Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data covert transmission method based on block chain network

A transmission method and data concealment technology, applied in digital transmission systems, transmission systems, data processing applications, etc., can solve the problems of low concealment, inability to solve group leakage, poor scalability, etc., achieve high concealment, avoid statistical Regular, scalable effect

Active Publication Date: 2019-09-10
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF8 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] The purpose of the present invention is to provide a data concealed transmission method based on the block chain network for the problems of low concealment, poor scalability, and inability to solve the problem of group internal leakage in the existing data concealed transmission mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data covert transmission method based on block chain network
  • Data covert transmission method based on block chain network
  • Data covert transmission method based on block chain network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] see figure 1 , the present invention provides a technical solution: a data covert transmission method based on a block chain network, including the following process:

[0032] 1. Out-of-chain key exchange phase: Before the data is transmitted in a concealed manner, the sender and receiver must exchange their respective public keys in advance. This process will be implemented in an off-chain communication channel, requiring a direct exchange of information between the receiver and the sender. To reduce the risk of off-chain communications being monitored by potential adversaries, the number of off-chain key exchanges must be kept to a minimum. In this scheme, the sender and the receiver only need one key exchange to safely complete multiple data transmissions. Off-chain key exchange can be implemented using existing technologies. For example, data transmission technology based on SSL encryption.

[0033] 2. Concealed data construction stage: In this stage, the sender...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data covert transmission method based on a block chain network, and belongs to the technical field of data covert transmission. According to the method, a public key servingas a certificate of covert communication is exchanged through an out-of-chain key exchange stage; then constructing a special transaction which contains a message encrypted by a sender private key and can leak signature information of the sender private key and is generated by using a Kleptography technology through a covert data construction stage; then, the special transaction is propagated through an in-chain data transmission stage; and finally, reading and detecting each block chain transaction propagated in the block chain network one by one by a receiver in a hidden data extraction stage, and if the signature data in the transaction can extract a private key by using a Kleptograpy technology, indicating that the transaction is a special transaction carrying encrypted data. And thereceiver decrypts the original text by using the extracted private key. Compared with the prior art, the method has the characteristic of high concealment, and an enemy cannot identify a concealed channel according to account characteristics.

Description

technical field [0001] The invention relates to a data covert transmission method, in particular to a data covert transmission method based on a blockchain network, and belongs to the technical field of data covert transmission. Background technique [0002] In modern society, the rapid development of network communication technology makes information transmission faster and more convenient. Information has become an important strategic resource in the country's military, political, economic, technological and cultural development, and the security of information transmission has attracted more and more attention. Among them, information hiding is an emerging technology to solve information confidentiality. It hides information that needs to be transmitted confidentially into digital carriers, making it difficult for third parties to detect the existence of secret information, and can better achieve the purpose of data concealment transmission. There are important uses in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/14H04L29/08G06Q40/04
CPCG06Q40/04H04L9/14H04L9/3247H04L63/0442H04L67/1095H04L67/1097Y02A10/40
Inventor 祝烈煌高峰郑宝昆张璨
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products