Instant messaging system and method fusing block chain and point-to-point communication

A technology of a communication system and a communication method, applied in the field of instant communication systems, can solve the problems of long time-consuming and high network pressure to create blocks, and achieve the effects of solving resources and bandwidth, improving concurrency, and high robustness.

Active Publication Date: 2021-05-28
临沂呆马区块链网络科技有限公司
7 Cites 2 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0005] In order to solve the above problems, the present disclosure provides an instant messaging system that integrates blockchain and peer-to-peer communication technologies; the solution effectively solves the drawbacks of the centralized inst...
View more

Method used

(3) adopt WebRTC point-to-point communication, bypass central service transfer, solve resource and bandwidth simultaneously, improve concurrency;
Described data service layer adopts block node network framework, realizes distributed storage and privacy protection to system data;
[0098] Based on the alliance chain to build an internal communication tool of the enterprise or the group, the data is saved to the alliance chain of the group, the data is completely self-controlled, and the risk of being stolen and cracked can be guaranteed. At the same time, the implementation of decentralized network architecture saves a lot of central service resources for enterprises.
[0103] Busy ...
View more

Abstract

The invention provides an instant messaging method and system fusing a block chain and a point-to-point communication technology, and the method employs a block chain network architecture to replace a conventional communication architecture depending on a centralized service, user data encryption uplink, WebRTC point-to-point communication, and a mode that a node is used for the i p information mapping of a terminal. The problem that the instant chat system fusing the block chain consumes long time for creating the block and the network pressure caused by concurrent messages is too large is solved. Therefore, five instant chat functions of chat friend making, enterprise internal communication, private communication, message notification and live broadcast bullet screen are realized, and different instant chat requirements are met.

Application Domain

Data switching networksSecuring communication

Technology Topic

Chain networkBlockchain +6

Image

  • Instant messaging system and method fusing block chain and point-to-point communication
  • Instant messaging system and method fusing block chain and point-to-point communication
  • Instant messaging system and method fusing block chain and point-to-point communication

Examples

  • Experimental program(2)

Example Embodiment

[0039]Example 1:
[0040]The object of this embodiment is to provide an instant messaging system for fusion zone chains and point-to-point communication technology.
[0041]An instant messaging system for fusion zone chains and point-to-point communication technology, including data service layers, intermediate layers, and application layers;
[0042]The data service layer uses a block node network architecture to implement distributed storage and privacy protection for system data;
[0043]The intermediate layer uses a WebRTC point-to-point communication, and data is transferred by a transit server;
[0044]The application layer is based on the instant communication between the user based on the data service layer and the intermediate layer;
[0045]Among them, the user information encrypts the upper chain, the communication content is asynchronous, using the IPFS distributed storage system to record the encrypted chat content; the instant messaging system uses the block node and the IP information map of the terminal, instead of WebRTC network penetration method And ICE relay service.
[0046]Specifically, such asfigure 1 The architecture of the instant chat system of the fusion zone chain and the point-to-point communication technology is shown, based onfigure 1 The real-time chat system architecture shown in the present disclosure is described in detail with the plan of the plan of the present disclosure:
[0047](1) Inter-block node information transmission
[0048]Through the target user IP penetration, replace the conventional SIP signaling service, the end-to-end (block node to block node) is notified.
[0049](2) end-to-end penetration
[0050]Based on Transport / Session and NetWork I / O, Binary Protocol, SHA-256 Asymmetric Encryption Equality Links to achieve point-to-point data exchange; where SHA-256 is one of the safety hash algorithm SHA series algorithms, it is summarized The length is 256 bits, namely 32 bytes, so as the SHA256. For any length (press Bit calculations), the SHA256 generates a 32-byte length data called a message summary. When the message is received, this message summary can be used to verify that the data changes, that is, verify its integrity.
[0051](3) Data asynchronous upper chain
[0052]Message data transmission simultaneously, asynchronously synchronized to the block chain, stored with IPFS distribution, and can be used anytime, anywhere.
[0053](4) Single chat
[0054]After establishing a point-to-point connection, convert the data into binary, and perform sub-segmentation, each set of data port numbers and total points, implement parallel transmission and reorganization, improve data transmission performance, maximize network resources; through point-to-point point receipt, Resolve regular chat at least 4 times to resolve the message loss problem.
[0055](5) Business (add friends, enter group)
[0056]The information that adds a friend request can be synchronized through the network node. The target node can decrypt the content after the public key encryption, encrypting parameters uses their own private key signature information, public key, timestamp, content's Hash value, and IPFS in IPFS s position.
[0057](6) group chat
[0058]For group chats less than 2,000 people, the message is spread by point-to-point protocol; more than 2,000 group chat, transmit messages between block chain nods to achieve the spread of group chat, flexible use of network characteristics, and improve message transmission efficiency. When the mobile method is paralyzed, it can be automatically switched to another way; the members communicate the way the negotiation key is used with their own public-private keys to ensure that the encryption key of each chat room is different.
[0059](7) Privacy protection
[0060]By using Hash, JWT asymmetric encryption, the intranet penetrates the MD5 non-reverse encryption algorithm, the user information, the internal network penetration conversion IP and communication content, the full-range encryption guarantee during the storage and transmission process.
[0061]Based on the above-mentioned instant chat system architecture and underlying design, login and communication processes, and message storage such asfigure 2 Indicated.
[0062]Further, landing and communication processes are divided into 7 steps:
[0063](1) User registration
[0064]The user registers through the client, including the user's corresponding personal information;
[0065](2) Upper chain and synchronize
[0066]Create a block and upstream of the registration information, and all nodes are synchronized;
[0067](3) User login
[0068]Synchronize the user's public network and the intranets, port encryption to the whole network node;
[0069](4) Get a list of users
[0070]The user's individual obtains the user list through the block node, selecting a friend to communicate;
[0071](5) Get the optimal path
[0072]The communication notification is synchronized through the block node to the target node, and the speed optimal line notification is obtained by the path optimal algorithm;
[0073](6) Resolution of communication content
[0074]After the target node receives the notification, use the own private key to resolve the communication content, and return its IP information to the other party through network diffusion;
[0075](7) Establish a communication link
[0076]Source nodes and target nodes create a one-to-one point communication line by penetrating IP and port.
[0077]Further, message storage and offline message read processes such asimage 3The flow shown in, specific, message storage, and offline messages are divided into the following steps:
[0078](1) Record terminal information
[0079]The terminal information of the communication will be initiated to the block node;
[0080](2) Distributed storage
[0081]The block node information is stored in IPFS distributed storage, and roaming synchronization can be performed anytime, anywhere.
[0082](3) Synchronous data
[0083]After the client is limited, the data is synchronized by distributed network;
[0084](4) Query and decryption information
[0085]After the client synchronization data is detected, whether it contains its own communication information, and decrypt information through the appointment publicity;
[0086](5) blocking
[0087]Differentiate the data and communication information of the decryption communication information and the communication information;
[0088](6) Terminal cache
[0089]Cache the processing contents to the terminal;
[0090](7) Display information
[0091]According to the actual needs, a reasonable terminal layout is performed, and the information is displayed.
[0092]Further, the actual application of chat dating, interior communication, private communication, message notification, and live bucket, etc., based on the present disclosure.
[0093](1) chat dating based on public chain
[0094]Each node on the public chain can freely add and exit the network, and participate in the reading and writing of the chain data, and read and write interconnects, there is no centralized server node in the network. Bitcoin and Tanfang, which are familiar with you are a public chain. The benefits of the public chain are not limited, you can participate free.
[0095]The requirements of social entertainment life are increasing, and various dating software is not in line. Flooding strange dating tool information exposes, bringing users a great privacy threat. Based on the instant messaging of the public chain, it is guaranteed to secure user privacy, but also with network advantages of block nodes.
[0096](2) Enterprise internal communication based on the league chain
[0097]Each node of the league chain typically has a corresponding entity mechanism organization, and can be added to the exit network by authorization. All institutions have formulated a stakeholder associated alliance, and the healthy operation of the zone chain chain.
[0098]Based on the alliance chain to build a communication tool within the group, the data is stored to the group's league chain, and the data is completely self-control, but also guarantees the risk of stolen crack. At the same time, the network architecture is achieved, and the central service resource is saved for the company.
[0099](3) Private communication based on private chain
[0100]The write weights of each node in the private chain are controlled internal control, and the read permissions can be selectively open. The proprietary chain is still hot with a general structure of multi-node running in zone chain, which is suitable for internal data management and auditing of specific agencies. Among them, the R3CEV CORDA platform and the Hyper Ledger Project are all private chain projects, and there is a higher demand for transaction efficiency, privacy protection and regulatory control. The application of private chain is the main direction.
[0101]Based on the private chain to create a single-link communication software for a family or group member. Information is only known to participate. The new listening mobility is displayed. A one-to-one binding of the terminal is to prevent terminal data from spreading to the currently complex Internet to achieve exclusive communication mode across the time.
[0102](4) Message Notification Based on News
[0103]Busy social life, people always need to turn on message notification to remind you not to miss some important information. These news notifications fully needs to rely on various devices to provide vendor built-in services and remote center services. The message penetration is weak, the delivery rate is the end, the docking is complex, and the information is completely exposed. The message orientation node notification is implemented based on the network diffusion of the block node and the public-private key of the device terminal. Solve the pain points for existing message notifications.
[0104](5) Live Broadcast Based on Network Broadcasting
[0105]With the continuous development of life and e-commerce technology, live broadcast has become a mass life. Through the live stream of the center broadcast, the bulk is sent, the large platform is consumed, and several hundred or even thousands of centralized distributed service architectures. The information synchronization characteristics of the block chain node implement the full network efficient delivery, in the real-time demand, not particularly high live broadcast business requirements, a large number of service resources. And can effectively save live information, solve video media and barrage synchronization problems when playback.
[0106]Further, the disclosure of the present disclosure is aimed at the disadvantage of the instant communication system of the centralized architecture, the fusion zone chain and point communication techniques of the present invention propose a new instant chat system. The system not only solves the disadvantages of the centralized instant messaging system, but also solves the new problems brought by the block chain technology of the convergence zone: when the district block consumption is time consuming, when the node propagates, the message reaches high delay, data Synchronization is too slow; when the message is high, the network pressure and node data synchronous pressure are too high, and the performance requirements are too high; the programs of this disclosure have the following innovations relative to the prior art:
[0107](1) Communication architecture of block node network architecture instead of routine dependency centering services;
[0108](2) User data encrypts the upper chain, communication content asynchronous upper chain, record the encrypted chat content through IPFS (distributed storage system), and verify chat information while verifying chat content;
[0109](3) Using WebRTC point-to-point communication, bypassing the central service, solving resources and bandwidth, and improves concurrency;
[0110](4) Use the IP information mapping of nodes and terminals instead of WebRTC's network penetration method and ICE relay service.

Example Embodiment

[0111]Example 2:
[0112]The object of this embodiment is to provide an instant communication method of a fusion zone chain and a point-to-point communication technology.
[0113]An instant messaging method for fusion zone chains and point-to-point communication technology, including:
[0114]User registration through the client;
[0115]Create a zone node and uplink after encryption of the registration information, and all block nodes are synchronized;
[0116]Synchronize the user's public network and the intranet IP and port encryption to the whole network block node;
[0117]Get the user list through the block node, select the friend to communicate;
[0118]Synchronize the communication notification to the target node through the block node;
[0119]The target node receives the notification and uses its own private key to resolve the communication content, and returns its IP information.
[0120]Source nodes and target nodes create a one-to-one point communication line by penetrating IP and port.
[0121]Further, the communication notification is synchronized to the target node, in order to improve the communication speed, the optimal algorithm is required to obtain the synchronization of the communication notification.
[0122]Further, after the target node receives the notification, use the own private key to resolve the communication content, and returns its IP information to the source node in a way through the network diffuse.
[0123]Further, when one-to-one communication, after the point-to-point connection is established, the data is converted into binary, and the section segmentation, each set of data port numbers and total points, and implements parallel transmission and reorganization.
[0124]Further, during the group chat process, the message diffusion is performed by the point-to-point protocol; when it is greater than or equal to the preset number, the message is propagated between the block link node to achieve the spread of the group chat message.
[0125]In more embodiments, it is also provided:
[0126]An electronic device comprising a memory and a processor, and a computer instruction stored on a memory and running on a processor, the computer instruction is running, and the method described in Embodiment 2 is completed. For the sake of brevity, will not be described here.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Mobile office platform data architecture method

InactiveCN108520075AHigh concurrencyincrease traffic
Owner:GUIZHOU POWER GRID CO LTD

Password device based on embedded operating system

ActiveCN105681281Aimprove securityHigh concurrency
Owner:BEIJING JINKELIANXIN DATA TECH CO LTD

Distributed object storage system and method

PendingCN111737052Aimprove usabilityHigh concurrency
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

High-concurrency high-definition video processing technology based on ARM architecture

InactiveCN108848350AIncrease the compression ratioHigh concurrency
Owner:广州青鹿教育科技有限公司

Classification and recommendation of technical efficacy words

  • High concurrency

Password device based on embedded operating system

ActiveCN105681281Aimprove securityHigh concurrency
Owner:BEIJING JINKELIANXIN DATA TECH CO LTD

Distributed object storage system and method

PendingCN111737052Aimprove usabilityHigh concurrency
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

High-concurrency high-definition video processing technology based on ARM architecture

InactiveCN108848350AIncrease the compression ratioHigh concurrency
Owner:广州青鹿教育科技有限公司

Mobile office platform data architecture method

InactiveCN108520075AHigh concurrencyincrease traffic
Owner:GUIZHOU POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products