意获取物品,提高了物品流转过程中的安全性。In this embodiment, it is determined whether to audit the user corresponding to the second terminal according to the value of the item. When the value of the item is less than the preset value, the corresponding user of the second terminal will not be reviewed; when the value of the item is greater than or equal to the preset value, the corresponding user of the second terminal will be reviewed, as long as the corresponding user of the second terminal passes the review , the second terminal private key is generated for the corresponding user of the second terminal, allowing the corresponding user of the second terminal to participate in acquiring items, preventing some users from obtaining items maliciously, and improving the security in the process of item circulation.
进一步地,提出本发明基于区块链的信息传输方法第四实施例。Further, a fourth embodiment of the blockchain-based information transmission method of the present invention is proposed.
所述基于区块链的信息传输方法第四实施例与所述基于区块链的信息传输方法第二或第三实施例的区别在于,基于区块链的信息传输方法还包括:The difference between the fourth embodiment of the blockchain-based information transmission method and the second or third embodiment of the blockchain-based information transmission method is that the blockchain-based information transmission method further includes:
步骤h,当接收到第一终端发送的第二信息和第一终端公钥后,根据所述第二信息检测所述第二信息对应的物品是否合法。Step h, after receiving the second information sent by the first terminal and the public key of the first terminal, check whether the item corresponding to the second information is legal according to the second information.
步骤i,若确定所述物品合法,则创建信息群,并调用群签名算法生成信息群的群公钥和群主私钥。Step i, if it is determined that the item is legal, create an information group, and call the group signature algorithm to generate the group public key and the group owner's private key of the information group.
当第三方系统接收到第一终端发送的第二信息和第一终端公钥后,第三方系统根据第二信息检测第二信息对应的物品是否合法。若第三方系统检测到物品是合法的,第三方系统则创建信息群,调用群签名算法生成信息群的群公钥和群主私钥,将第二信息和群公钥写入区块链中,并将群主私钥返回给第一终端。After the third-party system receives the second information sent by the first terminal and the public key of the first terminal, the third-party system detects whether the item corresponding to the second information is legal according to the second information. If the third-party system detects that the item is legal, the third-party system creates an information group, calls the group signature algorithm to generate the group public key and the private key of the group owner, and writes the second information and group public key into the blockchain , and return the private key of the group owner to the first terminal.
第三方系统检测物品是否合法的过程为:第三方系统将物品的图片和物品的名称与预先存储的禁止流转物品数据库进行对比。若禁止流转物品数据库中存在与物品图片一致的图片,和/或禁止流转数据库中存在与物品名称一致的商品名称,第三方系统则确定物品非法;若禁止流转物品数据库中未存在与物品图片一致的图片,且禁止流转数据库中未存在与物品名称一致的商品名称,第三方系统则确定物品合法。需要说明的是,当流转拍卖物品数据库中存在与物品图片之间相似度大于或者等于预设相似度的图片,则确定禁止流转物品数据库中存在与物品图片一致的图片,否则,则确定禁止流转物品数据库中未存在与物品图片一致的图片。其中,预设相似度可根据具体需要而设置,在本实施例中不做限制。The process for the third-party system to detect whether the item is legal is: the third-party system compares the picture and name of the item with the pre-stored database of items prohibited from circulation. If there is a picture consistent with the item picture in the prohibited item database, and/or there is a product name consistent with the item name in the prohibited item database, the third-party system will determine that the item is illegal; if there is no item consistent with the item image in the prohibited item database , and there is no product name consistent with the name of the item in the prohibited circulation database, the third-party system determines that the item is legal. It should be noted that when there is a picture in the circulation auction item database with a similarity greater than or equal to the preset similarity with the item picture, it is determined that there is a picture consistent with the item picture in the prohibited circulation item database, otherwise, it is determined that the circulation is prohibited An image matching the item image does not exist in the item database. Wherein, the preset similarity can be set according to specific needs, which is not limited in this embodiment.
进一步地,基于区块链的信息传输方法还包括:Further, the blockchain-based information transmission method also includes:
步骤k,若确定所述物品非法,则生成提示信息,并将所述提示信息发送给所述第一终端,以供所述第一终端根据所述提示信息提示对应用户所述物品非法。Step k, if it is determined that the item is illegal, generate prompt information, and send the prompt information to the first terminal, so that the first terminal can prompt the corresponding user that the item is illegal according to the prompt information.
若第三方系统确定物品非法,第三方系统则生成提示信息,并将该提示信息发送给第一终端。当第一终端接收到该提示信息后,根据该提示信息提示第一终端对应用户物品非法。其中,提示信息的表现形式包括但不限于文字形式和语音形式。If the third-party system determines that the item is illegal, the third-party system generates prompt information and sends the prompt information to the first terminal. After receiving the prompt information, the first terminal prompts the first terminal that the item corresponding to the user is illegal according to the prompt information. Wherein, the display form of the prompt information includes but not limited to text form and voice form.
进一步地,还可检测物品的真实性,只有当物品是真实的,才创建信息群。Further, the authenticity of the item can also be checked, and only if the item is authentic, a message group is created.
本实施例通过在接收到第二信息和第一终端公钥后,先判断物品是否是合法的,若物品是合法的,才会创建信息群进行流转物品,避免了第一终端对应用户用不合法,对禁止流转的商品进行流转,避免了物品流转过程中,第二终端对应用户获取到禁止拍卖的物品,造成第二终端对应用户的财产损失。In this embodiment, after receiving the second information and the public key of the first terminal, it is first judged whether the item is legal. It is legal to circulate the goods that are prohibited from circulation, so as to avoid that during the circulation of goods, the corresponding user of the second terminal obtains the goods that are prohibited from being auctioned, resulting in property loss of the corresponding user of the second terminal.
进一步地,提出本发明基于区块链的信息传输方法第五实施例。Further, a fifth embodiment of the blockchain-based information transmission method of the present invention is proposed.
所述基于区块链的信息传输方法第五实施例与所述基于区块链的信息传输方法第一、第二、第三或者第四实施例的区别在于,基于区块链的信息传输方法还包括:The difference between the fifth embodiment of the blockchain-based information transmission method and the first, second, third or fourth embodiments of the blockchain-based information transmission method is that the blockchain-based information transmission method Also includes:
步骤l,当接收到所述第一终端发送的获取所述第二信息对应物品用户对应的身份信息、第一信息和信息字符串的字符串标识后,将获取所述第二信息对应物品用户的所述身份信息、所述第一信息和所述字符串标识写入所述区块链中。Step 1, after receiving the identity information, first information, and character string identification corresponding to the item user corresponding to the second information from the first terminal, acquire the item user corresponding to the second information The identity information, the first information, and the character string identifier are written into the block chain.
当第一终端确定获取物品的用户后,第一终端获取信息字符串对应的字符串标识,将获取物品的用户对应的身份信息、第一信息和信息字符串发送给第三方系统。需要说明的是,每个信息字符串对应着一个唯一的字符串标识,通过字符串标识可以唯一确定对应的信息字符串。当第三方系统接收到获取物品的用户的身份信息、第一信息和字符串标识后,将获取物品的用户的身份信息、第一信息和字符串标识写入区块链中,以供其他用户可通过区块链浏览器或者对应的客户端查阅获取物品的用户的身份信息和/或第一信息等,检验对应的获取物品的用户的身份信息和/或第一信息等。需要说明的是,本实施例中只将信息字符串对应的字符串标识写入区块链中,是因为第二终端对应用户在获取物品过程中,第三方系统已经将信息字符串写入区块链中,因此为了避免重复将信息字符串写入区块链中,在本实施例,只将字符串标识写入区块链中,其他用户通过字符串标识即可在区块链中获取到中标者对应的信息字符串。After the first terminal determines the user who acquired the item, the first terminal acquires the string identifier corresponding to the information string, and sends the identity information corresponding to the user who acquired the item, the first information, and the information string to the third-party system. It should be noted that each information string corresponds to a unique string identifier, and the corresponding information string can be uniquely determined through the string identifier. After the third-party system receives the user's identity information, first information, and string identification of the item, it will write the user's identity information, first information, and string identification into the blockchain for other users The identity information and/or first information of the user who acquired the item can be checked through the block chain browser or the corresponding client, and the corresponding identity information and/or first information of the user who acquired the item can be checked. It should be noted that, in this embodiment, only the string identification corresponding to the information string is written into the blockchain, because the third-party system has already written the information string into the block when the second terminal corresponding to the user obtains the item. In the block chain, so in order to avoid repeatedly writing information strings into the block chain, in this embodiment, only the string identification is written into the block chain, and other users can obtain it in the block chain through the string identification to the information string corresponding to the winning bidder.
进一步地,提出本发明基于区块链的信息传输方法第六实施例。Further, a sixth embodiment of the blockchain-based information transmission method of the present invention is proposed.
所述基于区块链的信息传输方法第六实施例与所述基于区块链的信息传输方法第一、第二、第三、第四或者第五实施例的区别在于,基于区块链的信息传输方法还包括:The difference between the sixth embodiment of the blockchain-based information transmission method and the first, second, third, fourth or fifth embodiments of the blockchain-based information transmission method is that the blockchain-based Information transfer methods also include:
步骤m,当接收到监管终端发送的追踪非法第一信息的追踪请求后,将所述追踪请求发送给所述第一终端,以供所述第一终端根据所述追踪请求确定所述非法第一信息对应的非法信息群,根据所述非法信息群的群主私钥确定所述非法第一信息对应的用户。Step m: After receiving the tracking request sent by the supervisory terminal for tracking the illegal first information, sending the tracking request to the first terminal, so that the first terminal can determine the illegal first information according to the tracking request. For an illegal information group corresponding to one piece of information, determine the user corresponding to the illegal first information according to the private key of the group owner of the illegal information group.
当第一终端对应用户通过区块链完成物品的流转工作后。监管终端可实时或者定时监管在区块链中完成的流转工作的物品是否存在非法流转操作,即监管中标者对应的第一信息是否是非法第一信息。若确定中标者对应的第一信息是非法第一信息,第一终端则触发追踪请求,并将追踪请求发送给第三方系统。其中,监管中标者对应的第一信息是否是非法第一信息的过程可由监管终端对应的监管用户手动执行,也可由监管终端按照一定的监管规则自动进行。当监管中标者对应的第一信息是否是非法第一信息的过程由监管用户手动执行时,追踪请求是由监管用户在监管终端中手动触发;当监管中标者对应的第一信息是否是非法第一信息的过程由监管终端按照一定的监管规则自动进行时,追踪请求由监管终端自动触发。After the corresponding user of the first terminal completes the transfer of items through the blockchain. The supervision terminal can monitor whether there is any illegal circulation operation of the items completed in the circulation work in the blockchain in real time or regularly, that is, to monitor whether the first information corresponding to the winning bidder is illegal first information. If it is determined that the first information corresponding to the winning bidder is illegal first information, the first terminal triggers a tracking request and sends the tracking request to a third-party system. Wherein, the process of supervising whether the first information corresponding to the winning bidder is illegal first information can be performed manually by the supervising user corresponding to the supervising terminal, or can be automatically carried out by the supervising terminal according to certain supervising rules. When the process of supervising whether the first information corresponding to the winning bidder is illegal first information is performed manually by the supervising user, the tracking request is manually triggered by the supervising user in the supervising terminal; when supervising whether the first information corresponding to the winning bidder is illegal first information When the information process is automatically carried out by the supervision terminal according to certain supervision rules, the tracking request is automatically triggered by the supervision terminal.
当第三方系统接收到追踪请求后,将追踪请求发送给第一终端。在追踪请求中,携带有非法第一信息所在群的群公钥。当第一终端接收到追踪请求后,获取追踪请求中的群公钥,根据该群公钥确定非法第一信息所在的非法信息群,获取该非法信息群对应的群主私钥,并在区块链中获取非法第一信息对应的信息签名。第一终端在获取到信息签名和群主私钥后,调用群签名算法,将群主私钥和信息签名输入群签名算法中,以确定非法第一信息对应的第二终端对应用户。需要说明的是,群签名算法的输出即为第二终端对应用户的身份信息。After receiving the tracking request, the third-party system sends the tracking request to the first terminal. In the tracking request, the group public key of the group where the illegal first information belongs is carried. When the first terminal receives the tracking request, it obtains the group public key in the tracking request, determines the illegal information group where the illegal first information is based on the group public key, obtains the group owner's private key corresponding to the illegal information group, and Obtain the information signature corresponding to the illegal first information in the block chain. After obtaining the information signature and the group owner's private key, the first terminal invokes the group signature algorithm, and inputs the group owner's private key and the information signature into the group signature algorithm to determine the corresponding user of the second terminal corresponding to the illegal first information. It should be noted that the output of the group signature algorithm is the identity information of the user corresponding to the second terminal.
本实施例通过在完成物品流转工作后,可以监管区块链中是否存在非法第一信息,并可通过群主私钥确定非法第一信息对应的具体非法第二终端对应用户。In this embodiment, after completing the item circulation work, it is possible to monitor whether there is illegal first information in the blockchain, and to determine the specific illegal second terminal corresponding user corresponding to the illegal first information through the private key of the group owner.
此外,本发明实施例还提出一种基于区块链的信息传输方法,所述基于区块链的信息传输方法包括以下步骤:In addition, the embodiment of the present invention also proposes a block chain-based information transmission method, and the block chain-based information transmission method includes the following steps:
步骤a1,当第二终端接收到第三方系统发送的第二终端私钥和第一终端的第一终端公钥后,获取第一信息和预设的加密密钥;Step a1, after the second terminal receives the second terminal private key sent by the third-party system and the first terminal public key of the first terminal, obtain the first information and the preset encryption key;
步骤a2,计算所述第一信息的第一哈希值,并根据所述加密密钥加密所述第一信息,生成与所述第一信息对应的密文,计算所述密文的第二哈希值;Step a2, calculating a first hash value of the first information, encrypting the first information according to the encryption key, generating a ciphertext corresponding to the first information, and calculating a second hash value of the ciphertext hash value;
步骤a3,采用所述第一终端公钥加密所述加密密钥,得到加密后的所述加密密钥,并计算加密后的所述加密密钥的第三哈希值;Step a3, using the first terminal public key to encrypt the encryption key to obtain the encrypted encryption key, and calculate a third hash value of the encrypted encryption key;
步骤a4,将所述密文、加密后的所述加密密钥、所述第一哈希值、所述第二哈希值和所述第三哈希值拼接成信息字符串;Step a4, splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information string;
步骤a5,从区块链中获取预存的群公钥,基于群签名算法,根据所述第二终端私钥、所述群公钥和所述信息字符串生成信息签名,并将所述信息签名和所述信息字符串发送给所述第三方系统,以供所述第三方系统将所述信息签名和所述信息字符串写入所述区块链中。Step a5, obtain the pre-stored group public key from the blockchain, generate an information signature based on the second terminal private key, the group public key and the information string based on the group signature algorithm, and sign the information and the information string are sent to the third-party system for the third-party system to write the information signature and the information string into the block chain.
进一步地,基于区块链的信息传输方法还包括:Further, the blockchain-based information transmission method also includes:
步骤a6,当所述第二终端侦测到加入所述第三方系统创建的信息群的加入请求后,将所述加入请求发送给所述第三方系统,以供所述第三方系统调用群签名算法,生成第二终端私钥,并返回所述第二终端私钥和所述第一终端发送的第一终端公钥。Step a6, when the second terminal detects a joining request to join the information group created by the third-party system, send the joining request to the third-party system for the third-party system to call the group signature An algorithm to generate a private key of the second terminal, and return the private key of the second terminal and the public key of the first terminal sent by the first terminal.
本发明基于区块链的信息传输方法具体实施方式与上述基于区块链的信息传输方法中第二终端执行的各个步骤基本相同,在此不再赘述。The specific implementation of the blockchain-based information transmission method of the present invention is basically the same as the steps performed by the second terminal in the above-mentioned blockchain-based information transmission method, and will not be repeated here.
此外,本发明实施例还提出一种基于区块链的信息传输终端,所述基于区块链的信息传输终端包括:In addition, the embodiment of the present invention also proposes a blockchain-based information transmission terminal, which includes:
获取模块,用于当接收到第三方系统发送的第二终端私钥和第一终端的第一终端公钥后,获取第一信息和预设的加密密钥;An acquisition module, configured to acquire the first information and the preset encryption key after receiving the second terminal private key and the first terminal public key of the first terminal sent by the third-party system;
计算模块,用于计算所述第一信息的第一哈希值;a calculation module, configured to calculate a first hash value of the first information;
加密模块,用于根据所述加密密钥加密所述第一信息,生成与所述第一信息对应的密文;An encryption module, configured to encrypt the first information according to the encryption key, and generate ciphertext corresponding to the first information;
所述计算模块还用于计算所述密文的第二哈希值;The calculation module is also used to calculate a second hash value of the ciphertext;
所述加密模块还用于采用所述第一终端公钥加密所述加密密钥,得到加密后的所述加密密钥;The encryption module is further configured to use the first terminal public key to encrypt the encryption key to obtain the encrypted encryption key;
所述计算模块还用于计算加密后的所述加密密钥的第三哈希值;The calculation module is also used to calculate a third hash value of the encrypted encryption key;
拼接模块,用于将所述密文、加密后的所述加密密钥、所述第一哈希值、所述第二哈希值和所述第三哈希值拼接成信息字符串;A splicing module, configured to splice the ciphertext, the encrypted encryption key, the first hash value, the second hash value, and the third hash value into an information string;
生成模块,用于从区块链中获取预存的群公钥,基于群签名算法,根据所述第二终端私钥、所述群公钥和所述信息字符串生成信息签名;A generating module, configured to obtain a prestored group public key from the block chain, and generate an information signature based on the second terminal private key, the group public key and the information string based on the group signature algorithm;
发送模块,用于将所述信息签名和所述信息字符串发送给所述第三方系统,以供所述第三方系统将所述信息签名和所述信息字符串写入所述区块链中。A sending module, configured to send the information signature and the information string to the third-party system, so that the third-party system writes the information signature and the information string into the block chain .
进一步地,所述发送模块还用于当所述第二终端侦测到加入所述第三方系统创建的信息群的加入请求后,将所述加入请求发送给所述第三方系统,以供所述第三方系统调用群签名算法,生成第二终端私钥,并返回所述第二终端私钥和所述第一终端发送的第一终端公钥。Further, the sending module is further configured to send the joining request to the third-party system after the second terminal detects a joining request to join the information group created by the third-party system, for the The third-party system invokes a group signature algorithm to generate a second terminal private key, and returns the second terminal private key and the first terminal public key sent by the first terminal.
本发明基于区块链的信息传输终端具体实施方式与上述基于区块链的信息传输方法各实施例基本相同,在此不再赘述。The specific implementation of the blockchain-based information transmission terminal of the present invention is basically the same as the embodiments of the above-mentioned blockchain-based information transmission method, and will not be repeated here.
此外,本发明实施例还提出一种计算机可读存储介质,所述计算机可读存储介质上存储有基于区块链的信息传输程序,所述基于区块链的信息传输程序被处理器执行时实现如上所述的奖励发送方法的步骤。In addition, the embodiment of the present invention also proposes a computer-readable storage medium, on which a blockchain-based information transmission program is stored, and when the blockchain-based information transmission program is executed by a processor Implement the steps of the reward sending method as described above.
本发明计算机可读存储介质具体实施方式与上述基于区块链的信息传输方法各实施例基本相同,在此不再赘述。The specific implementation manners of the computer-readable storage medium of the present invention are basically the same as the above-mentioned embodiments of the information transmission method based on blockchain, and will not be repeated here.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It should be noted that, in this document, the term "comprising", "comprising" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or apparatus comprising a set of elements includes not only those elements, It also includes other elements not expressly listed, or elements inherent in the process, method, article, or device. Without further limitations, an element defined by the phrase "comprising a ..." does not preclude the presence of additional identical elements in the process, method, article, or apparatus comprising that element.
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the above embodiments of the present invention are for description only, and do not represent the advantages and disadvantages of the embodiments.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the methods of the above embodiments can be implemented by means of software plus a necessary general-purpose hardware platform, and of course also by hardware, but in many cases the former is better implementation. Based on such an understanding, the essence of the technical solution of the present invention or the part that contributes to the prior art can be embodied in the form of software products, and the computer software products are stored in a storage medium (such as ROM/RAM, disk, CD) contains several instructions to make a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in various embodiments of the present invention.
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。The above are only preferred embodiments of the present invention, and are not intended to limit the patent scope of the present invention. Any equivalent structure or equivalent process conversion made by using the description of the present invention and the contents of the accompanying drawings, or directly or indirectly used in other related technical fields , are all included in the scope of patent protection of the present invention in the same way.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810478310.2ACN108650077B (en) | 2018-05-17 | 2018-05-17 | Blockchain-based information transmission method, terminal, device and readable storage medium |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810478310.2ACN108650077B (en) | 2018-05-17 | 2018-05-17 | Blockchain-based information transmission method, terminal, device and readable storage medium |
| Publication Number | Publication Date |
|---|---|
| CN108650077Atrue CN108650077A (en) | 2018-10-12 |
| CN108650077B CN108650077B (en) | 2021-05-28 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201810478310.2AActiveCN108650077B (en) | 2018-05-17 | 2018-05-17 | Blockchain-based information transmission method, terminal, device and readable storage medium |
| Country | Link |
|---|---|
| CN (1) | CN108650077B (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109510818A (en)* | 2018-10-29 | 2019-03-22 | 梁伟 | Data transmission system, method, apparatus, equipment and the storage medium of block chain |
| CN110189184A (en)* | 2019-04-26 | 2019-08-30 | 深圳市智税链科技有限公司 | A kind of electronic invoice storage method and device |
| CN110601816A (en)* | 2019-09-18 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Lightweight node control method and device in block chain system |
| CN110677257A (en)* | 2019-09-24 | 2020-01-10 | 安徽师范大学 | Method and system for generating blocks in alliance chain |
| CN110808959A (en)* | 2019-10-10 | 2020-02-18 | 深圳创链数据科技有限公司 | Intelligent equipment data acquisition system and method based on block chain |
| CN111162912A (en)* | 2019-12-30 | 2020-05-15 | 深圳前海微众银行股份有限公司 | A verification method and device suitable for blockchain |
| CN111556174A (en)* | 2020-06-28 | 2020-08-18 | 江苏恒宝智能系统技术有限公司 | Information interaction method, device and system |
| CN111784338A (en)* | 2019-04-10 | 2020-10-16 | 北京沃东天骏信息技术有限公司 | Information processing method, device, system and storage medium |
| CN112465501A (en)* | 2020-11-11 | 2021-03-09 | 中国人民大学 | Copyright evidence storage and infringement behavior automatic evidence collection method and system based on block chain |
| CN113128999A (en)* | 2019-12-31 | 2021-07-16 | 航天信息股份有限公司 | Block chain privacy protection method and device |
| US20220036448A1 (en)* | 2019-05-15 | 2022-02-03 | Sk Planet Co., Ltd. | Electronic Commerce Service Device and Operating Method Therefor, and Service Device |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20170180128A1 (en)* | 2015-12-22 | 2017-06-22 | Gemalto Inc. | Method for managing a trusted identity |
| CN107392770A (en)* | 2017-08-09 | 2017-11-24 | 北京云知科技有限公司 | A kind of random-number generating method and system based on block chain |
| CN107453865A (en)* | 2017-07-18 | 2017-12-08 | 众安信息技术服务有限公司 | A kind of multiparty data sharing method and system for protecting data transmission source privacy |
| CN107730384A (en)* | 2017-11-13 | 2018-02-23 | 深圳大学 | Art sales method and server, server end and system based on block chain |
| CN107911216A (en)* | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
| CN108009825A (en)* | 2017-11-29 | 2018-05-08 | 江苏安凰领御科技有限公司 | A kind of identity management system and method based on block chain technology |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20170180128A1 (en)* | 2015-12-22 | 2017-06-22 | Gemalto Inc. | Method for managing a trusted identity |
| CN107453865A (en)* | 2017-07-18 | 2017-12-08 | 众安信息技术服务有限公司 | A kind of multiparty data sharing method and system for protecting data transmission source privacy |
| CN107392770A (en)* | 2017-08-09 | 2017-11-24 | 北京云知科技有限公司 | A kind of random-number generating method and system based on block chain |
| CN107911216A (en)* | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
| CN107730384A (en)* | 2017-11-13 | 2018-02-23 | 深圳大学 | Art sales method and server, server end and system based on block chain |
| CN108009825A (en)* | 2017-11-29 | 2018-05-08 | 江苏安凰领御科技有限公司 | A kind of identity management system and method based on block chain technology |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109510818B (en)* | 2018-10-29 | 2021-08-17 | 梁伟 | Data transmission system, method, device, equipment and storage medium of block chain |
| CN109510818A (en)* | 2018-10-29 | 2019-03-22 | 梁伟 | Data transmission system, method, apparatus, equipment and the storage medium of block chain |
| CN111784338A (en)* | 2019-04-10 | 2020-10-16 | 北京沃东天骏信息技术有限公司 | Information processing method, device, system and storage medium |
| CN110189184A (en)* | 2019-04-26 | 2019-08-30 | 深圳市智税链科技有限公司 | A kind of electronic invoice storage method and device |
| CN110189184B (en)* | 2019-04-26 | 2024-04-26 | 深圳市智税链科技有限公司 | Electronic invoice storage method and device |
| US20220036448A1 (en)* | 2019-05-15 | 2022-02-03 | Sk Planet Co., Ltd. | Electronic Commerce Service Device and Operating Method Therefor, and Service Device |
| CN110601816A (en)* | 2019-09-18 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Lightweight node control method and device in block chain system |
| CN110601816B (en)* | 2019-09-18 | 2021-09-28 | 腾讯科技(深圳)有限公司 | Lightweight node control method and device in block chain system |
| CN110677257A (en)* | 2019-09-24 | 2020-01-10 | 安徽师范大学 | Method and system for generating blocks in alliance chain |
| CN110677257B (en)* | 2019-09-24 | 2022-09-30 | 安徽师范大学 | Method and system for generating blocks in alliance chain |
| CN110808959A (en)* | 2019-10-10 | 2020-02-18 | 深圳创链数据科技有限公司 | Intelligent equipment data acquisition system and method based on block chain |
| CN111162912B (en)* | 2019-12-30 | 2021-06-15 | 深圳前海微众银行股份有限公司 | Verification method and device suitable for block chain and storage medium |
| CN111162912A (en)* | 2019-12-30 | 2020-05-15 | 深圳前海微众银行股份有限公司 | A verification method and device suitable for blockchain |
| CN113128999A (en)* | 2019-12-31 | 2021-07-16 | 航天信息股份有限公司 | Block chain privacy protection method and device |
| CN113128999B (en)* | 2019-12-31 | 2024-04-12 | 航天信息股份有限公司 | Block chain privacy protection method and device |
| CN111556174B (en)* | 2020-06-28 | 2021-07-20 | 江苏恒宝智能系统技术有限公司 | Information interaction method, device and system |
| CN111556174A (en)* | 2020-06-28 | 2020-08-18 | 江苏恒宝智能系统技术有限公司 | Information interaction method, device and system |
| CN112465501A (en)* | 2020-11-11 | 2021-03-09 | 中国人民大学 | Copyright evidence storage and infringement behavior automatic evidence collection method and system based on block chain |
| Publication number | Publication date |
|---|---|
| CN108650077B (en) | 2021-05-28 |
| Publication | Publication Date | Title |
|---|---|---|
| CN108650077B (en) | Blockchain-based information transmission method, terminal, device and readable storage medium | |
| CN111737724B (en) | Data processing method and device, intelligent equipment and storage medium | |
| JP6873270B2 (en) | Handling of transaction activities based on smart contracts in the blockchain Caution Methods and devices for protecting data | |
| CN109889504B (en) | Decentralized data access right transaction method and system | |
| CN110135819B (en) | Block chain-based third-party trusted data transaction system and method | |
| WO2020062668A1 (en) | Identity authentication method, identity authentication device, and computer readable medium | |
| CN110719176A (en) | Blockchain-based logistics privacy protection method, system and readable storage medium | |
| TW201947476A (en) | Blockchain-based logistics information transmission method, system and device | |
| CN109547206B (en) | Digital certificate processing method and related device | |
| CN109905360B (en) | Data verification method and terminal equipment | |
| CN111767582B (en) | Electronic bidding method, device, equipment and storage medium based on block chain | |
| Li et al. | A decentralized and secure blockchain platform for open fair data trading | |
| CN111461852A (en) | A blockchain-based data processing method, device and readable storage medium | |
| CN111414434B (en) | Block chain-based data transaction management network, transaction device and storage medium | |
| CN111460457A (en) | Real estate property registration supervision method, device, electronic equipment and storage medium | |
| JP4028304B2 (en) | Electronic contract system | |
| CN113706261A (en) | Block chain-based power transaction method, device and system | |
| CN116545773B (en) | Method, medium and electronic equipment for processing privacy data | |
| CN110941840B (en) | Data processing method, system and terminal | |
| CN113783690B (en) | Authentication-based bidding method and device | |
| CN115412256A (en) | Identity authentication method and device based on block chain, storage medium and terminal equipment | |
| CN111552950B (en) | Software authorization method and device and computer readable storage medium | |
| CN116862508A (en) | Machine learning model transaction system based on alliance blockchain | |
| CN110610361A (en) | Blockchain-based enterprise data signature method and device | |
| Rattan et al. | E-Commerce Security using PKI approach |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |