CN107172074A - A kind of method for sending information, processing method and processing device - Google Patents
A kind of method for sending information, processing method and processing device Download PDFInfo
- Publication number
- CN107172074A CN107172074A CN201710494820.4A CN201710494820A CN107172074A CN 107172074 A CN107172074 A CN 107172074A CN 201710494820 A CN201710494820 A CN 201710494820A CN 107172074 A CN107172074 A CN 107172074A
- Authority
- CN
- China
- Prior art keywords
- information
- transaction information
- transaction
- parameter
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of method for sending information, processing method and processing device, the anonymity for improving anonymous communication, including:Receive the information to be transmitted and transmission objectives of user's input;The encryption key of transmission objectives is obtained, and information to be transmitted is encrypted using encryption key;Using the information to be transmitted after encryption as the first Transaction Information additional information parameter;First Transaction Information it is transacting targeted different from transmission objectives;The service charge parameter of first Transaction Information is set to the first particular value, and the first particular value is used to indicate that the accounting nodes in block catenary system do not record the first Transaction Information;First Transaction Information is sent by block catenary system.Attacker can not obtain the user real identification of transmission objectives.Moreover, also avoiding the risk that attacker screens Transaction Information by public account book malice by the way that the service charge parameter of the first Transaction Information is set into the first particular value to avoid the first Transaction Information from writing the public account book of block catenary system by accounting nodes.
Description
Technical field
The present invention relates to Internet technical field, more particularly to a kind of method for sending information, processing method and processing device.
Background technology
Anonymous communication demand in the Internet, applications is extensive, such as electronic voting, the Internet bank, electronics securities trading and electricity
Sub- commercial affairs etc..User wishes to protect the identity information of communication user when carrying out data transmission, prevents attacker's monitoring and analyze
Communication data.And in traditional internet, unique procotol is owned by when each user is using network service
(Internet Protocol, IP) address, each transmitting message includes data-source IP address and purpose IP address.Attack
Person can be by monitoring sender and recipients corresponding with the transmitting message discovery message in analysis network, therefore is difficult to realize
Anonymous communication.
Existing Anonymous communication mechanism mainly includes onion (tor) network anonymous communication, VPN (Virtual
Private Network, VPN) encryption anonymous communication and bit letter (Bitmessage) anonymous communication etc..Hidden for tor networks
Name communication, its anonymity and onion number of nodes positive correlation, it is therefore desirable to large-scale infrastructure is safeguarded, moreover, tor networks
The threat of malicious node is highly prone to, when any node in tor networks is the malicious node that attacker builds, will be threatened
To the path of information flow and the anonymity of information transmission of tor networks.Anonymous communication is encrypted for VPN, is present in tor networks
Similar the problem of, it is also required to extra VPN infrastructure, and when user's payment VPN service fees, also easily causes
The leakage of identity information, in addition, there is also can institutionalized risk for the supplier of VPN services.Believe anonymous communication for bit, its
Special structure one is needed to be used for the peer-to-peer network (Peer to Peer, P2P) communicated, according to the node address in P2P networks
Carry out the communication between node, although bit letter anonymous communication can ensure logical using " anonymity " of P2P nodes address
The anonymity of letter, but, existing substantial amounts of research at present has shown that the anonymity existing defects of the node address in P2P networks, exists
It is associated with user real identification that a variety of methods can get a glimpse of node address.
To sum up, existing anonymous information communication means all has the problem of anonymity is not enough.
The content of the invention
The present invention provides a kind of method for sending information, processing method and processing device, the anonymity to improve anonymous information communication
Property.
The embodiment of the present invention provides a kind of method for sending information, including:
Receive the information to be transmitted and transmission objectives of user's input;
The encryption key of the transmission objectives is obtained, and the information to be transmitted is added using the encryption key
It is close;
Using the information to be transmitted after encryption as the first Transaction Information additional information parameter;First Transaction Information
It is transacting targeted different from the transmission objectives;The service charge parameter of first Transaction Information is set to the first particular value, described
First particular value is used to indicate that the accounting nodes in block catenary system do not record first Transaction Information;
First Transaction Information is sent by the block catenary system.
Optionally, after by block catenary system transmission first Transaction Information, in addition to:
When receiving the response message that the transmission objectives is sent within a preset time interval, first Transaction Information is confirmed
Send successfully.
Optionally, in addition to:
When not receiving the response message that the transmission objectives is sent within a preset time interval, the second transaction letter is resend
Breath;The additional information parameter of second Transaction Information is the information to be transmitted after encryption;The formality of second Transaction Information
Take parameter for the second particular value, second particular value is used to indicate that the accounting nodes in block catenary system to record described second and handed over
Easy information.
Optionally, using the information to be transmitted after encryption as after the additional information parameter of Transaction Information, in addition to:
Generate public private key pair;
First Transaction Information is signed using the private key in the public private key pair;Described after signature
The public key information in the public private key pair is included in one Transaction Information.
The embodiment of the present invention provides a kind of information processing method, including:
Transmission node receives the Transaction Information that the transmission of block catenary system comes;The transacting targeted and transmission mesh of the Transaction Information
Mark is different;The additional information parameter of the Transaction Information is the letter to be transmitted after the encryption keys using the transmission objectives
Breath;The service charge parameter of the Transaction Information is the first particular value, and first particular value is used to indicate the block catenary system
In accounting nodes do not record first Transaction Information;
The transmission node decrypts the additional information parameter in first Transaction Information using own key, is successfully solving
When close, the information content in the additional information parameter is extracted.
Optionally, in successful decryption, after the information content in the extraction additional information parameter, in addition to:
Construct the 3rd Transaction Information;The additional information parameter of 3rd Transaction Information is according to transmission first transaction
Response message after the encryption keys of the sender of information;
The 3rd Transaction Information is sent to the block catenary system.
Optionally, in addition to:
The transmission node extracts the second Transaction Information record of each node account book in the block catenary system;
The transmission node decrypts the additional information parameter in second Transaction Information using own key, is successfully solving
When close, the information content in the additional information parameter is extracted.
Optionally, the transmission node using own key decrypt additional information parameter in first Transaction Information it
Before, in addition to:
Obtain the public key information in first Transaction Information;In the public private key pair that the public key generates for described sender
Public key;
The signature of the first Transaction Information according to the public key verifications;
When being verified, the additional information parameter in first Transaction Information is decrypted using own key.
Optionally, in addition to:
When decrypting failed, continue to forward first Transaction Information.
The embodiment of the present invention provides a kind of information transmitting apparatus, including:
Transmit-Receive Unit, information to be transmitted and transmission objectives for receiving user's input;
Processing unit, the encryption key for obtaining the transmission objectives, and using the encryption key to described to be passed
Defeated information is encrypted;
The processing unit, is additionally operable to join the information to be transmitted after encryption as the additional information of the first Transaction Information
Number;First Transaction Information it is transacting targeted different from the transmission objectives;The service charge parameter of first Transaction Information
The first particular value is set to, first particular value is used to indicate that the accounting nodes in block catenary system not to record described first and handed over
Easy information;
The Transmit-Receive Unit, is additionally operable to send first Transaction Information by the block catenary system.
Optionally, the processing unit is additionally operable to:
When receiving the response message that the transmission objectives is sent within a preset time interval, first Transaction Information is confirmed
Send successfully.
Optionally, the processing unit is additionally operable to:
When not receiving the response message that the transmission objectives is sent within a preset time interval, the second transaction letter is resend
Breath;The additional information parameter of second Transaction Information is the information to be transmitted after encryption;The formality of second Transaction Information
Take parameter for the second particular value, second particular value is used to indicate that the accounting nodes in block catenary system to record described second and handed over
Easy information.
Optionally, the processing unit is additionally operable to:
Generate public private key pair;
First Transaction Information is signed using the private key in the public private key pair;Described after signature
The public key information in the public private key pair is included in one Transaction Information.
The embodiment of the present invention provides a kind of information processor, including:
Transmit-Receive Unit, for receiving the Transaction Information that the transmission of block catenary system comes;The Transaction Information it is transacting targeted with
Transmission objectives is different;The additional information parameter of the Transaction Information is to use treating after the encryption keys of the transmission objectives
Transmit information;The service charge parameter of the Transaction Information is the first particular value, and first particular value is used to indicate the block
Accounting nodes in catenary system do not record first Transaction Information;
Processing unit, for decrypting the additional information parameter in first Transaction Information using own key, in success
During decryption, the information content in the additional information parameter is extracted;
The processing unit, is additionally operable to when for accounting nodes, if the particular value is the first particular value, institute is not recorded
State Transaction Information.
Optionally, the processing unit is additionally operable to:
Construct the 3rd Transaction Information;The additional information parameter of 3rd Transaction Information is according to transmission first transaction
Response message after the encryption keys of the sender of information;
The 3rd Transaction Information is sent to the block catenary system.
Optionally, the processing unit is additionally operable to:
Extract the second Transaction Information record of each node account book in the block catenary system;
The additional information parameter in second Transaction Information is decrypted using own key, in successful decryption, institute is extracted
State the information content in additional information parameter.
Optionally, the processing unit is additionally operable to:
Obtain the public key information in first Transaction Information;In the public private key pair that the public key generates for described sender
Public key;
The signature of the first Transaction Information according to the public key verifications;
When being verified, the additional information parameter in first Transaction Information is decrypted using own key.
Optionally, the processing unit is additionally operable to:
When decrypting failed, the Transmit-Receive Unit is controlled to continue to forward first Transaction Information.
First Transaction Information it is transacting targeted different from transmission objectives so that even if attacker can crack block catenary system
Incidence relation between interior joint address and user real identification, can only also obtain transacting targeted user real identification, and nothing
Method obtains the user real identification of transmission objectives.Moreover, there is no transmission objectives in the first Transaction Information in the embodiment of the present invention
Address information, transmission node by whether successful decryption determine whether extract additional parametric information in the information content, without
It is by recognizing that the means of transmission address determine whether to extract the information content in additional information parameter, even if so that the first transaction
There is no the address information of transmission objectives in information, can guarantee that transmission objectives can be properly received entrained by the first Transaction Information yet
Information to be transmitted.In addition, by the way that the service charge parameter of the first Transaction Information is set into the first particular value to avoid the first transaction
Information writes the public account book of block catenary system by accounting nodes, also avoids attacker and is merchandised by the malice screening of public account book
The risk of information.Therefore, the technical scheme disclosed in the embodiment of the present invention can strengthen the anonymity of anonymous communication.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, makes required in being described below to embodiment
Accompanying drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this
For the those of ordinary skill in field, without having to pay creative labor, it can also be obtained according to these accompanying drawings
His accompanying drawing.
Fig. 1 is a kind of bit coin network system architecture schematic diagram provided in an embodiment of the present invention;
Fig. 2 is a kind of method for sending information schematic flow sheet provided in an embodiment of the present invention;
Fig. 3 is a kind of information processing method schematic flow sheet provided in an embodiment of the present invention;
Fig. 4 is a kind of information transmission flow schematic diagram provided in an embodiment of the present invention;
Fig. 5 is a kind of message processing flow schematic diagram provided in an embodiment of the present invention;
Fig. 6 is a kind of information transmission flow schematic diagram provided in an embodiment of the present invention;
Fig. 7 is a kind of dispensing device structural representation provided in an embodiment of the present invention;
Fig. 8 is a kind of information processor structural representation provided in an embodiment of the present invention.
Embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with accompanying drawing the present invention is made into
One step it is described in detail, it is clear that described embodiment is only embodiment of the invention a part of, rather than whole implementation
Example.Based on the embodiment in the present invention, what those of ordinary skill in the art were obtained under the premise of creative work is not made
All other embodiment, belongs to the scope of protection of the invention.
The technical scheme that the embodiment of the present invention is provided is applied to most block catenary systems, and block catenary system is a kind of
Acentric network system, most common is bit coin network system.Fig. 1 is a kind of bit coin provided in an embodiment of the present invention
The simple system architecture for showing bit coin network, bit coin net in actual applications in network system architecture schematic diagram, Fig. 1
Network system architecture can be more much more complex than shown in Fig. 1.As shown in figure 1, bit coin network system is made up of multiple terminals, in the system
In and in the absence of central server or the equipment with similar functions, each terminal in system is " equality ", all may be used
To build, send and receive Transaction Information.If terminal bit coin network to be added, need to install specific in the terminal
Bit coin software, when bit coin running software, the terminal just adds bit coin network.Terminal is in bit coin network system
In the presence of a unique address, this address can be voluntarily inputted by user by bit coin Software Create after a string of characters,
It is portable with transacting targeted address information in Transaction Information when the transaction of bit coin is carried out between terminal.According to transacting targeted
Address information, bit coin network system takes midsequent forward mode to transmit Transaction Information, i.e., when a system node receives one
After individual Transaction Information, the transacting targeted address information in Transaction Information judges whether it is the address information of oneself, if not
It is then to broadcast the Transaction Information to neighbouring system node.Bit coin network system is a kind of relatively conventional block linkwork
System, in addition to bit coin network system, such as the other digital coin systems in ether mill also all have similar principle and feature,
It should be included among the embodiment of the present invention.
Based on the above-mentioned block catenary system framework by taking bit coin network system as an example, the embodiment of the present invention provides a kind of information
Sending method.Fig. 2 is a kind of method for sending information schematic flow sheet provided in an embodiment of the present invention, as shown in Fig. 2 including following
Step:
S201:Receive the information to be transmitted and transmission objectives of user's input.
S202:The encryption key of transmission objectives is obtained, and information to be transmitted is encrypted using encryption key.
S203:Using the information to be transmitted after encryption as the first Transaction Information additional information parameter;First Transaction Information
It is transacting targeted different from transmission objectives;The service charge parameter of first Transaction Information is set to the first particular value, the first particular value
For indicating that the accounting nodes in block catenary system do not record the first Transaction Information.
S204:First Transaction Information is sent by block catenary system.
In specific implementation process, block catenary system can be bit coin network system or ether mill network system,
Can also be block catenary system for specially being built for anonymous transmission, etc., the embodiment of the present invention is not construed as limiting to this.It is optional
, block catenary system is bit coin network system, bit coin network system is that current coverage is most wide, it is the most ripe to develop,
The block catenary system that operation is stablized the most, technical scheme provided in an embodiment of the present invention may be directly applied to bit coin network system
In, the above-mentioned advantage of bit coin network system can be made full use of, what the performance embodiment of the present invention was brought to the full extent carries
The technique effect of high anonymous communication anonymity.When Transaction Information is transmitted in block catenary system, generate the Transaction Information is
System node is sender, and the system node of any one non-sent side can serve as the transmission node of the Transaction Information, and pass
Defeated target is then one in numerous transmission nodes of the Transaction Information.
In S201, information to be transmitted is that user is intended to the anonymous information for being transferred to transmission objectives.For example, user A is intended to
User B " 4 park entrances will be shown in tomorrow afternoon " is informed, then, the system node corresponding to user A is sender, information to be transmitted
It is " 4 park entrances will be shown in tomorrow afternoon ", and the system node corresponding to user B needs to receive the information to be transmitted
Transmission objectives.
In S202, the encryption key of transmission objectives can sender by under line or other avenues of communication are obtained,
It should ensure that encryption key can not be known by third party in objective.Encryption key can sender and transmission objectives arrange in advance
The key pair that private key, encryption and decryption are all carried out using this private key or sender arranges with transmission objectives
In encryption key or transmission objectives public key address, wherein, public key address is in block catenary system equivalent to system section
Dot address, is the identity of user in block catenary system, system node is by block chain software (in such as bit coin network system
Bit coin software) generation public key address and private key corresponding with the public key address, the public private key pair is one in block catenary system
As be used for the purposes such as authentication, digital signature.
In S203, additional information parameter can be provided with the Transaction Information of block catenary system, is commonly used in record and hands over
The information to be transmitted after encryption is regard as the attached of the first Transaction Information in the information such as easy time, transaction reason, the embodiment of the present invention
Plus information parameter.For example, in bit coin network system, additional information parameter is OP_RETURN parameters, transaction is being built
During information, just need the information record to be transmitted after encryption among OP_RETURN parameters.It is noted that Transaction Information
Transacting targeted different from transmission objectives, for example, user A transmits message to user B, then the transmission objectives of Transaction Information is user B,
And the transacting targeted of Transaction Information is user C.Optionally, can be by the way that the transaction address information in Transaction Information be set to use
Family C address information is realized, can also arbitrarily input any transaction address information, because the purpose of this Transaction Information is real
Existing message transmissions of the user A to user B, and it is not necessary to guaranty that this Transaction Information is bound to realize between user A and other users
Process of exchange.Certainly, directly user A is concealed in user D and user C or user A and user C to the user B message transmitted
Between arm's length dealing information in method, be also contained in the embodiment of the present invention, the application is no longer repeated this one by one.
In block catenary system, especially block chain digital coin systems, there are all friendships in system in the presence of a record more
The public account book of easy information, this account book is combined by the account book of each system node, and anyone can read public
Additional information parameter in the Transaction Information that account book is recorded.Although the additional information of the first Transaction Information in the embodiment of the present invention
Parameter is information to be transmitted after transmission objectives encryption keys, and attacker can not decrypt, but attacker still can be with
Malice screening is carried out to the Transaction Information in public account book according to some features of additional information parameter, this drops to a certain extent
The anonymity of low communication.Therefore, in S203, the service charge parameter of the first Transaction Information is set to the first particular value, first
Particular value is used to indicate that the accounting nodes in block catenary system do not record the first Transaction Information.In block catenary system, in order to protect
The uniformity of each system node account book is demonstrate,proved, a system node can be elected by block chain agreement and is used as accounting nodes, by
Transaction Information is recorded in public account book by the node, afterwards, and accounting nodes send other nodes in broadcast notice system and hand over this
Easy information is recorded in respective account book, and collects certain service charge.Only after Transaction Information is recorded in public account book,
Just think that the Transaction Information comes into force.Under normal circumstances, accounting nodes are the sequential processes transaction according to service charge from high to low
Information, i.e. the higher Transaction Information of service charge parameter is more first handled, the slower processing of the lower Transaction Information of service charge, works as transaction
When information is not recorded in public account book by accounting nodes within a certain period of time, just think that this Transaction Information is failed.It is of the invention real
Apply in example, service charge parameter is set to the first particular value, such as 0, i.e. not payment procedure takes or other relatively low numerical value, and or
Any form of illegal field of person so that accounting nodes do not handle the first Transaction Information for a long time, until the first Transaction Information loses
Effect, so that avoiding the first Transaction Information is written into public account book.Certainly, the failure of the first Transaction Information does not represent the system
In other nodes no longer transmit the Transaction Information, the Transaction Information, which remains unchanged, to be transferred to transmission objectives by block catenary system.
In S204, sender sends Transaction Information to block catenary system, will specifically be merchandised using the form of broadcast
Information is sent to neighbouring system node, in neighbouring system node non-transmitting target, by neighbouring system node continue into
Row broadcast forwarding, i.e. relay forwarding.Because block catenary system is used in relay forwarding pattern transmission information, block catenary system
Almost all of system node will all receive this Transaction Information.
Corresponding with above- mentioned information sending method, the embodiment of the present invention also provides a kind of information processing method.Fig. 3 is this
A kind of information processing method schematic flow sheet that inventive embodiments are provided, as shown in figure 3, comprising the following steps:
S301:Transmission node receives the Transaction Information that the transmission of block catenary system comes;The transacting targeted and transmission of Transaction Information
Target is different;The additional information parameter of Transaction Information is the information to be transmitted after the encryption keys using transmission objectives;Hand over
The service charge parameter of easy information is the first particular value, and the first particular value is used to indicate that the accounting nodes in block catenary system are not recorded
Transaction Information.
S302:Transmission node decrypts the additional information parameter in the first Transaction Information using own key, in successful decryption
When, extract the information content in additional information parameter.
S303:When transmission node is accounting nodes, if particular value is the first particular value, Transaction Information is not recorded.
It should be understood that transmission node is any node of non-sent side in block catenary system, it both can be transmission objectives, again
Can be with the conventional system node of right and wrong transmission objectives target.
In S301, transmission node can receive many Transaction Informations, have some to be destined to the biography in these Transaction Informations
Defeated node, there are some not to be destined to the transmission node.Unlike the prior art, the transaction letter of the embodiment of the present invention
What is ceased is transacting targeted different from transmission objectives, and the additional information parameter of Transaction Information is the encryption keys using transmission objectives
Information to be transmitted afterwards.
In S302, transmission node is after Transaction Information is received, except to judge whether oneself is friendship in Transaction Information
Easy target, will also judge whether oneself is the transmission objectives that information to be transmitted is received in Transaction Information.In institute of the embodiment of the present invention
In the Transaction Information of offer, information to be transmitted is carry in its additional information parameter, transmission node after Transaction Information is received, if
Judge oneself whether be Transaction Information transmission objectives, need to first use decryption key decryption Transaction Information in additional information ginseng
Number.Decruption key be with S202, decruption key when information to be transmitted is encrypted corresponding to used encryption key.
Optionally, transmission node can determine caller information according to the sender's public key address information carried in Transaction Information, and then
It is determined that the decruption key of encryption key corresponding with sender.
After additional information parameter is decrypted, a decrypted result can be obtained, optionally, additional information parameter is decrypted
Whether succeed can judge decrypted result according to default standard.For example, the result of successful decryption all possesses certain spy
Levy, such as first 3 are 111, or decrypted result is alphanumeric combined crosswise, or the result of successful decryption is fixed grows
The sequence of degree, or key value made an appointment etc. is included in decrypted result.Certainly, different criterions correspond to hair
The side of sending may need the certain information of correspondence increase, the embodiment of the present invention pair in additional information parameter when building Transaction Information
This is not repeated one by one.In successful decryption, the information content in decrypted result, i.e., foregoing information to be transmitted are extracted.It is optional
, in non-successful decryption, it is not the transmission objectives of the Transaction Information to illustrate this transmission node, now, using the form of broadcast
The Transaction Information is broadcasted to neighbouring transmission node.
It should be understood that transmission node is likely to be the accounting nodes of block catenary system.Therefore, in S303, if transmission node
For accounting nodes, then the particular value in the first Transaction Information determines position of first Transaction Information in processing queue, by
Particular value in the embodiment of the present invention in the first Transaction Information is the first particular value, and accounting nodes will put the first Transaction Information
In the end of processing queue, and after some time, the first Transaction Information not handled yet by accounting nodes fails, from without
Record the first Transaction Information.
In the above-described embodiments, the first Transaction Information is transacting targeted different from transmission objectives so that even if attacker's energy
The incidence relation between block catenary system interior joint address and user real identification is enough cracked, transacting targeted use can only be also obtained
Family true identity, and the user real identification of transmission objectives can not be obtained.Moreover, the first Transaction Information in the embodiment of the present invention
In there is no the address information of transmission objectives, transmission node by whether successful decryption determine whether extract additional parametric information in
The information content, rather than by recognizing that the means of transmission address determine whether to extract the information content in additional information parameter, from
Even and if there is no the address information of transmission objectives in the first Transaction Information, also can guarantee that transmission objectives can be properly received the first friendship
Information to be transmitted entrained by easy information.In addition, by the way that the service charge parameter of the first Transaction Information is set into the first particular value
To avoid the first Transaction Information from writing the public account book of block catenary system by accounting nodes, also avoid attacker and pass through public account
This malice screens the risk of Transaction Information.Therefore, the technical scheme disclosed in the embodiment of the present invention can strengthen anonymous communication
Anonymity.
Further, since the first Transaction Information need not be recorded in public account book, without to accounting nodes payment procedure expense, because
The technical scheme cost that this embodiment of the present invention is provided is lower.
During anonymous communication, if using always with a pair of encryption keys and decruption key, it can exist and be cracked
Risk.Optionally, transmission Transaction Information is all updated to current encryption key according to preset rules each time, using renewal
Information to be transmitted is encrypted encryption key afterwards.For example, current encryption key is A, preset rules are " current
Jia 2 on the basis of encryption key ", then the encryption key after updating is A+2, is carried out after a Transaction Information transmission, when again
During transmission, current encryption key is A+2, is updated according to preset rules, and the encryption key after being updated is A+4.Phase
Answer, decruption key is also required to the renewal synchronized.For example, there are default rule between system node A and system node B
Then 1, then system node A used after the information to be transmitted after receiving being encrypted according to encryption key 1 of system node B transmissions
The successful decryption of decruption key 1, and extract information to be transmitted;Afterwards, decruption key 1 is updated according to preset rules 1, obtains decryption close
Key 2, when system node B sends information to system node A again, system node B is updated to encryption key 1, is added
Key 2, information to be transmitted is encrypted using encryption key 2, afterwards, when system node A receives system node B transmissions again
After information to be transmitted after being encrypted according to encryption key 2, just it can be decrypted with decruption key 2.The encryption that dynamic updates is close
Key and decruption key can reduce the risk being cracked, so as to improve the anonymity of communication.
In block catenary system, because system node is large number of, it there is violated system node and forge Transaction Information
Problem.Optionally, after S203, in addition to:Generate public private key pair;Transaction Information is carried out using the private key in public private key pair
Signature;The public key information in public private key pair is included in Transaction Information after signature.In specific implementation process, public private key pair can
By sender according to block chain protocol generation.Accordingly, before S302, in addition to:Obtain the public key information in Transaction Information;
Public key is the public key in the public private key pair that described sender is generated;According to the signature of public key verifications Transaction Information;It is being verified
When, the additional information parameter in decrypted transaction information.In block catenary system, the private key of system node only has system node itself
Know, after being signed using private key to Transaction Information, when using public key verifications by when, just illustrate that this Transaction Information must be
Come from the corresponding system node of public key information, if because public key information is not corresponding with private key information, just can not by checking, from
And the difficulty that violated system node forges Transaction Information is substantially increased, be conducive to improving the security of the system.
In embodiments of the present invention, avoided by the way that the service charge parameter of the first Transaction Information is set into the first particular value
First Transaction Information is written into public account book, so as to improve the anonymity of communication.However, the premise that this embodiment can be realized
Be transmission objectives be in can receive the state of the first Transaction Information, such as presence.When transmission objectives is not online, its just without
Method receives the first Transaction Information, and in the above-described embodiments, sender can not but learn first after the first Transaction Information is sent
Whether Transaction Information is unfavorable for the transmission of important information by intended recipient to be transmitted.Optionally, transmission objectives is in successful decryption,
After the information content in extraction additional information parameter, in addition to:Construct the 3rd Transaction Information;The additional letter of 3rd Transaction Information
It is the response message after the encryption keys according to the sender for sending the first Transaction Information to cease parameter;Sent out to block catenary system
Send the 3rd Transaction Information.The process for constructing the 3rd Transaction Information is similar with the first Transaction Information, and difference is additional information parameter
It is different.The additional information parameter of 3rd Transaction Information is corresponding after the encryption keys of the sender through the first Transaction Information
Message, corresponding message can be specifically " 1 ", " can receive ", can with the specific form of message of other agreements or directly
Answer to information to be transmitted in the first Transaction Information etc..And for the sender of the first Transaction Information, passing through the area
Block catenary system is sent after the first Transaction Information, in addition to:The response for receiving transmission objectives transmission within a preset time interval disappears
During breath, confirm that the first Transaction Information is sent successfully.Specifically, the transaction letter that recipient is received using the decryption key decryption of itself
Breath, when successful decryption, extracts the information content in Transaction Information additional information parameter, i.e. corresponding message.By providing transmission
Target returns to the form of corresponding message to the sender of the first Transaction Information, and the sender of the first Transaction Information can be made to learn the
Whether one Transaction Information, which is transmitted target, is properly received, and improves the reliability of anonymous communication.
When the sender of the first Transaction Information does not receive the response message of transmission objectives transmission within a preset time interval,
Illustrate transmission objectives now in the state of the first Transaction Information can not be received, it is such as offline, now, and optionally, sender's weight
It is new to send the second Transaction Information;The additional information parameter of second Transaction Information is the information to be transmitted after encryption;Second transaction letter
The service charge parameter of breath is the second particular value, and the accounting nodes record second that the second particular value is used to indicate in block catenary system is handed over
Easy information.The building process of second Transaction Information is similar with the first Transaction Information, and difference is the service charge of the second Transaction Information
Parameter is the second particular value, such as high value or normal value.When accounting nodes receive the second Transaction Information, joined according to service charge
Number determines the processing sequence of the second Transaction Information, because the second particular value is high value or normal value, therefore, the second Transaction Information
It will preferentially be recorded by accounting nodes or normal recordings are in public account book.When transmission objectives recovers that the state of Transaction Information can be received
When, block catenary system is such as logged in, optionally, the second Transaction Information record of each node account book in block catenary system is extracted;Transmission
Node decrypts the additional information parameter in the second Transaction Information using own key, in successful decryption, extracts additional information ginseng
The information content in number.Wherein, in block catenary system each node account book, i.e. block catenary system public account book.Specifically, being
System node side, after a system node logs in block catenary system, travels through the Transaction Information recorded in public account book.Optionally,
The a range of Transaction Information of public account book is only traveled through, such as on time dimension, public account book record of offline period is only traveled through
Transaction Information.By above-described embodiment, even if transmission objectives, which is in, can not receive the state of the first Transaction Information, it can also lead to
The second Transaction Information of structure is crossed, the second Transaction Information is recorded in the mode of public account book so that transmission objectives reply can be received
During the state of the first Transaction Information, the second Transaction Information can be obtained from public account book, so as to avoid information to be transmitted
Lose, improve the reliability of anonymous communication system.
In order to further illustrate technical scheme that the embodiment of the present invention is provided, the embodiment of the present invention also provides following two
Possible implementation.It should be understood that following two possible implementations are simply to illustrate that what the embodiment of the present invention was provided
Technical scheme, not representing the embodiment of the present invention only includes or is only applicable to following two situations.
The first possible implementation
Fig. 4 is a kind of information transmission flow schematic diagram provided in an embodiment of the present invention, as shown in figure 4, comprising the following steps:
S401:Receive information to be transmitted and transmission objectives.
S402:Obtain the public key information of target to be transmitted.
S403:Encrypt information to be transmitted.
S404:Construct the first Transaction Information, using the information to be transmitted after encryption as the first Transaction Information additional information
Parameter, the transmission objectives of the additional information parameter of transacting targeted and the first Transaction Information of the first Transaction Information is different, and first hands over
The service charge parameter of easy information is set to 0.
S405:According to block chain agreement, public private key pair is generated.
S406:The first Transaction Information is signed using the private key in public private key pair.
S407:The first Transaction Information after signature is sent to block catenary system.
Fig. 5 is a kind of message processing flow schematic diagram provided in an embodiment of the present invention, as shown in figure 5, comprising the following steps:
S501:Receive from block catenary system and transmit the Transaction Information of coming.
S502:Verify the signature in Transaction Information.
S503:If signature verification passes through, S504 is performed, otherwise, S507 is performed.
S504:Additional information parameter in decrypted transaction information.
S505:If successful decryption, S506 is performed, otherwise, S508 is performed.
S506:Extract the information content in additional information parameter.
S507:Abandon the Transaction Information.
S508:The Transaction Information is broadcasted to adjacent node.
In the first above-mentioned possible implementation, the first Transaction Information it is transacting targeted different from transmission objectives, attack
The person of hitting can not obtain any information of transmission objectives from the first Transaction Information, so as to improve the anonymity of communication.By formality
Expense parameter is set to 0 so that the first Transaction Information will not be recorded in public account book, so as to further increase communication
Anonymity.In addition, sender is signed with private key to the first Transaction Information, and recipient only to signature verification after the
One Transaction Information is handled, and the first Transaction Information unsanctioned to signature verification is then directly abandoned, and improves attacker's forgery
The difficulty of first Transaction Information, so as to improve the security of system.
Second of possible implementation
In second of possible implementation, it is contemplated that transmission objectives is possible to that the first Transaction Information can not be received
Situation.Fig. 6 is a kind of information transmission flow schematic diagram provided in an embodiment of the present invention, as shown in fig. 6, S407 in Fig. 4 it
Afterwards, it is further comprising the steps of:
S601:Judge whether receive response message in preset time;If so, then performing S602;If it is not, then performing
S603。
S602:Confirm that the first Transaction Information is sent successfully.
S603:Construct the second Transaction Information.Using the information to be transmitted after encryption as the second Transaction Information additional information
Parameter, the transmission objectives of the additional information parameter of transacting targeted and the second Transaction Information of the second Transaction Information is different, and second hands over
The service charge parameter of easy information is set to normal value.
S604:The second Transaction Information is sent to block catenary system.
Optionally, after S603, the second Transaction Information can also be signed, to strengthen the safety of communication system
Property, do not repeat herein.
Accordingly, it is further comprising the steps of after S506 in Figure 5:
Step one:Obtain the encryption key of the first Transaction Information sender.
Step 2:Utilize the encryption keys corresponding message of sender.
Step 3:Construct the 3rd Transaction Information, using the corresponding message after encryption as the 3rd Transaction Information additional information
Parameter, transacting targeted different with the transmission objectives of the additional information parameter of the 3rd Transaction Information, the 3rd friendship of the 3rd Transaction Information
The service charge parameter of easy information is set to 0.
Step 4:The 3rd Transaction Information is sent to block chain network.
Optionally, after step 3, public private key pair can also be generated, logical to strengthen is signed to the 3rd Transaction Information
The security of letter system.
In above-mentioned second possible implementation, it is contemplated that transmission objectives is possible to that first transaction letter can not be received
The situation of breath.Compared to the first possible implementation, second of possible implementation more can guarantee that important information is certain
Intended recipient can be transmitted, the reliability of communication system is improved.
Based on identical technical concept, the embodiment of the present invention also provides a kind of information transmitting apparatus, and Fig. 7 is implemented for the present invention
A kind of dispensing device structural representation that example is provided, as shown in fig. 7, dispensing device 700 includes:Transmit-Receive Unit 701 and processing are single
Member 702, wherein,
Transmit-Receive Unit 701, information to be transmitted and transmission objectives for receiving user's input;
Processing unit 702, the encryption key for obtaining transmission objectives, and information to be transmitted is carried out using encryption key
Encryption;
Processing unit 702, be additionally operable to using the information to be transmitted after encryption as the first Transaction Information additional information parameter;
First Transaction Information it is transacting targeted different from transmission objectives;It is specific that the service charge parameter of first Transaction Information is set to first
Value, the first particular value is used to indicate that the accounting nodes in block catenary system do not record the first Transaction Information;
Transmit-Receive Unit 701, is additionally operable to send the first Transaction Information by block catenary system.
Optionally, processing unit 702 is additionally operable to:
When receiving the response message of transmission objectives transmission within a preset time interval, confirm that the first Transaction Information is sent into
Work(.
Optionally, processing unit 702 is additionally operable to:
When not receiving the response message of transmission objectives transmission within a preset time interval, the second Transaction Information is resend;
The additional information parameter of second Transaction Information is the information to be transmitted after encryption;The service charge parameter of second Transaction Information is second
Particular value, the second particular value is used to indicate that the accounting nodes in block catenary system to record the second Transaction Information.
Optionally, processing unit 702 is additionally operable to:
Generate public private key pair;
The first Transaction Information is signed using the private key in public private key pair;In the first Transaction Information after signature
Include the public key information in public private key pair.
Based on identical technical concept, the embodiment of the present invention also provides a kind of information processor, and Fig. 8 is implemented for the present invention
A kind of information processor structural representation that example is provided, as shown in figure 8, processing unit 800 includes:Transmit-Receive Unit 801 and place
Unit 802 is managed, wherein,
Transmit-Receive Unit 801, for receiving the Transaction Information that the transmission of block catenary system comes;The transacting targeted and biography of Transaction Information
Defeated target is different;The additional information parameter of Transaction Information is the information to be transmitted after the encryption keys using transmission objectives;
The service charge parameter of Transaction Information is the first particular value, and the first particular value is used to indicate that the accounting nodes in block catenary system are not remembered
Record the first Transaction Information;
Processing unit 802, for being decrypted the additional information parameter in the first Transaction Information using own key, is successfully being solved
When close, the information content in additional information parameter is extracted;
Processing unit 802, is additionally operable to when for accounting nodes, if particular value is the first particular value, does not record transaction letter
Breath.
Optionally, processing unit 802 is additionally operable to:
Construct the 3rd Transaction Information;The additional information parameter of 3rd Transaction Information is according to the hair for sending the first Transaction Information
Response message after the encryption keys for the side of sending;
The 3rd Transaction Information is sent to block catenary system.
Optionally, processing unit 802 is additionally operable to:
Extract the second Transaction Information record of each node account book in block catenary system;
The additional information parameter in the second Transaction Information is decrypted using own key, in successful decryption, additional letter is extracted
Cease the information content in parameter.
Optionally, processing unit 802 is additionally operable to:
Obtain the public key information in the first Transaction Information;Public key is the public key in the public private key pair that sender generates;
According to the signature of the Transaction Information of public key verifications first;
When being verified, the additional information parameter in the first Transaction Information is decrypted using own key.
Optionally, processing unit 802 is additionally operable to:
When decrypting failed, control Transmit-Receive Unit 801 continues to forward the first Transaction Information.
In summary, the embodiments of the invention provide a kind of method for sending information, processing method and processing device, the first transaction letter
What is ceased is transacting targeted different from transmission objectives so that even if attacker can crack block catenary system interior joint address and user is true
Incidence relation between real identity, can only also obtain transacting targeted user real identification, and can not obtain the use of transmission objectives
Family true identity.Moreover, there is no the address information of transmission objectives, transmission node in the first Transaction Information in the embodiment of the present invention
By whether successful decryption determines whether to extract the information content in additional parametric information, rather than address is transmitted by recognizing
Means determine whether to extract the information content in additional information parameter, even if so as to not have transmission objectives in the first Transaction Information
Address information, also can guarantee that transmission objectives can be properly received the information to be transmitted entrained by the first Transaction Information.In addition, passing through
The service charge parameter of first Transaction Information is set into the first particular value to avoid the first Transaction Information by accounting nodes write area
The public account book of block catenary system, also avoids the risk that attacker screens Transaction Information by public account book malice.Therefore, this hair
Technical scheme disclosed in bright embodiment can strengthen the anonymity of anonymous communication.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
, but those skilled in the art once know basic creation although preferred embodiments of the present invention have been described
Property concept, then can make other change and modification to these embodiments.So, appended claims are intended to be construed to include excellent
Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention
God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising including these changes and modification.
Claims (18)
1. a kind of method for sending information, it is characterised in that including:
Receive the information to be transmitted and transmission objectives of user's input;
The encryption key of the transmission objectives is obtained, and the information to be transmitted is encrypted using the encryption key;
Using the information to be transmitted after encryption as the first Transaction Information additional information parameter;The transaction of first Transaction Information
Target is different from the transmission objectives;The service charge parameter of first Transaction Information is set to the first particular value, described first
Particular value is used to indicate that the accounting nodes in block catenary system do not record first Transaction Information;
First Transaction Information is sent by the block catenary system.
2. the method as described in claim 1, it is characterised in that first Transaction Information is sent by the block catenary system
Afterwards, in addition to:
When receiving the response message that the transmission objectives is sent within a preset time interval, confirm that first Transaction Information is sent
Success.
3. method as claimed in claim 2, it is characterised in that also include:
When not receiving the response message that the transmission objectives is sent within a preset time interval, the second Transaction Information is resend;
The additional information parameter of second Transaction Information is the information to be transmitted after encryption;The service charge ginseng of second Transaction Information
Number is the second particular value, and second particular value is used to indicate that the accounting nodes in block catenary system to record the second transaction letter
Breath.
4. the method as described in claim 1, it is characterised in that regard the information to be transmitted after encryption as the additional of Transaction Information
After information parameter, in addition to:
Generate public private key pair;
First Transaction Information is signed using the private key in the public private key pair;Described first after signature hands over
The public key information in the public private key pair is included in easy information.
5. a kind of information processing method, it is characterised in that including:
Transmission node receives the first Transaction Information that the transmission of block catenary system comes;The transacting targeted and biography of first Transaction Information
Defeated target is different;After encryption keys of the additional information parameter of first Transaction Information to use the transmission objectives
Information to be transmitted;The service charge parameter of first Transaction Information is the first particular value, and first particular value is used to indicate institute
State the accounting nodes in block catenary system and do not record first Transaction Information;
The transmission node decrypts the additional information parameter in first Transaction Information using own key, in successful decryption
When, extract the information content in the additional information parameter.
6. method as claimed in claim 5, it is characterised in that in successful decryption, is extracted in the additional information parameter
After the information content, in addition to:
Construct the 3rd Transaction Information;The additional information parameter of 3rd Transaction Information is according to transmission first Transaction Information
Sender encryption keys after response message;
The 3rd Transaction Information is sent to the block catenary system.
7. method as claimed in claim 5, it is characterised in that also include:
The transmission node extracts the second Transaction Information record of each node account book in the block catenary system;
The transmission node decrypts the additional information parameter in second Transaction Information using own key, in successful decryption
When, extract the information content in the additional information parameter.
8. method as claimed in claim 5, it is characterised in that the transmission node is decrypted described first using own key and handed over
Before additional information parameter in easy information, in addition to:
Obtain the public key information in first Transaction Information;The public key is the public affairs in the public private key pair that described sender is generated
Key;
The signature of the first Transaction Information according to the public key verifications;
When being verified, the additional information parameter in first Transaction Information is decrypted using own key.
9. method as claimed in claim 5, it is characterised in that also include:
When decrypting failed, continue to forward first Transaction Information.
10. a kind of information transmitting apparatus, it is characterised in that including:
Transmit-Receive Unit, information to be transmitted and transmission objectives for receiving user's input;
Processing unit, the encryption key for obtaining the transmission objectives, and using the encryption key to the letter to be transmitted
Breath is encrypted;
The processing unit, be additionally operable to using the information to be transmitted after encryption as the first Transaction Information additional information parameter;Institute
State the transacting targeted different from the transmission objectives of the first Transaction Information;The service charge parameter of first Transaction Information is set to
First particular value, first particular value is used to indicate that the accounting nodes in block catenary system not to record the first transaction letter
Breath;
The Transmit-Receive Unit, is additionally operable to send first Transaction Information by the block catenary system.
11. device as claimed in claim 10, it is characterised in that the processing unit is additionally operable to:
When receiving the response message that the transmission objectives is sent within a preset time interval, confirm that first Transaction Information is sent
Success.
12. device as claimed in claim 11, it is characterised in that the processing unit is additionally operable to:
When not receiving the response message that the transmission objectives is sent within a preset time interval, the second Transaction Information is resend;
The additional information parameter of second Transaction Information is the information to be transmitted after encryption;The service charge ginseng of second Transaction Information
Number is the second particular value, and second particular value is used to indicate that the accounting nodes in block catenary system to record the second transaction letter
Breath.
13. device as claimed in claim 10, it is characterised in that the processing unit is additionally operable to:
Generate public private key pair;
First Transaction Information is signed using the private key in the public private key pair;Described first after signature hands over
The public key information in the public private key pair is included in easy information.
14. a kind of information processor, it is characterised in that including:
Transmit-Receive Unit, for receiving the first Transaction Information that the transmission of block catenary system comes;The transaction mesh of first Transaction Information
Mark is different from transmission objectives;The additional information parameter of first Transaction Information is to be added using the encryption key of the transmission objectives
Information to be transmitted after close;The service charge parameter of first Transaction Information is the first particular value, and first particular value is used for
Indicate that the accounting nodes in the block catenary system do not record first Transaction Information;
Processing unit, for decrypting the additional information parameter in first Transaction Information using own key, in successful decryption
When, extract the information content in the additional information parameter.
15. device as claimed in claim 14, it is characterised in that the processing unit is additionally operable to:
Construct the 3rd Transaction Information;The additional information parameter of 3rd Transaction Information is according to transmission first Transaction Information
Sender encryption keys after response message;
The 3rd Transaction Information is sent to the block catenary system.
16. device as claimed in claim 14, it is characterised in that the processing unit is additionally operable to:
Extract the second Transaction Information record of each node account book in the block catenary system;
The additional information parameter in second Transaction Information is decrypted using own key, in successful decryption, is extracted described attached
Plus the information content in information parameter.
17. device as claimed in claim 14, it is characterised in that the processing unit is additionally operable to:
Obtain the public key information in first Transaction Information;The public key is the public affairs in the public private key pair that described sender is generated
Key;
The signature of the first Transaction Information according to the public key verifications;
When being verified, the additional information parameter in first Transaction Information is decrypted using own key.
18. device as claimed in claim 14, it is characterised in that the processing unit is additionally operable to:
When decrypting failed, the Transmit-Receive Unit is controlled to continue to forward first Transaction Information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710494820.4A CN107172074B (en) | 2017-06-26 | 2017-06-26 | Information sending method, processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710494820.4A CN107172074B (en) | 2017-06-26 | 2017-06-26 | Information sending method, processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107172074A true CN107172074A (en) | 2017-09-15 |
CN107172074B CN107172074B (en) | 2020-06-19 |
Family
ID=59826712
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710494820.4A Active CN107172074B (en) | 2017-06-26 | 2017-06-26 | Information sending method, processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107172074B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108229958A (en) * | 2017-12-27 | 2018-06-29 | 浙商银行股份有限公司 | A kind of accounts receivable system and method based on block chain technology |
CN109034796A (en) * | 2018-06-15 | 2018-12-18 | 重庆金融资产交易所有限责任公司 | Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain |
CN109672661A (en) * | 2018-10-09 | 2019-04-23 | 中南林业科技大学 | A kind of anti-tamper concealed communication method, system and platform based on block chain |
WO2019223063A1 (en) * | 2018-05-23 | 2019-11-28 | 广州西麦科技股份有限公司 | Cloud computing network-based product transaction monitoring method and apparatus, and storage medium |
CN110516463A (en) * | 2019-09-02 | 2019-11-29 | 北京海益同展信息科技有限公司 | Method and apparatus for generating information |
CN110557359A (en) * | 2018-06-01 | 2019-12-10 | 厦门本能管家科技有限公司 | Block chain based message communication method and device |
CN111415252A (en) * | 2020-01-23 | 2020-07-14 | 众安信息技术服务有限公司 | Privacy transaction processing method and device based on block chain |
CN111460427A (en) * | 2020-02-26 | 2020-07-28 | 上海钧正网络科技有限公司 | Binding method and device of power supply equipment, storage medium and equipment |
CN111899102A (en) * | 2018-11-30 | 2020-11-06 | 创新先进技术有限公司 | Method for realizing privacy protection in block chain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20150031898A (en) * | 2013-09-17 | 2015-03-25 | 삼성전자주식회사 | Method for transmitting anonymous message and Message transmission system thereof |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
CN106385400A (en) * | 2016-08-25 | 2017-02-08 | 北京知道未来信息技术有限公司 | Bitcoin transaction network based anonymous message transmission method |
CN106779704A (en) * | 2016-12-06 | 2017-05-31 | 杭州趣链科技有限公司 | A kind of block chain anonymous deal method based on ring signatures |
WO2017095833A1 (en) * | 2015-11-30 | 2017-06-08 | Erik Voorhees | Systems and methods for improving security in blockchain-asset exchange |
-
2017
- 2017-06-26 CN CN201710494820.4A patent/CN107172074B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20150031898A (en) * | 2013-09-17 | 2015-03-25 | 삼성전자주식회사 | Method for transmitting anonymous message and Message transmission system thereof |
WO2017095833A1 (en) * | 2015-11-30 | 2017-06-08 | Erik Voorhees | Systems and methods for improving security in blockchain-asset exchange |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
CN106385400A (en) * | 2016-08-25 | 2017-02-08 | 北京知道未来信息技术有限公司 | Bitcoin transaction network based anonymous message transmission method |
CN106779704A (en) * | 2016-12-06 | 2017-05-31 | 杭州趣链科技有限公司 | A kind of block chain anonymous deal method based on ring signatures |
Non-Patent Citations (1)
Title |
---|
MATTHEW D. SLEIMAN等: "《Bitcoin Message: Data Insertion on a Proof-of-Work Cryptocurrency System》", 《2015 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW)》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108229958A (en) * | 2017-12-27 | 2018-06-29 | 浙商银行股份有限公司 | A kind of accounts receivable system and method based on block chain technology |
WO2019223063A1 (en) * | 2018-05-23 | 2019-11-28 | 广州西麦科技股份有限公司 | Cloud computing network-based product transaction monitoring method and apparatus, and storage medium |
CN110557359A (en) * | 2018-06-01 | 2019-12-10 | 厦门本能管家科技有限公司 | Block chain based message communication method and device |
CN109034796A (en) * | 2018-06-15 | 2018-12-18 | 重庆金融资产交易所有限责任公司 | Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain |
CN109034796B (en) * | 2018-06-15 | 2023-09-22 | 安达数据技术(深圳)有限公司 | Alliance chain-based transaction supervision method, electronic device and readable storage medium |
CN109672661A (en) * | 2018-10-09 | 2019-04-23 | 中南林业科技大学 | A kind of anti-tamper concealed communication method, system and platform based on block chain |
CN111899102A (en) * | 2018-11-30 | 2020-11-06 | 创新先进技术有限公司 | Method for realizing privacy protection in block chain |
CN110516463A (en) * | 2019-09-02 | 2019-11-29 | 北京海益同展信息科技有限公司 | Method and apparatus for generating information |
CN110516463B (en) * | 2019-09-02 | 2021-03-05 | 北京海益同展信息科技有限公司 | Method and apparatus for generating information |
CN111415252A (en) * | 2020-01-23 | 2020-07-14 | 众安信息技术服务有限公司 | Privacy transaction processing method and device based on block chain |
CN111460427A (en) * | 2020-02-26 | 2020-07-28 | 上海钧正网络科技有限公司 | Binding method and device of power supply equipment, storage medium and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN107172074B (en) | 2020-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107172074A (en) | A kind of method for sending information, processing method and processing device | |
CN107248994A (en) | A kind of method for sending information, processing method and processing device | |
CN109785494B (en) | Traceable anonymous electronic voting method based on block chain | |
CN110225016A (en) | A kind of data hiding transmission method based on block chain network | |
CN109741068B (en) | Online banking cross-row signing method, device and system | |
CN108737430A (en) | The encryption communication method and system of block chain node | |
CN107017993A (en) | A kind of multi-party joint key is produced and digital signature method and system | |
CN103229452A (en) | Mobile handset identification and communication authentication | |
CN109274505A (en) | A kind of anonymous electronic voting method based on block chain technology | |
CN103684798B (en) | Authentication method used in distributed user service | |
CN101547096B (en) | Net-meeting system and management method thereof based on digital certificate | |
CN108259461A (en) | A kind of method and system that credible anonymous access is realized in distributed network | |
Puthal et al. | Decision tree based user-centric security solution for critical IoT infrastructure | |
CN106385400A (en) | Bitcoin transaction network based anonymous message transmission method | |
Podolanko et al. | Countering double-spend attacks on bitcoin fast-pay transactions | |
CN110945833B (en) | Method and system for multi-mode identification network privacy protection and identity management | |
Zhu | Security control in inter-bank fund transfer | |
JP6934679B2 (en) | Blockchain transaction creation protocol and blockchain address creation method | |
CN109194487A (en) | Construction method and system are traded or communicated to my real name based on block chain | |
ShenTu et al. | Transaction remote release (TRR): A new anonymization technology for bitcoin | |
Thammarat et al. | A secure mobile payment protocol for handling accountability with formal verification | |
JP4608245B2 (en) | Anonymous communication method | |
CN103188215A (en) | Security management method and service terminal of electronic bank, and electronic bank system | |
Carbunar et al. | Tipping pennies? privately practical anonymous micropayments | |
JP2005167968A (en) | Anonymous communication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |