WO2023000353A1 - 基于区块链的信息传输方法、***、装置及存储介质 - Google Patents

基于区块链的信息传输方法、***、装置及存储介质 Download PDF

Info

Publication number
WO2023000353A1
WO2023000353A1 PCT/CN2021/108404 CN2021108404W WO2023000353A1 WO 2023000353 A1 WO2023000353 A1 WO 2023000353A1 CN 2021108404 W CN2021108404 W CN 2021108404W WO 2023000353 A1 WO2023000353 A1 WO 2023000353A1
Authority
WO
WIPO (PCT)
Prior art keywords
transmission
node
information
sender
sending
Prior art date
Application number
PCT/CN2021/108404
Other languages
English (en)
French (fr)
Inventor
周才廷
张丹东
覃业俊
田保强
王李琰
Original Assignee
深圳市信安数字科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市信安数字科技有限公司 filed Critical 深圳市信安数字科技有限公司
Priority to JP2024503849A priority Critical patent/JP2024525936A/ja
Priority to KR1020247002400A priority patent/KR20240024966A/ko
Priority to EP21950602.9A priority patent/EP4376353A1/en
Publication of WO2023000353A1 publication Critical patent/WO2023000353A1/zh
Priority to US18/417,705 priority patent/US20240163120A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • the invention belongs to the field of information transmission, and in particular relates to a block chain-based information transmission method, system, device and storage medium.
  • Blockchain is a chained data structure formed by connecting data in blocks in chronological order, and cryptographically ensures that the data cannot be tampered with and cannot be forged.
  • the present invention provides the following solutions.
  • an information transmission method based on blockchain technology including: the sender creates a letter-sending contract on the blockchain, submits a summary of the information to be transmitted to the letter-sending contract, and sends the encrypted The text, address of the recipient and the address of the sending contract are sent to the first transmission node, where the sender is registered in the first transmission node of the transmission network; the first transmission node sends the ciphertext of the information to be transmitted, the address of the recipient and the The address of the contract is sent point-to-point to the second transmission node, where the receiver is registered in the second transmission node of the transmission network; the second transmission node receives the ciphertext of the information to be transmitted and the address of the sending contract and delivers it to the receiver, and generates Receive the confirmation receipt to submit to the letter sending contract.
  • the method further includes: generating a sending confirmation receipt to submit to the letter-sending contract.
  • first transmission node and the second transmission node are the same transmission node, or the first transmission node and the second transmission node are different transmission nodes.
  • the sending contract includes preset token distribution rules and tokens submitted by the sender and/or receiver, and tokens are distributed to the first transmission node, the second transmission node and One or more of the recipients.
  • the sender has the sender's public key and the sender's private key obtained based on an asymmetric encryption algorithm, and uses the sender's public key or its abstract to identify the sender's address;
  • the receiver has the receiver's public key obtained based on an asymmetric encryption algorithm. key and the receiver's private key, using the receiver's public key or its abstract to identify the address of the receiver;
  • the transmission network includes at least two transmission nodes, each of which has a node public key and a node private key obtained based on an asymmetric encryption algorithm Key, using the node public key or its abstract to identify the node address of the transmission node; where the address of the sender, receiver and each transmission node is disclosed on the blockchain.
  • it also includes: using the node public key of each transfer node to register the root domain name on the blockchain; using the sender's sender public key to register the sender's domain name on the basis of the root domain name of the first transfer node of the transfer network; Use the recipient's public key to register the receiver's domain name based on the root domain name of the second transfer node of the transfer network; and, publish the root domain name, sender's domain name, and receiver's domain name of each transfer node on the blockchain .
  • the method further includes: the sender generates the ciphertext of the information to be transmitted, specifically including: the sender encrypts the information to be transmitted with the public key of the receiver, signs the information to be transmitted with the private key of the sender, and generates the ciphertext of the information to be transmitted Ciphertext:
  • the receiver decrypts the received ciphertext of the information to be transmitted, specifically including: the receiver uses the sender's public key to verify the ciphertext, and uses the receiver's private key to decrypt.
  • the method further includes: when the first transmission node sends information, uses its own node private key to sign and confirm the sent information to generate a sending confirmation receipt, and uploads the sending confirmation receipt to the block chain; and/or, the first transmission node 2.
  • the transmission node uses its own node private key to sign and confirm the received information to generate a receipt confirmation receipt, and upload the receipt confirmation receipt to the blockchain.
  • the method further includes: when the second transmission node delivers information to the recipient, it uses its own node private key to sign and confirm the delivery information to generate a delivery confirmation receipt, and uploads the delivery confirmation receipt to the blockchain.
  • the method further includes: before the first transfer node sends the information point-to-point to the second transfer node, check whether the letter-sending contract contains a preset number of tokens, and if not, refuse to send the information.
  • the method further includes: an information order of information sent by the first transmission node is consistent with an information order of information received by the second transmission node.
  • the sending contract also includes token collection rules, and the token collection rules are determined by one or more of the sender, the receiver, the first transmission node, and the second transmission node through negotiation; and, the token collection rules include the following Any one of them: the sender pays tokens; the recipient promises or pledges a preset amount of tokens to the second transfer node in advance; the sender and receiver share the payment of tokens.
  • the preset token distribution rules include any one of the following: when the first transmission node submits the sending confirmation receipt to the letter-sending contract, and the second transmission node submits the receipt confirmation receipt to the letter-sending contract, the Tokens are allocated to the first transmission node and the second transmission node in proportion; only when the second transmission node submits the receipt confirmation receipt to the letter-sending contract, the tokens will be distributed according to the preset value in the letter-sending contract. Token distribution rules for the distribution to the first transfer node and/or the second transfer node.
  • the method also includes: the sender and/or the receiver submits the information to be transmitted or the transmitted information to the arbitrator; the arbitrator based on the message to be transmitted or the transmitted information, the sender , the recipient, the public keys of the first transmission node and the second transmission node, and the data in the sending contract are automatically traced and cross-examined.
  • the transmission network includes an audit protocol
  • the method also includes: an audit protocol, which uses the data on the chain and the data of the letter-sending contract to audit the transmission behavior of each transmission node; if it is found that the transmission node does not transmit according to the preset sending and receiving protocol If there is no evidence, the transmission node will be removed from the transmission network or the node will be punished.
  • the transmission network is a virtual network
  • each transmission node is a virtual node.
  • the transmission network implements point-to-point transmission using any of the following communication methods: wireless communication, optical communication, satellite communication, and Internet communication.
  • it also includes: managing transmission nodes in the transmission network, specifically including any one or more of the following: removing transmission nodes that do not meet service requirements from the transmission network; Punishment; common nodes that meet the candidate conditions are allowed to become candidate nodes in the transmission network; and candidate nodes that meet the election conditions are allowed to become transmission nodes in the transmission network.
  • removing the transmission nodes that do not meet the service requirements from the transmission network also includes: when it is detected that any one or more transmission nodes of the transmission network do not perform information transmission actions as required within a specified period of time, then from the transmission network Eliminate any one or more transmission nodes.
  • punishing the violating nodes that have violation behaviors includes: after detecting that any one or more transmission nodes of the transmission network have preset violation behaviors, performing the following processing on the detected violation nodes: by the transmission network
  • the auditing party of the blockchain submits a punishment resolution against the offending node on the blockchain, and the transmission node automatically executes the relevant punishment measures according to the punishment resolution on the chain; and/or, the sender and/or the The receiving party and/or the transmission node submits violation evidence for the violation node on the block chain, and the transmission node executes punishment on the violation node according to the evidence and audit protocol.
  • ordinary nodes that meet the candidate conditions are allowed to become candidate nodes in the transmission network, which also includes: node election contracts are deployed on the blockchain, and ordinary nodes become transmission network nodes by pledging a preset number of tokens on the node election contracts. candidate nodes.
  • allowing candidate nodes that meet the election conditions to become transmission nodes in the transmission network also includes: candidate nodes that meet one or more of the following election conditions to become transmission nodes in the transmission network: transmission/connection with relevant transmission nodes The rate meets the preset conditions, and the relevant transmission node is the transmission node that has a transmission relationship with the alternative node in the transmission network; the multi-concurrent transmission rate with the relevant transmission node meets the preset conditions; within the open time window, the node election contract pledges tokens The number meets the preset conditions; the number of votes obtained from the governance committee of the transmission network meets the preset conditions; the speed of paying the preset number of tokens to the node election contract within the opening time window meets the preset conditions.
  • the second aspect provides an information transmission system based on blockchain technology, which is characterized in that it is configured to implement the information transmission method as in the first aspect, and the system includes: a sender, a receiver, a transmission network and a block chain; among them, the sender is used to create a letter-sending contract on the blockchain, submit the summary of the information to be transmitted to the letter-sending contract, and send the ciphertext of the information to be transmitted, the address of the receiver, and the address of the letter-sending contract To the first transmission node, where the sender is registered in the first transmission node of the transmission network; the first transmission node is used to send the ciphertext of the information to be transmitted, the address of the receiver and the address of the sending contract point-to-point to the second transmission node , where the receiver is registered at the second transmission node of the transmission network; the second transmission node is used to receive the ciphertext of the information to be transmitted and the address of the letter-sending contract and deliver it to the receiver, and generate a
  • an information transmission device based on blockchain technology including: at least one processor; and a memory connected to at least one processor in communication; wherein, the memory stores instructions that can be executed by at least one processor , the instructions are executed by at least one processor, so that the at least one processor can execute: the method in the first aspect.
  • a computer-readable storage medium stores a program, and when the program is executed by a multi-core processor, the multi-core processor executes the method in the first aspect.
  • This embodiment constructs a safe information transmission method, which combines the advantages of blockchain traceability, non-tampering, high-strength trusted consensus and transmission The transmission performance advantage of the network.
  • the high-reliability point-to-point transmission network is used to achieve high-efficiency information transmission, realize the safe and effective circulation of sensitive data and key digital assets, and avoid the shortcomings of blockchain networks in high-throughput and high-capacity data services.
  • Use the blockchain as a trusted bulletin board and certificate database of the transmission network, record key status data such as receipt confirmation receipts to track the information transmission chain, in order to improve the accessibility and security of information.
  • Fig. 1 is a schematic structural diagram of an information transmission system based on block chain technology according to an embodiment of the present invention
  • FIG. 2 is a schematic flow diagram of an information transmission method based on blockchain technology according to an embodiment of the present invention
  • FIG. 3 is a schematic flow diagram of an information transmission method based on blockchain technology according to an embodiment of the present invention.
  • Fig. 4 is a schematic structural diagram of an information transmission device based on blockchain technology according to another embodiment of the present invention.
  • A/B can mean A or B; "and/or” in this article is just an association relationship describing associated objects, indicating that there can be three relationships, For example, A and/or B may mean that A exists alone, A and B exist simultaneously, and B exists alone.
  • first”, “second”, etc. are used for descriptive purposes only, and should not be understood as indicating or implying relative importance or implicitly specifying the quantity of the indicated technical features. Thus, a feature defined as “first”, “second”, etc. may expressly or implicitly include one or more of that feature. In the description of the embodiments of the present application, unless otherwise specified, "plurality" means two or more.
  • Fig. 1 is an information transmission system based on blockchain technology provided by an embodiment of the present application.
  • the system mainly includes a transmission network for efficient transmission of information, and a blockchain for recording and depositing key status information of information transmission. Smart contracts on the blockchain can also be used for management fees.
  • the above-mentioned transmission network is specifically a point-to-point transmission network, which is composed of transmission nodes such as N1, N2, ..., Nx, Ny, etc., which are responsible for receiving, transmitting and routing distribution of information in the transmission network.
  • the sender A is registered with the first transfer node N1 of the transfer network, and the first transfer node N1 may also be referred to as a sender transfer node.
  • the recipient B is registered with the second transfer node N2 of the transfer network, and the second transfer node N2 may also be called a recipient transfer node. In this way, the information transmitted from the sender can be delivered to the receiver through the transmission network.
  • the information stored in the above-mentioned blockchain has the characteristics of "unforgeable”, “retaining traces throughout the process”, “traceable”, “open and transparent”, and “collective maintenance”.
  • the block chain has a list of transmission nodes and a list of sending and receiving addresses.
  • the list of transmission nodes is used to record and disclose the address of each transmission node in the transmission network, and the list of sending and receiving addresses is used to record the addresses of the public sender and receiver.
  • Fig. 2 is a schematic flow diagram of an information transmission method based on blockchain technology according to an embodiment of the present application.
  • the execution subject may be one or more electronic devices; from the perspective of program , correspondingly, the execution subject may be a program carried on these electronic devices.
  • the method provided in this embodiment may include the following steps:
  • the sender A creates a letter-sending contract on the blockchain, and submits the summary of the message m to be transmitted to the letter-sending contract.
  • the sending contract is a smart contract on the chain, which defines a set of digital agreements with specific rules, and the agreement can be enforced on the chain when the predetermined conditions are met.
  • the digest is obtained by performing a hash operation on the information m to be transmitted.
  • the sender A sends the ciphertext of the information to be transmitted, the address of the receiver B, and the address of the sending contract to the first transmission node N1.
  • the information to be transmitted specifically refers to information that can be sent and received through various information transmission means, and the information content includes but is not limited to text, pictures, audio, video, documents, etc.
  • the first transmission node N1 sends the ciphertext of the information to be transmitted, the address of the receiver, and the address of the sending contract to the second transmission node N2 point-to-point.
  • S204 may also be executed, and the first transfer node N1 generates a sending confirmation receipt to submit to the sending contract.
  • the second transmission node N2 receives the ciphertext of the information to be transmitted and the address of the sending contract, and delivers it to the recipient B.
  • the second transmission node N2 generates a receipt confirmation receipt to submit to the sending contract.
  • At least the second transmission node N2 needs to upload the receipt confirmation receipt, and optionally the first transmission node N1 can upload the transmission confirmation receipt.
  • the present invention constructs a secure information transmission method, which combines the advantages of blockchain traceability, non-tampering, high-strength trusted consensus and the transmission performance advantages of the transmission network.
  • the high-reliability point-to-point transmission network is used to achieve high-efficiency information transmission, realize the safe and effective circulation of sensitive data and key digital assets, and avoid the shortcomings of blockchain networks in high-throughput and high-capacity data services.
  • Use the blockchain as a trusted bulletin board and certificate database for the transmission network, which can be in the form of public chains, alliance chains, private chains or a mixture of chains of different forms, recording key status data such as receipt confirmation receipts to track information transmission chain in order to improve the accessibility and security of information.
  • first transmission node N1 and the second transmission node N2 are different transmission nodes.
  • first transmission node N1 and the second transmission node N2 may also be the same transmission node.
  • sender A and receiver B can be registered with the same transfer node.
  • the transfer node can at least generate a receipt confirmation receipt and upload it to the letter sending contract of the blockchain.
  • the sending contract includes token distribution rules and tokens from the sender and/or receiver, the tokens being information transfer fees paid by the sender and/or receiver.
  • the above-mentioned tokens can be obtained through public transactions, OTC transactions, and direct participation in the consensus work of the blockchain.
  • tokens can be distributed to one or more of the first transmission node, the second transmission node and the receiver according to token distribution rules, the purpose of which is to provide incentives for transmission nodes that send, receive and transmit information according to a secure communication protocol.
  • the public key and private key of the sender A, the receiver B, and each transmission node (N1, N2, ..., Nx, Ny) of the transmission network can be preset, wherein, can be obtained based on an asymmetric encryption algorithm
  • the several pairs of public keys and private keys, the public key is published on the block chain, and the private key is kept by the sender A, the receiver B and each transmission node (N1, N2, ..., Nx, Ny).
  • sender A has a sender public key and a sender private key obtained based on an asymmetric encryption algorithm, and uses the sender public key to identify the address of the sender.
  • Recipient B has a recipient public key and a recipient private key obtained based on an asymmetric encryption algorithm, and uses the recipient public key to identify the address of the recipient.
  • the transmission network includes at least two transmission nodes, each of which has a node public key and a node private key obtained based on an asymmetric encryption algorithm, and uses the node public key to identify the node address of the transmission node. Publish the address of the sender, receiver, and each transfer node on the blockchain.
  • the following steps may also be included: using the node public key of each transmission node to register the root domain name on the blockchain;
  • the domain name of the sender is registered on the basis of the root domain name of the node;
  • the domain name of the receiver is registered on the basis of the root domain name of the second transmission node of the transmission network by using the public key of the receiver; and, the root domain name of each transmission node, the sender The domain name and recipient domain name are exposed on the blockchain.
  • each transfer node registers the root domain name on the blockchain, and the sender and receiver register sub-domain names based on the root domain name of the transfer node or other sub-domain names.
  • the registration of each sub-level domain name requires the authorization of the upper-level domain name registrant.
  • the domain name rules of the sender's address and receiver's address can be similar to the existing Internet domain name rules.
  • transfer nodes and blockchain-related domain name services are responsible for providing resolution services from domain names to addresses. The difference from the Internet domain name is that when the sender and receiver register the virtual transmission network domain name, they only need to use the public key.
  • Sending and receiving address domain names are in the form of "mao.xa”, “xhs.xinan”, “boc.mars”, Wen Tianxiang. Xin'an, Dangdai Xin Qiji.dsrn, “shakespear. Xin'an”, etc.
  • a domain name corresponds to one or a series of sending and receiving addresses.
  • ".xa”, “.xinan”, and “.mars” are the root domain names belonging to the transmission nodes, such as “mao.xa” and other sub-domain names that can be registered by message senders; " is a second-level domain name or a third-level domain name registered on the basis of the message sender, and so on.
  • a step of the sender generating the ciphertext of the information to be transmitted may also be included, specifically including: the sender uses the public key of the receiver to encrypt the information to be transmitted, and uses the private key of the sender to encrypt the information to be transmitted Sign and generate the ciphertext of the information to be transmitted.
  • it may also include a step for the recipient B to decrypt the received ciphertext of the information to be transmitted, specifically including: the recipient B decrypts the ciphertext using the recipient's private key, and uses the sender's public key to decrypt the ciphertext. key for verification.
  • the sender uses the public key of the receiver to encrypt the information to be transmitted, and uses the private key of the sender to encrypt the information to be transmitted Sign and generate the ciphertext of the information to be transmitted.
  • it may also include a step for the recipient B to decrypt the received ciphertext of the information to be transmitted, specifically including: the recipient B decrypts the ciphertext using the
  • the first transmission node N1 can also check the tokens in the letter-sending contract to protect the interests of the transmission node, which specifically includes: the first transmission node N1 sends information point-to-point to the second Before the second transmission node, check whether the letter-sending contract contains a preset number of tokens, and if so, send the ciphertext of the information to be transmitted to the second transmission node N2, and refuse to send the information if it does not.
  • S204 may specifically include: when the first transfer node N1 sends information, use its own node private key to sign and confirm the sent information to generate a sending confirmation receipt, and upload the sending confirmation receipt to the block chain Sending contract.
  • the first transfer node N1 uses its own node private key to sign the sent information, and uploads the signature digest to the blockchain as a send confirmation receipt.
  • S206 may specifically include: when receiving information, the second transmission node N2 uses its own node private key to sign and confirm the received information to generate a receipt confirmation receipt, and upload the receipt confirmation receipt to the blockchain.
  • the second transfer node N2 uses its own node private key to sign the received information, and uploads the signature digest to the blockchain as a receipt confirmation receipt.
  • S206 may also include: when the second transmission node N2 delivers the information to the recipient B, use its own node private key to sign and confirm the delivery information to generate a delivery confirmation receipt, and upload the delivery confirmation receipt to the district blockchain.
  • the second transfer node N2 uses its own node private key to sign the delivery information, and uploads the signature digest as a delivery confirmation receipt to the blockchain.
  • S207 can also be executed, that is, to use the receiver's key to sign and confirm the read information to generate Read the confirmation receipt, and upload the read confirmation receipt to the letter sending contract of the blockchain.
  • the transmission node in the transmission network when the transmission node in the transmission network sends and receives each information, it needs to use its private key to sign and confirm the sending and receiving actions of the information, and record the signature on the blockchain as the receipt and sending receipt of the message, and the above Receipts all contain timestamp information at the time of signing.
  • the state information of the whole process of the information to be transmitted from the sender to each transmission node in the transmission network to the receiver is recorded on the blockchain.
  • the sender transmission node when the information is numbered in sequence according to the sending order (T1, T2, ... Tn; T1 ⁇ T2 ⁇ ... ⁇ Tn), when the sender transmission node sends the message, it needs to sign and confirm the T1, T2, ... Tn pieces of information in sequence ; At the receiver's transmission node, the message is also signed in accordance with the above sequence. In addition, the receiving transmission node must sign and confirm the received information (that is, it must issue a receipt confirmation receipt). In a word, the order of sending and receiving information can be coordinated by the transmission nodes, so as to ensure that the order of sending and receiving information of each transmission node is consistent.
  • the letter sending contract in this embodiment specifies the token collection rules and the token distribution mechanism, wherein the token collection rules refer to the rules for the sender and/or receiver to pay tokens to the letter sending contract deployed on the blockchain.
  • the coin distribution mechanism refers to the rules for the transmission nodes and receivers who perform information transmission tasks to obtain token rewards.
  • the token collection rules may be determined through negotiation among one or more of the sender, the receiver, the first transfer node, and the second transfer node.
  • the token collection rules include any one or more of the following: the sender pays tokens; the receiver promises or pledges a preset amount of tokens to the second transfer node in advance; the sender and receiver share the tokens.
  • the cost that the information sender needs to pay when transmitting information can be decided by the transfer node through negotiation and voting, or can be determined by the receiver or sender of the information.
  • the receiver is an information collector
  • the receiver is more willing to pay the cost of information transmission. That is, the receiver promises or pledges the corresponding tokens to the receiver transfer node in advance to pay for the information transfer fee.
  • Both the sender and the sender pay the fee. For example, if the sender and the sender of the information transmit information of equal value, such as completing the asset transaction through information transmission, both parties can each bear part of the information transmission fee in the transmission of transaction information.
  • the preset token distribution rules may include any of the following rules: (1) The first transmission node submits the sending confirmation receipt to the letter-sending contract, and the second transmission node submits the sending confirmation receipt to the letter-sending contract After submitting the receipt confirmation receipt, the tokens will be allocated to the first transmission node and the second transmission node in proportion; The preset token distribution rules are distributed to the first transfer node and/or the second transfer node.
  • the following steps may be performed: the sender and/or the receiver submits the information to be transmitted or the transmitted information to the arbitrator; the arbitrator Based on the message to be transmitted or the transmitted information, the public keys of the sender, the receiver, the first transmission node and the second transmission node, and the data in the letter-sending contract are traced and cross-examined.
  • the arbitrator can make a ruling on the fact that the node refuses to send information, the information that has been sent and received, the consistency of the information, and the time when the information was sent. For example, take sender A sending information m to receiver B as an example. In the whole process of information m from the sender to the transmission network to the receiver, the summary of the sender's information m is uploaded to the chain, and the transmission node sends a confirmation receipt and receives The confirmation receipt is uploaded to the chain, and the confirmation receipt is read and uploaded to the chain by the receiver.
  • the above-mentioned data are publicized in the letter-sending contract on the chain and recorded in a form that cannot be tampered with.
  • A can submit the information m to the arbitrator for cross-examination. Since the sender’s public key and the receiver’s public key are publicly available, the transmission node The public key is also publicly available, so the arbitrator can automatically and automatically complete the evidence chain traceability, audit, and give the verdict immediately. Similarly, after receiving the information, the receiver B can submit the information m to the arbitrator for cross-examination.
  • sender A sends information m to receiver B through a virtual transmission network, and five virtual (logical) transmission nodes P1, P2, P3, P4, and P5 constitute the virtual transmission network.
  • the following a ⁇ h show the complete sending and receiving process of one-way information.
  • the sender A creates a letter-sending contract CA on the blockchain, and deposits the tokens it pays in the letter-sending contract CA, and the amount of deposited tokens is Ta; among them, the letter-sending contract CA can agree: message m ab (only the digest or hash of the message m and m ab is recorded in the contract) the originating node sends the message to the transmission node where the target address is located, and after the target node submits the confirmation receipt to the contract, the originating node and the target node each get 50% of Ta.
  • message m ab only the digest or hash of the message m and m ab is recorded in the contract
  • the sender A sends the message ma ab to P1, and informs P1 of the contract address CA;
  • the transmission node P1 checks that the tokens in the contract address CA are sufficient, sends a message to the transmission node P3, and submits the sending confirmation receipt of the message to the sending contract CA;
  • the transmission node P3 After the transmission node P3 receives the information m ab , it automatically delivers the information m ab to the recipient B, and submits the received and delivered receipt confirmation receipt and/or delivery confirmation receipt to CA;
  • Ta is automatically assigned to 50% of the sending node P1 and 50% of the receiving node P2 according to the agreement.
  • the corresponding amount of tokens can be withdrawn from the contract;
  • Receiver B receives m ab , uses A's public key A pub to verify the signature, uses its own private key B priv to decrypt, and obtains message m.
  • the transmission network can be a point-to-point transmission network composed of virtual transmission nodes, and a network connection capable of direct and efficient communication is established between any transmission nodes for information transmission in the virtual network (or logical network).
  • the transmission network can use any of the following communication methods to realize point-to-point transmission: wireless communication, optical communication, satellite communication, and Internet communication.
  • the transmission network can include the following three governance methods: (1) Governance committee.
  • the governance committee is established by all parties involved in network governance.
  • the entry of virtual transmission nodes is decided by the committee by voting.
  • the specific participation rules can be determined by the governance committee.
  • the centralized service platform is responsible for organizing and managing transmission nodes, and the governance rules are determined by the service platform itself.
  • (3) Distributed autonomy that is, network governance with a specific community autonomy rule.
  • the participating nodes pledge a certain amount of tokens on the chain according to the agreement of the community, those whose pledge amount reaches the standard can be selected as transmission nodes; during the service process of transmission nodes, if they cannot meet the service standard requirements agreed by the community, they will be rejected
  • the list of transmission nodes is automatically removed; in order to maintain the sustainable distributed autonomy of the community, transmission nodes can pay service tax to the community in the form of tokens during the service period.
  • the transmission nodes in order to maintain the normal operation of the transmission network and ensure its efficiency, can be managed in the transmission network, specifically including any one or more of the following: transfer the transmission nodes that do not meet the service requirements from the transmission Removing from the network; punishing offending nodes with violations; permitting ordinary nodes meeting candidate conditions to become candidate nodes in the transmission network; and permitting candidate nodes meeting election conditions to become transmission nodes in the transmission network.
  • the following steps may be further performed: when it is detected that any one or more transmission nodes of the transmission network do not meet the service requirements within a specified period of time
  • Executing an information transmission action means removing the arbitrary one or more transmission nodes from the transmission network.
  • the first transmission node N1 does not meet the service standard, and its It is excluded from the transmission network, and other candidate nodes can replace the first transmission node N1 to provide transmission services.
  • the transmission network includes an audit protocol, which uses the data on the chain and the data of the letter-sending contract to audit the transmission behavior of each transmission node; , remove the transmission node from the transmission network or carry out node penalty.
  • the audit protocol can be delegated by the transport network's governance committee.
  • the preset sending and receiving protocol includes, but is not limited to, the transmission protocol of the transmission node specified in S201-S206 above. If a transmission node is found that does not transmit evidence according to the preset sending and receiving protocol, the transmission node can be automatically disqualified or punished, and a new node can be replaced according to the node replacement rules.
  • the violating nodes with violations are punished, and the violating nodes in the transmission network are managed in an orderly manner. After any one or more transmission nodes of the transmission network are detected to have preset violations, Perform the following processing on detected offending nodes:
  • the auditor of the transmission network submits a punishment resolution for the offending node on the blockchain, and the transmission node automatically executes the relevant punishment measures according to the punishment resolution on the chain; and/or,
  • penalties are imposed on violating nodes, and the violating nodes may be removed from the transmission network and/or token fines may be paid.
  • the token fine paid can be regarded as the security deposit submitted to the blockchain in advance by the offending node.
  • the transmission network in this embodiment is a permissioned access network.
  • candidate transmission nodes can only access the transmission network to participate in the sending and receiving of information after being approved by the network operator.
  • the transmission node list is distributed to each transmission node synchronously by the network operator.
  • a node election contract can be deployed on the blockchain, and ordinary nodes can pledge a preset amount of Tokens to become candidate nodes for the transfer network.
  • the node election contract stipulates that within the open application time frame, candidates who meet one or more of the following selection conditions A node becomes a transit node of the transit network:
  • the transmission/connection rate with the relevant transmission node satisfies the preset condition, and the relevant transmission node is a transmission node that has a transmission relationship with the replacement node in the transmission network.
  • the candidate node with the highest transmission/connection rate with the relevant transfer node may be selected as the new transfer node.
  • the multi-concurrent transmission rate between the relevant transmission nodes meets the preset conditions; for example, the candidate node with the highest multi-concurrent (such as simultaneous transmission of 10 large-capacity messages) transmission rate between the relevant transmission nodes can be selected as New transfer node.
  • the following selection methods are also considered:
  • the number of tokens pledged to the node election contract within the opening time window meets the preset conditions; for example, a certain amount of tokens pledged on the chain can be qualified as a candidate node.
  • the candidate node with the largest number of pledges will be the new transfer node, or one or more of the multiple candidate nodes that meet the token pledge quantity conditions will be randomly selected as the new transfer node.
  • the speed of paying the preset amount of tokens to the node election contract within the opening time window meets the preset conditions. For example, a candidate node can pay a certain amount of tokens to the chain (contract) within the opening time window, and the candidate node with the fastest payment can be selected as a new transmission node.
  • the candidate node After satisfying any one or more of the above conditions and obtaining the permission of the operator, the candidate node can become a new transmission node of the transmission network.
  • the candidate node Nz can replace the transmission node Ny, and obtain all the data transmitted by the replacement transmission node Ny, and the transmission network operator broadcasts the public key of the newly selected transmission node in the network and sends it to the running For all transfer nodes, the public key of the newly selected transfer node will also be uploaded to the blockchain.
  • the sender A when the sender A inquires about the letter-sending contract, it finds that the letter-sending contract includes the sending confirmation receipt of the message m to be transmitted by the first transmission node, but does not include the receipt confirmation receipt of the message m to be transmitted by the second transmission node , and the information m to be transmitted has been transmitted for a period of time, it can be considered that the second transmission node fails, and the sender A can resend the information m to be transmitted.
  • the information transmission method provided in this embodiment can be applied to a variety of use scenarios that need to ensure communication security and information integrity, thereby improving information transmission security, and realizing automatic certificate storage and efficient cross-examination, which has wide application value.
  • the information transmission method provided in this embodiment can be applied to secure encrypted communication scenarios.
  • each operator network node can participate in the task of undertaking the transmission node ;
  • the information transmission method provided in this embodiment can be applied to the contract dispute scenario of business cooperation.
  • a and B are respectively parties A and B of business cooperation
  • both parties can Through the Internet or a dedicated network line set up by itself, and each setting up a transmission node, the transmission method of the present invention is used to realize the two-way safe delivery of key information. If the two parties have a dispute over the key information delivery time clause in the business contract, since the content recorded on the chain cannot be tampered with, the arbitrator can automatically complete the dispute ruling based on the information on the chain. During the adjudication process, in some cases, the content of the delivered message is not disclosed publicly.
  • the sender A and the receiver B can sign and confirm the encrypted message content, and the arbitrator only needs to verify the information summary, transmission time and sending and receiving confirmation status recorded by the transmission node on the chain to complete the corresponding ruling , the arbitrator does not need to know the original content of the message in this process.
  • the information transmission method provided in this embodiment can be applied to the transmission of key technical documents or creative manuscripts, the secure transmission of medical data, the sending and receiving of cross-border confidential information, and the like.
  • the information transmission method provided in this embodiment can be applied to the safe remote control of equipment.
  • the method of the present invention can ensure that the operation terminal and Establish secure and efficient communication between remote devices. That is, based on the high-speed transmission network, set up at least two secure transmission nodes and a basic service chain, respectively establish communication connections between the operation terminal and the remote device through the secure transmission node, and then perform safe and efficient control and realize control over the equipment. Command data audit. In the event of operational accidents, reliable and traceable safety data can be provided.
  • the information transmission method provided in this embodiment can be applied to secure communication scenarios between devices.
  • self-service and autonomous machines and devices are gradually diversified, and there are more and more collaborative scenarios between machines and devices.
  • the present invention can play a huge role in the coordination between machine equipment. Since the collaboration between machines is efficient and automatic, if the communication between machines is hijacked by cyber attacks or hackers, it will have immeasurable adverse effects.
  • the present invention can support the establishment of auditable, safe and reliable communication connections between machines, and the communication system constructed by the present invention can be used to complete the sending and receiving of cooperative messages and the transmission of instructions between machines, thereby ensuring safe cooperation between machines.
  • first and second are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance or implicitly specifying the quantity of indicated technical features.
  • the features defined as “first” and “second” may explicitly or implicitly include at least one of these features.
  • “plurality” means at least two, such as two, three, etc., unless otherwise specifically defined.
  • Fig. 1 is a schematic structural diagram of an information transmission system based on blockchain technology provided by an embodiment of the present invention.
  • the information transmission system based on block chain technology includes: sender A, receiver B, transmission network (N1, N2, ..., Nx, Ny) and block chain; wherein, sender A is registered in the transmission
  • the first transmission node N1 of the network and the receiver B are registered with the second transmission node N2 of the transmission network, so that information transmitted from the sender can be delivered to the receiver through the transmission network.
  • the sender A is used to create a letter-sending contract on the blockchain, submit the summary of the information to be transmitted to the letter-sending contract, and send the ciphertext of the information to be transmitted, the address of the receiver and the address of the letter-sending contract to the first transmission node.
  • the first transmission node is used to send the ciphertext of the information to be transmitted, the address of the receiver, and the address of the letter-sending contract to the second transmission node point-to-point, and generate a sending confirmation receipt to submit to the letter-sending contract.
  • the second transmission node is used to receive the ciphertext of the information to be transmitted and the address of the letter-sending contract and deliver it to the recipient, and generate a confirmation receipt for submission to the letter-sending contract.
  • the information transmission system based on blockchain technology in the embodiment of the present application can realize the various processes of the foregoing embodiment of the information transmission method based on blockchain technology, and achieve the same effect and function. repeat.
  • Fig. 4 is an information transmission device based on blockchain technology according to an embodiment of the present application, which is used to execute the information transmission method based on blockchain technology shown in Fig. 2, the device includes: at least one processor; and, A memory connected in communication with at least one processor; wherein, the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor, so that the at least one processor can execute the methods described in the above embodiments.
  • a non-volatile computer storage medium of an information transmission method based on blockchain technology on which computer-executable instructions are stored, and the computer-executable instructions are set to Execute: the method described in the above embodiment.
  • the device, device, and computer-readable storage medium provided in the embodiments of the present application correspond to the method one-to-one. Therefore, the device, device, and computer-readable storage medium also have beneficial technical effects similar to their corresponding methods.
  • the beneficial technical effect of the method has been described in detail, therefore, the beneficial technical effect of the device, equipment and computer-readable storage medium will not be repeated here.
  • the embodiments of the present invention may be provided as methods, systems or computer program products. Accordingly, the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • a computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions
  • the device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • Memory may include non-permanent storage in computer-readable media, in the form of random access memory (RAM) and/or nonvolatile memory such as read-only memory (ROM) or flash RAM. Memory is an example of computer readable media.
  • RAM random access memory
  • ROM read-only memory
  • flash RAM flash random access memory
  • Computer-readable media including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information.
  • Information may be computer readable instructions, data structures, modules of a program, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Flash memory or other memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cartridge, tape magnetic disk storage or other magnetic storage device or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
  • PRAM phase change memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • RAM random access memory
  • ROM read only memory
  • EEPROM Electrically Erasable Programmable Read-

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明提供了基于区块链技术的信息传输方法、***、装置及可读存储介质,该方法包括:发送方在区块链上创建发信合约,将待传输信息的摘要提交至发信合约,并将待传输信息的密文、接收方地址和发信合约的地址发送给第一传输节点;第一传输节点将待传输信息的密文、接收方地址和发信合约的地址点对点发送给第二传输节点;第二传输节点接收待传输信息的密文和发信合约的地址并投递给接收方,并生成接收确认回执以提交至发信合约。利用上述方法,能够结合了区块链可追溯、不可篡改、高强度可信共识的优势以及点对点传输网络的传输性能优势,实现高效率且高可靠的信息传递。

Description

基于区块链的信息传输方法、***、装置及存储介质 技术领域
本发明属于信息传输领域,具体涉及基于区块链的信息传输方法、***、装置及存储介质。
背景技术
本部分旨在为权利要求书中陈述的本发明的实施方式提供背景或上下文。此处的描述不因为包括在本部分中就承认是现有技术。
区块链是将数据以区块的方式按时间顺序相连形成的一种链式数据结构,并以密码学方式保证数据的不可篡改和不可伪造的分布式账本。
在个人和组织逐步全面进入数字化的时代,个人和组织的日常生活、运营、业务流程都在数字世界(云服务环境)完成:内部沟通更加高效、灵活,团队间的协作也更方便。然而,在个人与组织充分享受数字化便利的同时,个人与个人间、组织与组织间、个人与组织间,信息交互的安全也面临较大的潜在威胁与挑战。
目前,个人间的信息交互、企业内部和企业间的信息交互,依赖于单一主体产品提供的线上服务,交互的信息内容涉及个人隐私、商业秘密、乃至商业资产。换言之,个人的数据和隐私安全、企业的信息安全、数字资产安全、知识产权安全在现有服务体系下高度依赖第三方,存在巨大的信息泄露和“单点故障风险”,对个人的隐私保护、企业的日常运营、商业秘密和关键数字资产的安全防护构成极大风险和挑战。
发明内容
针对上述现有技术中存在的问题,提出了一种基于区块链技术的信息传输方法、***、装置及计算机可读存储介质,利用这种方法、***、装置及计算机可读存储介质,能够解决上述问题。
本发明提供了以下方案。
第一方面,提供一种基于区块链技术的信息传输方法,包括:发送方在区块链上创建发信合约,将待传输信息的摘要提交至发信合约,并将待传输信息的密文、接收方地址和发信合约的地址发送给第一传输节点,其中,发送方注册于传输网络的第一传输节点;第一传输 节点将待传输信息的密文、接收方地址和发信合约的地址点对点发送给第二传输节点,其中,接收方注册于传输网络的第二传输节点;第二传输节点接收待传输信息的密文和发信合约的地址并投递给接收方,并生成接收确认回执以提交至发信合约。
进一步,第一传输节点将待传输信息的密文、接收方地址和发信合约的地址点对点发送给第二传输节点之时或之后,方法还包括:生成发送确认回执以提交至发信合约。
进一步,第一传输节点和第二传输节点为同一传输节点,或者,第一传输节点和第二传输节点为不同传输节点。
进一步地,发信合约包括预设的代币分配规则和发送方和/或接收方提交的代币,并根据预设代币分配规则将代币分配给第一传输节点、第二传输节点和接收方中的一个或多个。
进一步地,发送方具有基于非对称加密算法获得的发送方公钥和发送方私钥,利用发送方公钥或其摘要标识发送方的地址;接收方具有基于非对称加密算法获得的接收方公钥和接收方私钥,利用接收方公钥或其摘要标识接收方的地址;传输网络包括至少两个传输节点,其中每个传输节点各自具有基于非对称加密算法获得的节点公钥和节点私钥,利用节点公钥或其摘要标识传输节点的节点地址;其中,发送方、接收方和每个传输节点的地址公开在区块链上。
进一步地,还包括:利用每个传输节点的节点公钥在区块链上注册根域名;利用发送方的发送方公钥在传输网络的第一传输节点的根域名基础上注册发送方域名;利用接收方的接收方公钥在传输网络的第二传输节点的根域名基础上注册接收方域名;以及,将每个传输节点的根域名、发送方域名和接收方域名公开在区块链上。
进一步地,方法还包括:发送方生成待传输信息的密文,具体包括:发送方利用接收方公钥对待传输信息进行加密,并利用发送方私钥对待传输信息进行签名,生成待传输信息的密文;接收方对接收到的待传输信息的密文进行解密,具体包括:接收方利用发送方公钥对密文进行验签,并利用接收方私钥进行解密。
进一步地,方法还包括:第一传输节点在发送信息时,利用自身的节点私钥对发送信息进行签名确认以生成发送确认回执,并将发送确认回执上传至区块链;和/或,第二传输节点在接收信息时,利用自身的节点私钥对接收信息进行签名确认以生成接收确认回执,将接收确认回执上传至区块链。
进一步地,方法还包括:第二传输节点在向接收方投递信息时,利用自身的节点私钥对投递信息进行签名确认以生成投递确认回执,将投递确认回执上传至区块链。
进一步地,方法还包括:第一传输节点在将信息点对点发送给第二传输节点之前,检查发信合约是否包含预设数量的代币,如不包含则拒绝发送信息。
进一步地,方法还包括:第一传输节点发送信息的信息次序和第二传输节点接收信息的信息次序保持一致。
进一步地,发信合约还包括代币收取规则,代币收取规则由发送方、接收方、第一传输节点、第二传输节点中的一个或多个协商确定;以及,代币收取规则包括以下中的任意一种:由发送方支付代币;由接收方向第二传输节点事先承诺或质押预设数额的代币;由发送方和接收方分担支付代币。
进一步地,预设代币分配规则包括以下中的任意一种:当第一传输节点向发信合约内提交发送确认回执,且第二传输节点向发信合约内提交接收确认回执后,将代币按比例分配给第一传输节点和第二传输节点;仅当所述第二传输节点向所述发信合约内提交所述接收确认回执后,将所述代币按发信合约内预设的代币分配规则,分配给第一传输节点和/或第二传输节点。
进一步地,当发送方和接收方产生争议时,方法还包括:发送方和/或接收方将待传输信息或已传输信息提交至仲裁方;仲裁方基于待传输消息或已传输信息,发送方、接收方、第一传输节点和第二传输节点的公钥,以及发信合约中的数据进行自动溯源和质证。
进一步地,传输网络包括审计协议,方法还包括:审计协议,其利用链上数据和发信合约的数据对每个传输节点的传输行为进行审计;若发现传输节点未按预设收发协议进行传输的证据,则从传输网络中剔除传输节点或进行节点处罚。
进一步地,传输网络为虚拟网络,其中每个传输节点为虚拟节点。
进一步地,传输网络利用以下任意一种通信方式实现点对点传输:无线通信、光通信、卫星通信、互联网通信。
进一步地,还包括:在传输网络中对传输节点进行管理,具体包括以下中的任意一种或多种:将不符合服务要求的传输节点从传输网络中剔除;对存在违规行为的违规节点进行惩罚;许可满足候选条件的普通节点成为传输网络中的候选节点;以及,许可满足竞选条件的候选节点成为传输网络中的传输节点。
进一步地,将不符合服务要求的传输节点从传输网络中剔除,还包括:当检测到传输网络的任意一个或多个传输节点在指定时间段内未按要求执行信息传输动作,则从传输网络中剔除任意一个或多个传输节点。
进一步地,对存在违规行为的违规节点进行惩罚,包括:当检测到传输网络的任意一个或多个传输节点发生预设违规行为之后,对检测到的违规节点执行以下处理:由所述传输网络的审计方在所述区块链上提交针对所述违规节点的惩罚决议,并由传输节点按照上链的惩罚决议自动执行相关惩处措施;和/或,由所述发送方和/或所述接收方和/或所述传输节点 在所述区块链上提交针对所述违规节点的违规证据,传输节点根据证据和审计协议对所述违规节点执行惩罚。
进一步地,许可满足候选条件的普通节点成为传输网络中的候选节点,还包括:区块链上部署有节点竞选合约,普通节点通过在节点竞选合约上质押预设数量的代币,成为传输网络的候选节点。
进一步地,许可满足竞选条件的候选节点成为传输网络中的传输节点,还包括:满足以下一种或多种竞选条件的候选节点成为传输网络的传输节点:与相关传输节点之间的传输/连接速率满足预设条件,相关传输节点为传输网络中与替代节点发生传输关系的传输节点;与相关传输节点间的多并发传输速率满足预设条件;在开放时间窗口内向节点竞选合约质押代币的数量满足预设条件;获得传输网络的治理委员会的投票数满足预设条件;在开放时间窗口内向节点竞选合约支付预设数量的代币的速度满足预设条件。
第二方面,提供一种基于区块链技术的信息传输***,其特征在于,被配置为用于执行如第一方面的信息传输方法,***包括:发送方、接收方、传输网络和区块链;其中,发送方,用于在区块链上创建发信合约,将待传输信息的摘要提交至发信合约,并将待传输信息的密文、接收方地址和发信合约的地址发送给第一传输节点,其中发送方注册于传输网络的第一传输节点;第一传输节点,用于将待传输信息的密文、接收方地址和发信合约的地址点对点发送给第二传输节点,其中接收方注册于传输网络的第二传输节点;第二传输节点,用于接收待传输信息的密文和发信合约的地址并投递给接收方,并生成接收确认回执以提交至发信合约。
第三方面,提供一种基于区块链技术的信息传输装置,包括:至少一个处理器;以及,与至少一个处理器通信连接的存储器;其中,存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器能够执行:如第一方面的方法。
第四方面,提供一种计算机可读存储介质,计算机可读存储介质存储有程序,当程序被多核处理器执行时,使得多核处理器执行如第一方面的方法。
本申请实施例采用的上述至少一个技术方案能够达到以下有益效果:本实施例构建了一种安全的信息传递方法,结合了区块链可追溯、不可篡改、高强度可信共识的优势以及传输网络的传输性能优势。其中,利用高可靠的点对点传输网络实现高效率信息传递,实现敏感数据和关键数字资产安全有效流转,避免区块链网络在高通量高容量数据业务上的短板。利用区块链作为传输网络的可信公告板和存证数据库,记录诸如接收确认回执等关键状态数据以追踪信息传输链,以期提高信息的可达性和安全性。
应当理解,上述说明仅是本发明技术方案的概述,以便能够更清楚地了解本发明的技术手段,从而可依照说明书的内容予以实施。为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举例说明本发明的具体实施方式。
附图说明
通过阅读下文的示例性实施例的详细描述,本领域普通技术人员将明白本文所述的优点和益处以及其他优点和益处。附图仅用于示出示例性实施例的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的标号表示相同的部件。在附图中:
图1为根据本发明一实施例的基于区块链技术的信息传输***的结构示意图;
图2为根据本发明一实施例的基于区块链技术的信息传输方法的流程示意图;
图3为根据本发明一实施例的基于区块链技术的信息传输方法的流程示意图;
图4为根据本发明又一实施例的基于区块链技术的信息传输装置的结构示意图。
在附图中,相同或对应的标号表示相同或对应的部分。
具体实施方式
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
在本申请实施例的描述中,应理解,诸如“包括”或“具有”等术语旨在指示本说明书中所公开的特征、数字、步骤、行为、部件、部分或其组合的存在,并且不旨在排除一个或多个其他特征、数字、步骤、行为、部件、部分或其组合存在的可能性。
除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。
术语“第一”、“第二”等仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”等的特征可以明示或者隐含地包括一个或者更多个该特征。在本申请实施例的描述中,除非另有说明,“多个”的含义是两个或两个以上。
本申请中的所有代码都是示例性的,本领域技术人员根据所使用的编程语言,具体的需求和个人习惯等因素会在不脱离本申请的思想的条件下想到各种变型。
另外还需要说明的是,在不冲突的情况下,本发明中的实施例及实施例中的特征可以相互组合。下面将参考附图并结合实施例来详细说明本发明。
图1是本申请一实施例提供的基于区块链技术的信息传输***。该***主要包括用于高效率传输信息的传输网络,以及用于对信息传输的关键状态信息进行记录存证的区块链,该区块链上的智能合约还可以用于管理费用。
上述传输网络具体是点对点传输网络,由N1、N2、…、Nx、Ny等负责传输网络中信息的接收传递和路由分发的传输节点构成。任意传输节点间建立可直接、高效通信的网络连接。基于此,发送方A注册于传输网络的第一传输节点N1,第一传输节点N1也可称为发送方传输节点。接收方B注册于传输网络的第二传输节点N2,第二传输节点N2也可称为接收方传输节点。从而可以实现从发送方传输信息通过传输网络投递至接收方。
上述区块链中存储的信息具有“不可伪造”、“全程留痕”、“可追溯”、“公开透明”、“集体维护”等特征。该区块链上存有传输节点列表和收发地址列表,传输节点列表用于记录公开该传输网络中每个传输节点的地址,收发地址列表用于记录公开发送方和接收方的地址。
本申请各个实施例以基于区块链技术的信息传输方法应用于图1中的基于区块链技术的信息传输***为例进行说明。
图2为根据本申请一实施例的基于区块链技术的信息传输方法的流程示意图,在该流程中,从设备角度而言,执行主体可以是一个或者多个电子设备;从程序角度而言,执行主体相应地可以是搭载于这些电子设备上的程序。
如图2所示,本实施例提供的方法可以包括以下步骤:
S201、发送方A在区块链上创建发信合约,将待传输信息m的摘要提交至发信合约。该发信合约是一种链上智能合约,其定义一组具有特定规则的数字化协议,且该协议能够在满足既定条件时在链上被强制执行。其中,该摘要是对待传输信息m进行哈希运算得到。
S202,发送方A将待传输信息的密文、接收方B地址和发信合约的地址发送第一传输节点N1。该待传输信息具体是指可通过各种信息传输手段收发的信息,信息内容包括但不限于文本、图片、音频、视频、文档等。
S203、第一传输节点N1将待传输信息的密文、接收方地址和发信合约的地址点对点发送给第二传输节点N2。
可选地,在S203的同时或之后,还可以执行S204、第一传输节点N1生成发送确认回执以提交至发信合约。
S205、第二传输节点N2接收待传输信息的密文和发信合约的地址并投递给接收方B。
S206、第二传输节点N2生成接收确认回执以提交至发信合约。
可以理解,为了可靠地获取传输节点执行的状态信息,至少需要由第二传输节点N2上传接收确认回执,并可选地可以由第一传输节点N1上传发送确认回执。
综上,本发明构建了一种安全的信息传递方法,结合了区块链可追溯、不可篡改、高强度可信共识的优势以及传输网络的传输性能优势。其中,利用高可靠的点对点传输网络实现高效率信息传递,实现敏感数据和关键数字资产安全有效流转,避免区块链网络在高通量高容量数据业务上的短板。利用区块链作为传输网络的可信公告板和存证数据库,可以是公有链、联盟链、私有链或多种不同形态链混合的形式,记录诸如接收确认回执等关键状态数据以追踪信息传输链,以期提高信息的可达性和安全性。
在上述实施例中,示出了第一传输节点N1和第二传输节点N2为不同传输节点的示例。然而应当理解,在另外的实施例中,第一传输节点N1和第二传输节点N2也可以是同一传输节点。换言之,发送方A和接收方B可以注册于同一传输节点。在此情况下,可以由该传输节点至少生成接收确认回执,并上传至区块链的发信合约。
在一些实施方式中,该发信合约包括代币分配规则和来自发送方和/或接收方的代币,该代币是发送方和/或接受方支付的信息传递费用。例如,可通过公开交易、OTC交易、直接参与区块链的共识工作获得上述代币。并且,可以根据代币分配规则将代币分配给第一传输节点、第二传输节点和接收方中的一个或多个,其目的在于为按安全通讯协议收发和传递信息的传输节点提供激励。
在一些实施方式中,可以预先设置发送方A、接收方B和传输网络的各个传输节点(N1、N2、…、Nx、Ny)的公钥和私钥,其中,可以基于非对称加密算法获得该若干对公钥和私钥,公钥公开在区块链上,私钥由发送方A、接收方B和各个传输节点(N1、N2、…、Nx、Ny)各自保管。具体地,发送方A具有基于非对称加密算法获得的发送方公钥和发送方私钥,利用发送方公钥标识发送方的地址。接收方B具有基于非对称加密算法获得的接收方公钥和接收方私钥,利用接收方公钥标识接收方的地址。传输网络包括至少两个传输节点,其中每个传输节点各自具有基于非对称加密算法获得的节点公钥和节点私钥,利用节点公钥标识传输节点的节点地址。将发送方、接收方和每个传输节点的地址公开在区块链上。
在一些实施方式中,在上述S201之前,还可以包括以下步骤:利用每个传输节点的节点公钥在区块链上注册根域名;利用发送方的发送方公钥在传输网络的第一传输节点的根域名基础上注册发送方域名;利用接收方的接收方公钥在传输网络的第二传输节点的根域名基础上注册接收方域名;以及,将每个传输节点的根域名、发送方域名和接收方域名公开在区块链上。
换言之,每个传输节点在区块链上注册根域名,发送方和接收方在传输节点根域名基础上或其他次级域名基础上注册次级域名。各次级域名注册,均需上一级域名注册方授权。例如,发送方地址和接收方地址的域名规则可以类似现有互联网域名规则,为了便于记录和传播收发地址,传输节点和区块链相关域名服务负责提供域名到地址的解析服务。与互联网域名的区别在于,发送方和接收方注册虚拟传输网络域名时,仅需使用公钥即可。收发地址域名形如“mao.xa”、“xhs.xinan”、“boc.mars”,文天祥.信安、当代辛弃疾.dsrn、“shakespear.信安”等,一个域名对应一个或一系列收发地址。其中,“.xa”、“.xinan”、“.mars”是属于传输节点的根域名,形如“mao.xa”等为消息收发方可注册的次域名;形如“bit.mao.xa”是在消息收发方基础上注册的再次级域名或三级域名,依次类推。
在一些实施方式中,在S202之前,还可以包括发送方生成待传输信息的密文的步骤,具体包括:发送方利用接收方公钥对待传输信息进行加密,并利用发送方私钥对待传输信息进行签名,生成待传输信息的密文。基于此,在S205之后,还可以包括接收方B对接收到的待传输信息的密文进行解密的步骤,具体包括:接收方B利用接收方私钥对密文进行解密,并利用发送方公钥进行验签。本实施例中,通过采用上述签名-加密机制,同时保证了发送方和接收方的数据安全性。
在一些实施方式中,在S203之前,第一传输节点N1还可以对发信合约中的代币进行检查,以保障传输节点的利益,具体包括:第一传输节点N1在将信息点对点发送给第二传输节点之前,检查发信合约是否包含预设数量的代币,如包含则将待传输信息的密文发送给第二传输节点N2,如不包含则拒绝发送信息。
在一些实施方式中,S204可以具体包括:第一传输节点N1在发送信息时,利用自身的节点私钥对发送信息进行签名确认以生成发送确认回执,并将发送确认回执上传至区块链的发信合约。
可选的,第一传输节点N1利用自身的节点私钥对发送信息进行签名,并将签名的摘要作为发送确认回执上传至区块链上。
在一些实施方式中,S206具体可以包括:第二传输节点N2在接收信息时,利用自身的节点私钥对接收信息进行签名确认以生成接收确认回执,将接收确认回执上传至区块链。
可选的,第二传输节点N2利用自身的节点私钥对接收信息进行签名,并将签名的摘要作为接收确认回执上传至区块链上。
在一些实施方式中,S206还可以包括:第二传输节点N2在向接收方B投递信息时,利用自身的节点私钥对投递信息进行签名确认以生成投递确认回执,将投递确认回执上传至区块链。
可选的,第二传输节点N2利用自身的节点私钥对投递信息进行签名,并将签名的摘要作为投递确认回执上传至区块链上。
在一些实施方式中,参考图1,在S206之后,接收方B读取到待传输信息的密文之后,还可以执行S207,也即利用接收方密钥对读取信息进行签名确认,以生成读取确认回执,将读取确认回执上传至区块链的发信合约。
换言之,传输网络中的传输节点发送和接收每个信息时,都需要使用其私钥对信息的发送、接收动作签名确认,将签名作为收、发消息的回执记录在区块链上,且上述回执都包含签名时的时间戳信息。由此,区块链上记录了待传输信息从发送方到传输网络中的各个传输节点到接收方的流转全过程的状态信息。
在一些实施方式中,为确保传输节点对信息的无差别收发,避免其对特定地址的信息进行恶意拒绝和过滤;还可以约定:第一传输节点发送信息的信息次序和第二传输节点接收信息的信息次序保持一致。
例如,当按照发送顺序依次对信息编号(T1,T2,…Tn;T1<T2<…<Tn),发送方传输节点在发送消息时,需依次对T1,T2,…Tn条信息进行签名确认;在接收方传输节点处,也遵循上述次序对消息进行签名。并且,接收方传输节点必需对接收信息进行签名确认(即必需签发接收确认回执)。总之,可以由传输节点进行协调信息的收发次序,以确保各传输节点信息的收发次序一致。
本实施例中的发信合约规定了代币收取规则以及代币分配机制,其中,代币收取规则是指发送方和/或接收方向区块链部署的发信合约支付代币的规则,代币分配机制是指执行信息传输任务的传输节点和接收方获取代币奖励的规则。
以下接合具体实施方式对代币收取规则和代币分配机制进行详细阐述。
在一些实施方式中,关于代币收取规则,可以由发送方、接收方、第一传输节点、第二传输节点中的一个或多个协商确定。代币收取规则包括以下中的任意一种或多种:由发送方支付代币;由接收方向第二传输节点事先承诺或质押预设数额的代币;由发送方和接收方分担代币。
例如,信息发送方传输信息时所需支付的成本,可由传输节点协商投票决定,亦可由信息的接收方或发送方决定。至少包括以下三种收取机制:(1)发送方支付费用,例如,收发双方第一次通信时,发送方向接收方支付代币,接收方第一次收到某个发送方信息后,接收方可决定是否在后续的通信中继续收取通信费用。在此情形下,为确保传输节点收益,接收方节点需从发送方支付的代币中扣除一定比例服务费,发送方传输节点可自行选择是否收取服务费。(2)接收方支付费用,例如,若接收方为信息收集方,则接收方更愿意支付信息 传递的费用。即,接收方向接收方传输节点事先承诺或质押相应代币,用以支付信息传递费用。(3)收发双方支付费用,例如,若信息收发双方做价值对等的信息传递,如以信息传递的方式完成资产交易,则双方在交易信息的传递中,可各自负担部分信息传输费用。
在一些实施方式中,关于预设代币分配规则,可以包括以下中的任意一种规则:(1)第一传输节点向发信合约内提交发送确认回执,且第二传输节点向发信合约内提交接收确认回执后,将代币按比例分配给第一传输节点和第二传输节点;仅当第二传输节点向所述发信合约内提交接收确认回执后,将代币按发信合约内预设的代币分配规则,分配给第一传输节点和/或第二传输节点。
在一些实施方式中,当发送方和接收方关于信息传输状态和时间等产生争议时,可以执行以下步骤:发送方和/或接收方将待传输信息或已传输信息提交至仲裁方;仲裁方基于待传输消息或已传输信息,发送方、接收方、第一传输节点和第二传输节点的公钥,以及发信合约中的数据进行溯源和质证。
具体地,仲裁方可针对节点拒发信息、已收发的信息、信息的一致、信息发送的时间等事实进行裁决。例如,以发送方A发送信息m给接收方B为例,信息m从发送方至传输网络至接收方的全流程中,在发送方信息m的摘要上链,在传输节点发送确认回执和接收确认回执上链,以及在接收方读取确认回执上链,换言之,上述数据均在链上的发信合约公开且以不可篡改的形式记录。发送方A与接收方B之间如有因信息收发状态、时间等产生争议的,A可将信息m提交至仲裁方进行质证,由于发送方公钥和接收方公钥可公开获取、传输节点的公钥也可公开获取,因此仲裁方可自行、自动完成证据链溯源、审计,并即时给出裁决结果。同样,接收方B也可在接收到信息后,将信息m提交至仲裁方进行质证。
一个示例中,结合图3对本实施例的信息收发流程进行详细阐述。
参考图3,发送方A通过虚拟传输网络发送信息m给接收方B,P1,P2,P3,P4,P5共5个虚拟(逻辑)传输节点构成该虚拟传输网络。以下a~h示出了单向信息的完整发送和接收过程。
a)发送方A使用其公钥A pub或公钥的摘要已在传输节点P1注册,B使用B的公钥B pub或或公钥的摘要在传输节点P3注册,且A已知B在P3注册;
b)发送方A利用B的公钥B pub加密,再利用其私钥A priv对信息m签名,为m ab
c)发送方A在区块链上创建发信合约CA,并在发信合约CA中存入其支付的代币,存入代币数量为Ta;其中,发信合约CA可以约定:消息m ab(合约中仅记录消息m和m ab的摘要或哈希)始发节点将消息发送至目标地址所在传输节点,且目标节点向合约内提交接收确认回执后,始发节点和目标节点各获得Ta的50%。
d)发送方A将信息m ab发送给P1,并告知P1合约地址CA;
e)传输节点P1检查合约地址CA内代币充足,向传输节点P3发送信息,并将信息已发送的发送确认回执提交至发信合约CA;
f)传输节点P3接收信息m ab后,将信息m ab自动投递至接收方B,并将信息已接收和已投递的接收确认回执和/或投递确认回执提交至CA;
g)发信合约CA内根据约定自动将Ta分配给发送节点P1和接收节点P2各50%,为避免发信期间传输更替,在一定时间段内,发信方A若未提出异议,收发节点即可从合约内提取对应数额的代币;
h)接收方B接收到m ab后,使用A的公钥A pub验签,使用自己的私钥B priv解密,得到消息m。
以下结合具体实施方式进一步对本实施例中的传输网络及其包含的传输节点进行详细描述。
传输网络可以是由虚拟传输节点构成的点对点传输网络,任意传输节点间建立可直接、高效通信的网络连接,用于虚拟网络(或逻辑网络)中的信息传递。
传输网络可以利用以下任意一种通信方式实现点对点传输:无线通信、光通信、卫星通信、互联网通信。
传输网络可以包括以下三种治理方式:(1)治理委员会,由参与网络治理的各方成立治理委员会,虚拟传输节点的进入,由委员会以投票方式决定,具体参与规则可由治理委员会决定。(2)中心化服务平台,由中心化服务平台负责组织管理传输节点,治理细则由服务平台自行决定。(3)分布式自治,也即以一种特定的社区自治规则进行网络治理。如参选节点按照社区约定,各自在链上质押一定数量代币,代币质押量达标者可获选为传输节点;传输节点服务过程中,若无法达到社区约定的服务标准要求,则会被自动剔除出传输节点名单;为维护社区可持续的分布式自治,传输节点在服务期内,可以以代币的形式向社区缴纳服务税。
在一些实施方式中,为了维护传输网络的正常工作保证其效率,可以在传输网络中对传输节点进行管理,具体包括以下中的任意一种或多种:将不符合服务要求的传输节点从传输网络中剔除;对存在违规行为的违规节点进行惩罚;许可满足候选条件的普通节点成为所述传输网络中的候选节点;以及,许可满足竞选条件的候选节点成为所述传输网络中的传输节点。
在一些实施方式中,为了将不符合服务要求的传输节点从传输网络中剔除,可以进一步执行以下步骤:当检测到所述传输网络的任意一个或多个传输节点在指定时间段内未按要求执行信息传输动作,则从所述传输网络中剔除所述任意一个或多个传输节点。
例如,参考图1,若发送方A传输给第一传输节点N1的信息并未在指定时间段内传递给后续的传输节点,则可以认为该第一传输节点N1不符合服务标准,可以将其从传输网络中剔除,并可以由其他候选节点替代第一传输节点N1提供传输服务。
在一些实施方式中,传输网络包括审计协议,该审计协议利用链上数据和发信合约的数据对每个传输节点的传输行为进行审计;若发现传输节点未按预设收发协议进行传输的证据,则从传输网络中剔除传输节点或进行节点处罚。
可选的,可以由传输网络的治理委员会代理该审计协议。该预设收发协议包括但不限于上述S201-S206中规定的传输节点的传输协议。若发现未按预设收发协议进行传输的证据的传输节点,可自动将该传输节点取消其接入资格或进行处罚等,并根据节点更替规则,更替新节点。
在一些实施方式中,对存在违规行为的违规节点进行惩罚,对传输网络中的违规节点进行有序管理,当检测到所述传输网络的任意一个或多个传输节点发生预设违规行为之后,对检测到的违规节点执行以下处理:
(1)由所述传输网络的审计方在所述区块链上提交针对所述违规节点的惩罚决议,并由传输节点按照上链的惩罚决议自动执行相关惩处措施;和/或,
(2)由所述发送方和/或所述接收方和/或所述传输节点在所述区块链上提交针对所述违规节点的违规证据传输节点根据证据和审计协议对所述违规节点执行惩罚。
在一些实施方式中,对违规节点执行惩罚,可以从所述传输网络中剔除所述违规节点和/或缴纳代币罚款。其中,所缴纳的代币罚款可以看作是违规节点预先提交至区块链的保证金。
本实施例中的传输网络为许可接入型网络,换言之,候选传输节点需经网络运营方许可后,方能接入传输网络参与信息的收发。传输节点清单由网络运营方同步分发给各传输节点。
在一些实施方式中,为了许可满足候选条件的普通节点成为所述传输网络中的候选节点,可以在区块链上部署有节点竞选合约,普通节点可以通过在节点竞选合约上质押预设数量的代币,以成为传输网络的候选节点。
在一些实施方式中,为了许可满足竞选条件的候选节点成为所述传输网络中的传输节点,该节点竞选合约还规定:在开放申请时间范围内,符合以下一种或多种获选条件的候选节点成为传输网络的传输节点:
(1)与相关传输节点之间的传输/连接速率满足预设条件,相关传输节点为传输网络中与替代节点发生传输关系的传输节点。例如,可以使与相关传输节点之间的传输/连接速率最高的候选节点获选为新晋传输节点。
(2)与相关传输节点间的多并发传输速率满足预设条件;例如,可以使与相关传输节点之间的多并发(比如同时传输10个大容量消息)传输速率最高的候选节点获选为新晋传输节点。
在一些实施方式中,在各候选节点的物理硬性限制指标等同或无太大差别的情况下,为确保候选节点能够提供符合服务标准的传输服务,同时考虑以下推选方式:
(3)在开放时间窗口内向所述节点竞选合约质押代币的数量满足预设条件;例如,在链上质押一定量的代币可获得候选节点资格,在开放时间窗口终止时,选取代币质押数量最多的候选节点作为新晋传输节点,或在满足代币质押数量条件的多个候选节点中随机选取一个或多个作为新晋传输节点。
(4)获得传输网络的治理委员会的投票数满足预设条件;
(5)在开放时间窗口内向节点竞选合约支付预设数量的代币的速度满足预设条件。例如,候选节点可在开放时间窗口内,向链上(合约)支付一定量代币,最快付清的候选节点即可获选新晋传输节点。
在满足上述任意一个或多个条件且得到运营方许可后,候选节点可以成为传输网络的新晋传输节点。例如,参考图1,候选节点Nz可替代传输节点Ny,并获得替代传输节点Ny传输的所有数据,且传输网络运营方将新入选传输节点的公钥在网络中广播,送达至在运行的全部传输节点,该新入选传输节点的公钥也会上传至区块链。
例如,当发送方A查询发信合约发现,该发信合约中包含第一传输节点针对该待传输信息m的发送确认回执,但并不包含第二传输节点针对该传输信息m的接收确认回执,且该待传输信息m已经传输一段时间,则可以认为该第二传输节点发生故障,发送方A可以重新发送该待传输信息m。
本实施例所提供的信息传输方法可以应用于多种需要确保通信安全性和信息完整性的使用场景中,从而提高信息传输安全性,并实现自动存证、高效质证,有广泛应用价值。
以下对本实施例的应用场景进行示例性的列举,然而本领域技术人员可以理解,本实施例提供的信息传输方法的应用场景不限于此。
本实施例所提供的信息传输方法可以应用于安全加密通信场景,以信息收发流程中的A与B间的通信为例,在互联网传输环境下,各运营方网络节点可参与承担传输节点的任务;以任一款可公开访问数据的区块链***作为底层区块链支撑;A和B之间,借助本发明的传输方法和基础的网络和区块链服务支撑,可实现即时的安全加密通讯或延时的电子邮件通讯。
本实施例所提供的信息传输方法可以应用于商业合作的合同纠纷场景中,以信息收发流程中的A与B间的通信为例,若A和B分别为商务合作的甲乙、双方,双方可通过互联网络或自行架设的网络专线,并各自设立传输节点,采用本发明的传输方法,实现关键信息的双向安全送达。若双方就商务合同中的关键信息送达时间条款产生争议,由于链上记录的内容不可篡改,仲裁方可依据链上信息自动完成纠纷的裁定。在裁定过程中,部分情况下做到不公开泄露送达消息内容。原理如下:发送方A和接收方B可就加密后的消息内容进行签名确认,仲裁方仅需对传输节点在链上记录的信息摘要、传输时间和收发确认状态进行核实,即可完成相应裁决,该过程中仲裁方对消息的原本内容无需了解。
本实施例所提供的信息传输方法可以应用于关键技术文档或创意文稿的传输、医疗数据安全传输、跨境涉密信息的收发等。
本实施例所提供的信息传输方法可以应用于设备的安全远程控制,在远程手术、无人机、机动车和高危工程车辆或设备的操作场景中,应用本发明方法,可确保在操作终端和远程设备间建立安全高效的通信。即,基于高速传输网络,架设至少2个安全传输节点和一个基础服务链,分别将操作终端和远程设备通过安全传输节点建立通信连接,即可进行安全高效的操控,并可实现对设备控制的指令数据审计。在出现操作事故时,能够提供可靠可溯的安全数据。
本实施例所提供的信息传输方法可以应用于设备间的安全通信使用场景,随着物联网普及,自助服务和自主能动的机器设备逐渐多样化,机器设备间的协同场景愈来愈多。本发明可在机器设备间的协同中发挥巨大作用。由于机器间的协同有高效、自动等特点,若机器间的通信被网络攻击或黑客劫持,将产生不可估量的恶劣影响。本发明可支持机器间建立可审计的、安全可靠的通信连接,机器间协同消息的收发、指令的传递,均可采用本发明构建的通信体系完成,从而确保机器间的安全协同。
在本说明书的描述中,参考术语“一些可能的实施方式”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域 的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。
此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。在本发明的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。
流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现特定逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分,并且本发明的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本发明的实施例所属技术领域的技术人员所理解。
关于本申请实施例的方法流程图,将某些操作描述为以一定顺序执行的不同的步骤。这样的流程图属于说明性的而非限制性的。可以将在本文中所描述的某些步骤分组在一起并且在单个操作中执行、可以将某些步骤分割成多个子步骤、并且可以以不同于在本文中所示出的顺序来执行某些步骤。可以由任何电路结构和/或有形机制(例如,由在计算机设备上运行的软件、硬件(例如,处理器或芯片实现的逻辑功能)等、和/或其任何组合)以任何方式来实现在流程图中所示出的各个步骤。
基于相同的技术构思,本发明实施例还提供一种基于区块链技术的信息传输***,用于执行上述任一实施例所提供的基于区块链技术的信息传输方法。图1为本发明实施例提供的一种基于区块链技术的信息传输***结构示意图。
参考图1,该基于区块链技术的信息传输***包括:发送方A、接收方B、传输网络(N1、N2、…、Nx、Ny)和区块链;其中,发送方A注册于传输网络的第一传输节点N1,接收方B注册于传输网络的第二传输节点N2,从而可以实现从发送方传输信息通过传输网络投递至接收方。
发送方A用于在区块链上创建发信合约,将待传输信息的摘要提交至发信合约,并将待传输信息的密文、接收方地址和发信合约的地址发送给第一传输节点。
第一传输节点,用于将待传输信息的密文、接收方地址和发信合约的地址点对点发送给第二传输节点,并生成发送确认回执以提交至发信合约。
第二传输节点,用于接收待传输信息的密文和发信合约的地址并投递给接收方,并生成接收确认回执以提交至发信合约。
需要说明的是,本申请实施例中的基于区块链技术的信息传输***可以实现前述基于区块链技术的信息传输方法的实施例的各个过程,并达到相同的效果和功能,这里不再赘述。
图4为根据本申请一实施例的基于区块链技术的信息传输装置,用于执行图2所示出的基于区块链技术的信息传输方法,该装置包括:至少一个处理器;以及,与至少一个处理器通信连接的存储器;其中,存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器能够执行上述实施例所述的方法。
根据本申请的一些实施例,提供了基于区块链技术的信息传输方法的非易失性计算机存储介质,其上存储有计算机可执行指令,该计算机可执行指令设置为在由处理器运行时执行:上述实施例所述的方法。
本申请中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于装置、设备和计算机可读存储介质实施例而言,由于其基本相似于方法实施例,所以其描述进行了简化,相关之处可参见方法实施例的部分说明即可。
本申请实施例提供的装置、设备和计算机可读存储介质与方法是一一对应的,因此,装置、设备和计算机可读存储介质也具有与其对应的方法类似的有益技术效果,由于上面已经对方法的有益技术效果进行了详细说明,因此,这里不再赘述装置、设备和计算机可读存储介质的有益技术效果。
本领域内的技术人员应明白,本发明的实施例可提供为方法、***或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(***)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。此外,尽管在附图中以特定顺序描述了本发明方法的操作,但是,这并非要求或者暗示必须按照该特定顺序来执行这些操作,或是必须执行全部所示的操作才能实现期望的结果。附加地或备选地,可以省略某些步骤,将多个步骤合并为一个步骤执行,和/或将一个步骤分解为多个步骤执行。
虽然已经参考若干具体实施方式描述了本发明的精神和原理,但是应该理解,本发明并不限于所公开的具体实施方式,对各方面的划分也不意味着这些方面中的特征不能组合以进行受益,这种划分仅是为了表述的方便。本发明旨在涵盖所附权利要求的精神和范围内所包括的各种修改和等同布置。

Claims (25)

  1. 一种基于区块链技术的信息传输方法,其特征在于,包括:
    发送方在区块链上创建发信合约,将待传输信息的摘要提交至所述发信合约,并将所述待传输信息的密文、接收方地址和所述发信合约的地址发送给第一传输节点,其中,所述发送方注册于传输网络的所述第一传输节点,
    所述第一传输节点将所述待传输信息的密文、所述接收方地址和所述发信合约的地址点对点发送给第二传输节点,其中,接收方注册于所述传输网络的所述第二传输节点;
    所述第二传输节点接收所述待传输信息的密文和所述发信合约的地址并投递给所述接收方,并生成接收确认回执以提交至所述发信合约。
  2. 根据权利要求1所述的方法,其特征在于,所述第一传输节点将所述待传输信息的密文、所述接收方地址和所述发信合约的地址点对点发送给第二传输节点之时或之后,所述方法还包括:生成发送确认回执以提交至所述发信合约。
  3. 根据权利要求1或2所述的方法,其特征在于,所述第一传输节点和所述第二传输节点为同一传输节点,或者,所述第一传输节点和所述第二传输节点为不同传输节点。
  4. 根据权利要求1或2所述的方法,其特征在于,
    所述发信合约还包括预设的代币分配规则和所述发送方和/或所述接收方提交的代币,并根据预设的所述代币分配规则和提交至所述发信合约的数据将所述代币分配给所述第一传输节点、所述第二传输节点和所述接收方中的一个或多个。
  5. 根据权利要求1或2所述的方法,其特征在于,
    所述发送方具有基于非对称加密算法获得的发送方公钥和发送方私钥,利用所述发送方公钥或其摘要标识所述发送方的地址;
    所述接收方具有基于非对称加密算法获得的接收方公钥和接收方私钥,利用所述接收方公钥或其摘要标识所述接收方的地址;
    所述传输网络包括至少两个传输节点,其中每个传输节点各自具有基于非对称加密算法获得的节点公钥和节点私钥,利用所述节点公钥或其摘要标识所述传输节点的节点地址;
    其中,所述发送方、所述接收方和每个传输节点的地址公开在所述区块链上。
  6. 根据权利要求5所述的方法,其特征在于,还包括:
    利用每个所述传输节点的节点公钥在所述区块链上注册根域名;
    利用所述发送方的发送方公钥在所述传输网络的所述第一传输节点的根域名基础上注册发送方域名;
    利用所述接收方的接收方公钥在所述传输网络的所述第二传输节点的根域名基础上注册接收方域名;
    以及,将每个所述传输节点的所述根域名、所述发送方域名和所述接收方域名公开在所述区块链上。
  7. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    所述发送方生成所述待传输信息的密文,具体包括:所述发送方利用所述接收方公钥对所述待传输信息进行加密,并利用所述发送方私钥对所述待传输信息进行签名,生成所述待传输信息的密文;
    所述接收方对接收到的所述待传输信息的密文进行解密,具体包括:所述接收方利用所述发送方公钥对所述密文进行验签,并利用所述接收方私钥进行解密。
  8. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    所述第一传输节点在发送信息时,利用自身的节点私钥对发送信息进行签名确认以生成发送确认回执,并将所述发送确认回执上传至所述区块链;和/或,
    所述第二传输节点在接收信息时,利用自身的节点私钥对接收信息进行签名确认以生成接收确认回执,将所述接收确认回执上传至所述区块链。
  9. 根据权利要求8所述的方法,其特征在于,所述方法还包括:
    所述第二传输节点在向所述接收方投递信息时,利用自身的节点私钥对投递信息进行签名确认以生成投递确认回执,将所述投递确认回执上传至所述区块链。
  10. 根据权利要求8所述的方法,其特征在于,所述方法还包括:
    所述第一传输节点在将信息点对点发送给所述第二传输节点之前,检查所述发信合约是否包含预设数量的代币,如不包含则拒绝发送信息。
  11. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    所述第一传输节点发送信息的信息次序和所述第二传输节点接收信息的信息次序保持一致。
  12. 根据权利要求4所述的方法,其特征在于,所述发信合约还包括代币收取规则,所述代币收取规则由所述发送方、所述接收方、所述第一传输节点、所述第二传输节点中的一个或多个协商确定;以及,
    所述代币收取规则包括以下中的任意一种:由所述发送方支付代币;由所述接收方向所述第二传输节点事先承诺或质押预设数额的代币;由所述发送方和所述接收方分担支付代币。
  13. 根据权利要求4所述的方法,其特征在于,所述预设代币分配规则包括以下中的任意一种:
    当所述第一传输节点向所述发信合约内提交发送确认回执,且所述第二传输节点向所述发信合约内提交所述接收确认回执后,将所述代币按比例分配给所述第一传输节点和所述第二传输节点;
    仅当所述第二传输节点向所述发信合约内提交所述接收确认回执后,将所述代币按发信合约内预设的代币分配规则,分配给第一传输节点和/或第二传输节点。
  14. 根据权利要求5所述的方法,其特征在于,当所述发送方和所述接收方产生争议时,所述方法还包括:
    所述发送方和/或所述接收方将所述待传输信息或已传输信息提交至仲裁方;
    所述仲裁方基于所述待传输消息或已传输信息,所述发送方、所述接收方、所述第一传输节点和所述第二传输节点的公钥,以及提交至所述发信合约中的数据进行自动溯源和质证。
  15. 根据权利要求1所述的方法,其特征在于,所述传输网络包括审计协议,所述方法还包括:
    所述审计协议,用于利用链上数据和所述发信合约的数据对每个所述传输节点的传输行为进行审计;
    若发现传输节点未按预设收发协议进行传输的证据,则从所述传输网络中剔除所述传输节点或进行节点处罚。
  16. 根据权利要求1所述的方法,其特征在于,所述传输网络为虚拟网络,其中每个传输节点为虚拟节点。
  17. 根据权利要求1所述的方法,其特征在于,所述传输网络利用以下任意一种或多种通信方式实现点对点传输:无线通信、光通信、卫星通信、互联网通信。
  18. 根据权利要求1所述的方法,其特征在于,还包括:
    在所述传输网络中对传输节点进行管理,具体包括以下中的任意一种或多种:
    将不符合服务要求的传输节点从传输网络中剔除;
    对存在违规行为的违规节点进行惩罚;
    许可满足候选条件的普通节点成为所述传输网络中的候选节点;以及,
    许可满足竞选条件的候选节点成为所述传输网络中的传输节点。
  19. 根据权利要求18所述的方法,其特征在于,将不符合服务要求的传输节点从传输网络中剔除,还包括:
    当检测到所述传输网络的任意一个或多个传输节点在指定时间段内未按要求执行信息传输动作,则从所述传输网络中剔除所述任意一个或多个传输节点。
  20. 根据权利要求18所述的方法,其特征在于,对存在违规行为的违规节点进行惩罚,包括:
    当检测到所述传输网络的任意一个或多个传输节点发生预设违规行为之后,对检测到的违规节点执行以下处理:
    由所述传输网络的审计方在所述区块链上提交针对所述违规节点的惩罚决议,并由传输节点按照上链的惩罚决议自动执行相关惩处措施;和/或,
    由所述发送方和/或所述接收方和/或所述传输节点在所述区块链上提交针对所述违规节点的违规证据,传输节点根据证据和审计协议对所述违规节点执行惩罚。
  21. 根据权利要求1所述的方法,其特征在于,许可满足候选条件的普通节点成为所述传输网络中的候选节点,还包括:
    所述区块链上部署有节点竞选合约,普通节点通过在节点竞选合约上质押预设数量的代币,成为所述传输网络的候选节点。
  22. 根据权利要求1所述的方法,其特征在于,许可满足竞选条件的候选节点成为所述传输网络中的传输节点,还包括:
    满足以下一种或多种竞选条件的候选节点成为所述传输网络的传输节点:
    与相关传输节点之间的传输/连接速率满足预设条件,所述相关传输节点为所述传输网络中与替代节点发生传输关系的传输节点;
    与所述相关传输节点间的多并发传输速率满足预设条件;
    在开放时间窗口内向所述节点竞选合约质押代币的数量满足预设条件;
    获得所述传输网络的治理委员会的投票数满足预设条件;
    在开放时间窗口内向所述节点竞选合约支付预设数量的代币的速度满足预设条件。
  23. 一种基于区块链技术的信息传输***,其特征在于,被配置为用于执行如权利要求1-22中任一项所述的信息传输方法,***包括:发送方、接收方、传输网络和区块链;其中,
    所述发送方,用于在区块链上创建发信合约,将待传输信息的摘要提交至所述发信合约,并将所述待传输信息的密文、接收方地址和所述发信合约的地址发送给所述第一传输节点,其中所述发送方注册于所述传输网络的第一传输节点;
    所述第一传输节点,用于将所述待传输信息的密文、所述接收方地址和所述发信合约的地址点对点发送给第二传输节点,其中所述接收方注册于所述传输网络的第二传输节点;
    所述第二传输节点,用于接收所述待传输信息的密文和所述发信合约的地址并投递给所述接收方,并生成接收确认回执以提交至所述发信合约。
  24. 一种基于区块链技术的信息传输装置,其特征在于,包括:
    至少一个处理器;以及,与至少一个处理器通信连接的存储器;其中,存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器能够执行:如权利要求1-20中任一项所述的方法。
  25. 一种计算机可读存储介质,所述计算机可读存储介质存储有程序,当所述程序被多核处理器执行时,使得所述多核处理器执行如权利要求1-20中任一项所述的方法。
PCT/CN2021/108404 2021-07-21 2021-07-26 基于区块链的信息传输方法、***、装置及存储介质 WO2023000353A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2024503849A JP2024525936A (ja) 2021-07-21 2021-07-26 ブロックチェーンに基づく情報伝送方法、システム、装置及び記憶媒体
KR1020247002400A KR20240024966A (ko) 2021-07-21 2021-07-26 블록 체인에 기반한 정보 전송 방법, 시스템, 장치 및 저장 매체
EP21950602.9A EP4376353A1 (en) 2021-07-21 2021-07-26 Information transmission method, system and apparatus based on blockchain, and storage medium
US18/417,705 US20240163120A1 (en) 2021-07-21 2024-01-19 Information transmission method, system and device based on blockchain, and computer-readable storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110824381.5 2021-07-21
CN202110824381.5A CN113595736B (zh) 2021-07-21 2021-07-21 基于区块链的信息传输方法、***、装置及存储介质

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/417,705 Continuation US20240163120A1 (en) 2021-07-21 2024-01-19 Information transmission method, system and device based on blockchain, and computer-readable storage medium

Publications (1)

Publication Number Publication Date
WO2023000353A1 true WO2023000353A1 (zh) 2023-01-26

Family

ID=78248723

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/108404 WO2023000353A1 (zh) 2021-07-21 2021-07-26 基于区块链的信息传输方法、***、装置及存储介质

Country Status (6)

Country Link
US (1) US20240163120A1 (zh)
EP (1) EP4376353A1 (zh)
JP (1) JP2024525936A (zh)
KR (1) KR20240024966A (zh)
CN (1) CN113595736B (zh)
WO (1) WO2023000353A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108009824A (zh) * 2017-11-28 2018-05-08 北京博晨技术有限公司 数据共识方法、装置及电子设备
CN109831413A (zh) * 2018-12-27 2019-05-31 链极智能科技(上海)有限公司 一种区块链网络点对点通信协议
CN110069345A (zh) * 2019-04-23 2019-07-30 江苏大学 基于区块链的众包资源分布式匿名配给方法及其配给***
CN110648134A (zh) * 2019-08-27 2020-01-03 广东工业大学 一种基于区块链的车联网用户近距离数据共享***及方法
US20200396065A1 (en) * 2019-06-13 2020-12-17 Luis Eduardo Gutierrez-Sheris System and method using a fitness-gradient blockchain consensus and providing advanced distributed ledger capabilities via specialized data records

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10686799B2 (en) * 2018-04-30 2020-06-16 EMC IP Holding Company LLC Blockchain-based method and system for providing tenant security and compliance in a cloud computing environment
CN112243047B (zh) * 2019-07-19 2022-04-01 傲为有限公司 基于公链的区块链网络寻址方法
CN111080443B (zh) * 2019-12-27 2023-06-23 腾讯科技(深圳)有限公司 基于区块链的业务处理方法、装置、设备及存储介质
CN112200690A (zh) * 2020-10-27 2021-01-08 西安纸贵互联网科技有限公司 基于区块链的船品质量溯源***

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108009824A (zh) * 2017-11-28 2018-05-08 北京博晨技术有限公司 数据共识方法、装置及电子设备
CN109831413A (zh) * 2018-12-27 2019-05-31 链极智能科技(上海)有限公司 一种区块链网络点对点通信协议
CN110069345A (zh) * 2019-04-23 2019-07-30 江苏大学 基于区块链的众包资源分布式匿名配给方法及其配给***
US20200396065A1 (en) * 2019-06-13 2020-12-17 Luis Eduardo Gutierrez-Sheris System and method using a fitness-gradient blockchain consensus and providing advanced distributed ledger capabilities via specialized data records
CN110648134A (zh) * 2019-08-27 2020-01-03 广东工业大学 一种基于区块链的车联网用户近距离数据共享***及方法

Also Published As

Publication number Publication date
EP4376353A1 (en) 2024-05-29
US20240163120A1 (en) 2024-05-16
KR20240024966A (ko) 2024-02-26
CN113595736A (zh) 2021-11-02
CN113595736B (zh) 2022-06-14
JP2024525936A (ja) 2024-07-12

Similar Documents

Publication Publication Date Title
JP7378451B2 (ja) デジタル不換通貨
Hasan et al. Proof of delivery of digital assets using blockchain and smart contracts
Niranjanamurthy et al. Analysis of Blockchain technology: pros, cons and SWOT
CA3116763C (en) Privacy preserving validation and commit architecture
US10715317B2 (en) Protection of confidentiality, privacy and financial fairness in a blockchain based decentralized identity management system
JP6995762B2 (ja) ブロックチェーンからのデータのセキュアな抽出のための暗号方法及びシステム
US20190173854A1 (en) Decentralized information sharing network
US20200051041A1 (en) System and method for arbitrating a blockchain transaction
JP2022003536A (ja) デジタルコンテンツの制御及び配信のためのブロックチェーンにより実施される方法
JP2020503579A (ja) 電子通信の受信者を指定するブロックチェーンに基づく方法及びシステム
Komalavalli et al. Overview of blockchain technology concepts
JP5260567B2 (ja) クラウドコンピューティングシステム
CN111461870A (zh) 基于区块链的供应链金融增信方法
WO2020157708A2 (en) Point-to-point distributed decentralized system
WO2020088074A1 (zh) 基于区块链的隐私交易方法、装置及其应用方法、装置
Li et al. A Blockchain‐Based Sealed‐Bid e‐Auction Scheme with Smart Contract and Zero‐Knowledge Proof
US20230360042A1 (en) Method, system, and computer-readable medium for secured multi-lateral data exchange over a computer network
WO2019186978A1 (ja) 電子取引システム、取引サーバ、検証サーバ、電子取引方法及びプログラム
WO2023000353A1 (zh) 基于区块链的信息传输方法、***、装置及存储介质
Cai et al. Socialchain: Decoupling social data and applications to return your data ownership
Senthilkumar Data confidentiality, integrity, and authentication
JP5260566B2 (ja) クラウドコンピューティングシステム
US20240080191A1 (en) Collaborative computation across blockchain networks
Boopathi Block Chain Technology And Its Applications–A Review.
Chenli Trading Fairness and Sharing Accountability in Decentralized Secure Data Sharing

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21950602

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2024503849

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20247002400

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 1020247002400

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: 2021950602

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2021950602

Country of ref document: EP

Effective date: 20240221