CN115391801A - Method and device for updating encryption module in block chain system and related products - Google Patents

Method and device for updating encryption module in block chain system and related products Download PDF

Info

Publication number
CN115391801A
CN115391801A CN202210974693.9A CN202210974693A CN115391801A CN 115391801 A CN115391801 A CN 115391801A CN 202210974693 A CN202210974693 A CN 202210974693A CN 115391801 A CN115391801 A CN 115391801A
Authority
CN
China
Prior art keywords
project
plug
encryption module
encryption
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210974693.9A
Other languages
Chinese (zh)
Inventor
阮安邦
魏明
王佳帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Octa Innovations Information Technology Co Ltd
Original Assignee
Beijing Octa Innovations Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Octa Innovations Information Technology Co Ltd filed Critical Beijing Octa Innovations Information Technology Co Ltd
Priority to CN202210974693.9A priority Critical patent/CN115391801A/en
Publication of CN115391801A publication Critical patent/CN115391801A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method and a device for updating an encryption module in a block chain system and a related product, wherein the method comprises the steps of receiving an encryption module updating request generated by the block chain system; encrypting the updating request of the encryption module by using the security parameters to generate an encryption module calling instruction; verifying the encryption module calling instruction according to the generated trap door; if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through a set encryption algorithm code inlet; and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to be the second encryption module in a remote dependence mode.

Description

Method and device for updating encryption module in block chain system and related products
Technical Field
The present disclosure relates to a block chain technology field, and in particular, to a method and an apparatus for updating an encryption module in a block chain system, and a related product.
Background
The block chain is a chain of blocks, each block stores certain information, and the blocks are connected into the chain according to the time sequence generated by the blocks. This chain is maintained in all servers, and as long as one server can work in the entire system, the entire blockchain is secure. These servers, referred to as nodes in the blockchain system, provide storage space and computational support for the entire blockchain system. If the information in the block chain is to be modified, more than half of the nodes must be proved to agree and modify the information in all the nodes, and the nodes are usually held in different subjects, so that the information in the block chain is extremely difficult to tamper with.
In the application process of the block chain technology, block nodes of a terminal are involved, each block node is equivalent to a terminal, and necessary codes and resource packages must be loaded on the block nodes to participate in the operation of the whole system of the block chain. Among these, the encryption algorithm is a very important function for the blockchain. When the function implementation of the encryption algorithm is implemented in the form of a static library, which results in the need to update the encryption algorithm, the entire dynamic library must be updated, resulting in a high update cost.
Disclosure of Invention
Based on the foregoing problems, embodiments of the present application provide a method and an apparatus for updating an encryption module in a blockchain system, and a related product.
The embodiment of the application discloses the following technical scheme:
a method for updating an encryption module in a blockchain system, comprising:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included;
verifying the encryption module calling instruction according to the generated trapdoor, wherein the trapdoor is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code entry;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, comprises: the second plug-in project and the first plug-in project are in a mutual authenticity relationship through the created first plug-in project and the created second plug-in project, the plug-in project with a pseudo identity in the first plug-in project and the second plug-in project is used for managing the encryption algorithm code entry, and the plug-in project with a true identity in the first plug-in project and the second plug-in project is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, further comprises: and the plug-in project with a true identity in the first plug-in project and the second plug-in project calls the plug-in project with a false identity, so that the second encryption module is loaded in the plug-in frame loaded in the project warehouse in the form of the plug-in project.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, further comprises: and creating the first plug-in project and the second plug-in project in the created project warehouse through the created plug-in project declaration.
An apparatus for updating cryptographic modules in a blockchain system, comprising:
a first program unit for receiving an encryption module update request generated by a blockchain system;
a second program unit, configured to encrypt the encryption module update request using a security parameter to generate an encryption module fetch instruction, where a security dimension parameter value used for encryption is 100, so that a feature value dimension of the encryption module fetch instruction is equal to 2048, and the feature value dimension at least includes a receiving timestamp of the encryption module update request;
the third program unit is used for verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing hash operation according to a preset verification private key and a set encryption algorithm code entry;
a fourth program unit, configured to generate a project warehouse access request in response to that the cryptographic module fetching instruction is legal, so as to access a project warehouse in which a second cryptographic module replacing a first cryptographic module in the blockchain system is stored, where the first cryptographic module is loaded in the blockchain system in the form of a cryptographic plug-in, and the second cryptographic module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set cryptographic algorithm code entry;
a fourth program unit, configured to enable the project repository to authenticate the project repository access request, and if the authentication passes, update the first encryption module in the blockchain system to the second encryption module in a remote dependence manner.
Optionally, the fourth program element is further configured to: the second plug-in project and the first plug-in project are in a mutual authenticity relationship through the created first plug-in project and the created second plug-in project, the plug-in project with a pseudo identity in the first plug-in project and the second plug-in project is used for managing the encryption algorithm code entry, and the plug-in project with a true identity in the first plug-in project and the second plug-in project is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry.
Optionally, the fourth program element is further configured to: and the plug-in project with a true identity in the first plug-in project and the second plug-in project calls the plug-in project with a false identity, so that the second encryption module is loaded in the plug-in frame loaded in the project warehouse in the form of the plug-in project.
The apparatus according to claim 10, characterized in that the fourth program element is further adapted to: creating said first and second plug-in project in the created project repository by means of the created plug-in project declaration.
An electronic device comprising a memory having an executable program stored thereon and a processor that executes the executable program to perform the steps of:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included;
verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code inlet;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
A computer program product having an executable program stored thereon, the executable program when executed performing the steps of:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included;
verifying the encryption module calling instruction according to the generated trapdoor, wherein the trapdoor is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code entry;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
In the technical scheme of the embodiment of the application, an encryption module updating request generated by a block chain system is received; encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included; verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code inlet; if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code entry; and the project warehouse authenticates the project warehouse access request, if the authentication is passed, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode, so that the update of the encryption algorithm can be realized based on a plug-in, and the update cost of the encryption algorithm is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a flowchart illustrating a method for updating an encryption module in a block chain system according to an embodiment of the present disclosure;
FIG. 2 is a schematic structural diagram illustrating an apparatus for updating an encryption module in a blockchain system according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 4 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application.
Detailed Description
It is not necessary for any particular embodiment of the invention to achieve all of the above advantages at the same time.
In order to make those skilled in the art better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the technical scheme of the embodiment of the application, an encryption module updating request generated by a block chain system is received; encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included; verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code inlet; if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code entry; and the project warehouse authenticates the project warehouse access request, if the authentication is passed, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode, so that the update of the encryption algorithm can be realized based on a plug-in, and the update cost of the encryption algorithm is reduced.
Fig. 1 is a flowchart illustrating a method for updating an encryption module in a block chain system according to an embodiment of the present disclosure; as shown in fig. 1, it includes:
s101, receiving an encryption module updating request generated by a block chain system;
s102, encrypting the encryption module updating request by using the security parameters to generate an encryption module calling instruction;
in this embodiment, the security dimension parameter value used for encryption is 100, so that the feature value dimension of the instruction called by the encryption module is 2048, and the security dimension parameter value at least includes a receiving timestamp of the update request of the encryption module;
s103, verifying the encryption module calling instruction according to the generated trap door;
in this embodiment, the trapdoor is obtained by performing hash operation according to a predetermined verification private key and a set encryption algorithm code entry;
if so, executing S104: generating a project warehouse access request to access a project warehouse storing a second encryption module replacing a first encryption module in the blockchain system;
and if the request is illegal, rejecting the updating request of the encryption module.
In this embodiment, the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code entry;
and S105, the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, comprises: the second plug-in project and the first plug-in project are in a mutual authenticity relationship through the created first plug-in project and the created second plug-in project, the plug-in project with a pseudo identity in the first plug-in project and the second plug-in project is used for managing the encryption algorithm code entry, and the plug-in project with a true identity in the first plug-in project and the second plug-in project is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, further comprises: the plug-in project with a true identity in the first plug-in project and the second plug-in project calls the plug-in project with a false identity, so that the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of the plug-in project, thereby facilitating the quick embedding and calling of the plug-in and facilitating the subsequent upgrading of the encryption algorithm.
In this embodiment, the first plug-in project and the second plug-in project are in a mutual authenticity relationship, so that the management of the encryption algorithm code entry based on the plug-in project with the pseudo identity is realized, and the plug-in project with the real identity is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry, so that the mutual calling based on the plug-in projects is realized, and the data directness and efficiency are improved.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, further comprises: creating said first and second plug-in project in the created project repository by means of the created plug-in project declaration.
Illustratively, creating the first plug-in project and the second plug-in project in the created project repository through the created plug-in project declaration comprises: and the created plug-in project statement defines the generic argument as an execution entry of the encryption algorithm code according to the set generic argument to create a pseudo plug-in project statement and manage the encryption algorithm code entry through the plug-in project with a pseudo identity, so that the security performance of the encryption algorithm is improved and the attack is avoided.
In this embodiment, the plug-in project and the host project may be located in the same project local repository specifically by means of a mapping relationship between the plug-in project ID and the host project ID and the project local repository.
In this embodiment, based on the created plug-in project declaration, the creation of the first plug-in project and the second plug-in project can be quickly realized, and the real-time property of the encryption algorithm update is satisfied.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, further comprises:
and calling the created plug-in project and the host project to create the project warehouse.
In this embodiment, creating the project repository based on the created plug-in project and host project may specifically include:
the plug-in project analyzes the created target declaration folder to determine a warehouse address and a dependent data packet, and the host project creates the plug-in project and the host project according to the warehouse address and the dependent data packet.
By analyzing the target declaration folder, the warehouse address and the dependent data packet can be quickly determined, so that the speed of creating the plug-in project and the host project is improved.
In this embodiment, the created target declaration folder may be specifically analyzed through a written script code file, an address of the target declaration file is specified in the script code file, a warehouse address and a dependent data packet are obtained from the address of the target declaration file, the address of the warehouse is specifically a warehouse address for storing a code, and the dependent data packet includes all data packets required for implementing encryption.
Optionally, the invoking the created plug-in project and the host project, and creating the project repository includes:
allocating IDs to the called plug-in project and the host project based on the set logic offset of the unique identifier;
creating a project repository based on the IDs assigned for the plug-in projects and hosting projects.
Illustratively, assigning IDs to called plug-in projects and host projects based on a set logical offset of unique identifiers may include: and distributing IDs for the plug-in project and the host project according to the set ID logic offset and the set ID anchor point location.
Through the logic offset and the set ID anchor point location, the allocation of the IDs of the plug-in project and the host project can be accurately realized. Specifically, the IDs of the plug-in project and the host project may be allocated by, for example, segment allocation.
Specifically, two logical offsets and an ID anchor location may be used, and the allocation of the IDs of the plug-in project and the host project is realized. Specifically, the ID of the plug-in project and the ID of the host project are calculated respectively by taking the ID anchor point location as a starting point and taking the logical offset as a step size.
Optionally, the invoking the created plug-in project and the host project, and creating the project repository, further includes:
and analyzing the created object declaration folder to determine a warehouse address and a dependent data packet, and creating a plug-in project and a host project according to the warehouse address and the dependent data packet.
Optionally, the allocating IDs for the called plug-in project and the host project based on the set logical offset of the unique identifier includes: and distributing IDs for the plug-in project and the host project according to the set ID logic offset and the set ID anchor point location.
Fig. 2 is a schematic structural diagram illustrating an apparatus for updating an encryption module in a blockchain system according to an embodiment of the present disclosure; as shown in fig. 2, it includes:
a first program unit 201, configured to receive an encryption module update request generated by a blockchain system;
a second program unit 202, configured to encrypt the encryption module update request by using a security parameter to generate an encryption module invoking instruction, where a security dimension parameter value used for encryption is 100, so that a feature value dimension of the encryption module invoking instruction is equal to 2048, and the feature value dimension at least includes a receiving timestamp of the encryption module update request;
the third program unit 203 is configured to verify the encryption module call instruction according to the generated trapdoor, where the trapdoor is obtained by performing a hash operation according to a predetermined verification private key and a set encryption algorithm code entry;
a fourth program unit 204, configured to generate a project warehouse access request in response to that the cryptographic module fetching instruction is legal, so as to access a project warehouse in which a second cryptographic module replacing a first cryptographic module in the blockchain system is stored, where the first cryptographic module is loaded in the blockchain system in the form of a cryptographic plug-in, and the second cryptographic module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set cryptographic algorithm code entry;
a fifth program element 205, configured to enable the project repository to authenticate the project repository access request, and if the authentication is passed, update the first encryption module in the blockchain system to the second encryption module in a remote dependency manner.
Optionally, the fourth program element is further configured to: the second plug-in project and the first plug-in project are in a mutual authenticity relationship through the created first plug-in project and the created second plug-in project, the plug-in project with a pseudo identity in the first plug-in project and the second plug-in project is used for managing the encryption algorithm code entry, and the plug-in project with a true identity in the first plug-in project and the second plug-in project is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry.
Optionally, the fourth program element is further configured to: and the plug-in project with a true identity in the first plug-in project and the second plug-in project calls the plug-in project with a false identity, so that the second encryption module is loaded in the plug-in frame loaded in the project warehouse in the form of the plug-in project.
The apparatus according to claim 10, characterized in that the fourth program element is further adapted to: and creating the first plug-in project and the second plug-in project in the created project warehouse through the created plug-in project declaration.
Optionally, the fourth program element is further configured to:
and calling the created plug-in project and the host project to create the project warehouse.
Optionally, the fourth program element is further configured to:
allocating IDs to the called plug-in project and the host project based on the set logic offset of the unique identifier;
creating a project repository based on the IDs assigned for the plug-in projects and hosting projects.
Optionally, the fourth program element is further configured to:
and analyzing the created object declaration folder to determine a warehouse address and a dependent data packet, and creating a plug-in project and a host project according to the warehouse address and the dependent data packet.
Optionally, the fourth program element is further configured to: and distributing IDs for the plug-in project and the host project according to the set ID logic offset and the set ID anchor point location.
Fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application; as shown in fig. 3, it includes a memory 301 and a processor 302, the memory stores an executable program, and the processor executes the executable program and executes the following steps:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of the security dimension parameter used for encryption is 100, so that the feature value dimension of the encryption module calling instruction is equal to 2048, and the feature value dimension at least comprises a receiving timestamp of the encryption module updating request;
verifying the encryption module calling instruction according to the generated trapdoor, wherein the trapdoor is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code entry;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
Fig. 4 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application; as shown in fig. 4, the hardware structure of the electronic device may include: a processor 401, a communication interface 402, a computer-readable medium 403, and a communication bus 404;
the processor 401, the communication interface 402, and the computer-readable medium 403 are configured to communicate with each other via a communication bus 404;
optionally, the communication interface 402 may be an interface of a communication module, such as an interface of a GSM module;
the processor 401 may be specifically configured to run an executable program stored in the memory, so as to perform all or part of the processing steps of any of the above-described method embodiments.
Processor 401 may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The electronic device of the embodiments of the present application exists in various forms, including but not limited to:
(1) Mobile communication devices, which are characterized by mobile communication capabilities and are primarily targeted at providing voice and data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
(4) The server is similar to a general computer architecture, but has higher requirements on processing capability, stability, reliability, safety, expandability, manageability and the like because of the need of providing high-reliability service.
(5) And other electronic devices with data interaction functions.
It should be noted that, in this specification, each embodiment is described in a progressive manner, and the same and similar parts between the embodiments are referred to each other, and each embodiment focuses on differences from other embodiments. In particular, for the apparatus and system embodiments, since they are substantially similar to the method embodiments, they are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described embodiments of the apparatus and system are merely illustrative, and the modules illustrated as separate components may or may not be physically separate, and the components suggested as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement without inventive effort.
The above description is only one specific embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A method for updating an encryption module in a blockchain system, comprising:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included;
verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code inlet;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
2. The method of claim 1, wherein accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system comprises: the second plug-in project and the first plug-in project are in a mutual authenticity relationship through the created first plug-in project and the created second plug-in project, the plug-in project with a pseudo identity in the first plug-in project and the second plug-in project is used for managing the encryption algorithm code entry, and the plug-in project with a true identity in the first plug-in project and the second plug-in project is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry.
3. The method of claim 2, wherein accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system further comprises: and the plug-in project with a true identity in the first plug-in project and the second plug-in project calls the plug-in project with a false identity, so that the second encryption module is loaded in the plug-in frame loaded in the project warehouse in the form of the plug-in project.
4. The method of claim 2, wherein accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system further comprises: and creating the first plug-in project and the second plug-in project in the created project warehouse through the created plug-in project declaration.
5. An apparatus for updating cryptographic modules in a blockchain system, comprising:
a first program unit for receiving an encryption module update request generated by a block chain system;
a second program unit, configured to encrypt the encryption module update request using a security parameter, and generate an encryption module fetch instruction, where a security dimension parameter value used for encryption is 100, so that a feature value dimension of the encryption module fetch instruction is equal to 2048, and the feature value dimension at least includes a timestamp for receiving the encryption module update request;
the third program unit is used for verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing hash operation according to a preset verification private key and a set encryption algorithm code entry;
a fourth program unit, configured to, in response to that the cryptographic module fetching instruction is legal, generate a project warehouse access request to access a project warehouse in which a second cryptographic module replacing a first cryptographic module in the blockchain system is stored, where the first cryptographic module is loaded in the blockchain system in the form of a cryptographic plug-in, and the second cryptographic module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set cryptographic algorithm code entry;
a fourth program unit, configured to enable the project repository to authenticate the project repository access request, and if the authentication passes, update the first encryption module in the blockchain system to the second encryption module in a remote dependence manner.
6. The apparatus of claim 9, wherein the fourth program unit is further configured to: the second plug-in project and the first plug-in project are in a mutual authenticity relationship through the created first plug-in project and the created second plug-in project, the plug-in project with a pseudo identity in the first plug-in project and the second plug-in project is used for managing the encryption algorithm code entry, and the plug-in project with a true identity in the first plug-in project and the second plug-in project is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry.
7. The apparatus according to claim 10, characterized in that the fourth program element is further adapted to: and the plug-in project with a true identity in the first plug-in project and the second plug-in project calls the plug-in project with a false identity, so that the second encryption module is loaded in the plug-in frame loaded in the project warehouse in the form of the plug-in project.
8. The apparatus according to claim 10, characterized in that the fourth program element is further adapted to: and creating the first plug-in project and the second plug-in project in the created project warehouse through the created plug-in project declaration.
9. An electronic device, comprising a memory and a processor, wherein the memory stores an executable program, and the processor executes the executable program to perform the following steps:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included;
verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code inlet;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
10. A computer program product having an executable program stored thereon, the executable program when executed performs the steps of:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of the security dimension parameter used for encryption is 100, so that the feature value dimension of the encryption module calling instruction is equal to 2048, and the feature value dimension at least comprises a receiving timestamp of the encryption module updating request;
verifying the encryption module calling instruction according to the generated trapdoor, wherein the trapdoor is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code entry;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
CN202210974693.9A 2022-08-15 2022-08-15 Method and device for updating encryption module in block chain system and related products Pending CN115391801A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210974693.9A CN115391801A (en) 2022-08-15 2022-08-15 Method and device for updating encryption module in block chain system and related products

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210974693.9A CN115391801A (en) 2022-08-15 2022-08-15 Method and device for updating encryption module in block chain system and related products

Publications (1)

Publication Number Publication Date
CN115391801A true CN115391801A (en) 2022-11-25

Family

ID=84118260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210974693.9A Pending CN115391801A (en) 2022-08-15 2022-08-15 Method and device for updating encryption module in block chain system and related products

Country Status (1)

Country Link
CN (1) CN115391801A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116204910A (en) * 2023-04-27 2023-06-02 暗链科技(深圳)有限公司 Plug-in hash encryption method, nonvolatile readable storage medium and electronic device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116204910A (en) * 2023-04-27 2023-06-02 暗链科技(深圳)有限公司 Plug-in hash encryption method, nonvolatile readable storage medium and electronic device
CN116204910B (en) * 2023-04-27 2023-08-18 暗链科技(深圳)有限公司 Plug-in hash encryption method, nonvolatile readable storage medium and electronic device

Similar Documents

Publication Publication Date Title
CN110036613B (en) System and method for providing identity authentication for decentralized applications
CN111262889B (en) Authority authentication method, device, equipment and medium for cloud service
US9792374B2 (en) Method and system for facilitating terminal identifiers
JP6022718B2 (en) Configuration and validation by trusted providers
JP6371919B2 (en) Secure software authentication and verification
CN110570196A (en) Transaction data processing method and device, terminal equipment and storage medium
CN111506327B (en) Block chain node hot upgrading method and related equipment
CN111338608B (en) Distributed application development method and device, node equipment and readable storage medium
CN107483987B (en) Authentication method and device for video stream address
CN111159657A (en) Application program authentication method and system
CN112597485B (en) Information checking method, device and equipment based on block chain and storage medium
CN115248919A (en) Method and device for calling function interface, electronic equipment and storage medium
CN115391801A (en) Method and device for updating encryption module in block chain system and related products
CN110910110A (en) Data processing method and device and computer storage medium
CN113542405A (en) Block chain-based network communication system, method, device and storage medium
CN111046440B (en) Tamper verification method and system for secure area content
CN113986132A (en) Method, device and related product for sharing storage resources in heterogeneous network
CN112738043A (en) Method, system and related product for carrying out legality authentication on user identity in big data system
CN112865981A (en) Token obtaining and verifying method and device
CN117040930B (en) Resource processing method, device, product, equipment and medium of block chain network
CN112165399B (en) Method and device for processing block link point faults based on credible root metrics and related products
CN110245518B (en) Data storage method, device and equipment
CN114531486B (en) Industrial Internet data processing method, device, equipment and storage medium
CN115248931A (en) Plug-in method and device for encryption algorithm in block chain technology and related product
CN117896156A (en) Data credibility verification method, information sending equipment, verification system and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination