CN115391801A - Method and device for updating encryption module in block chain system and related products - Google Patents
Method and device for updating encryption module in block chain system and related products Download PDFInfo
- Publication number
- CN115391801A CN115391801A CN202210974693.9A CN202210974693A CN115391801A CN 115391801 A CN115391801 A CN 115391801A CN 202210974693 A CN202210974693 A CN 202210974693A CN 115391801 A CN115391801 A CN 115391801A
- Authority
- CN
- China
- Prior art keywords
- project
- plug
- encryption module
- encryption
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a method and a device for updating an encryption module in a block chain system and a related product, wherein the method comprises the steps of receiving an encryption module updating request generated by the block chain system; encrypting the updating request of the encryption module by using the security parameters to generate an encryption module calling instruction; verifying the encryption module calling instruction according to the generated trap door; if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through a set encryption algorithm code inlet; and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to be the second encryption module in a remote dependence mode.
Description
Technical Field
The present disclosure relates to a block chain technology field, and in particular, to a method and an apparatus for updating an encryption module in a block chain system, and a related product.
Background
The block chain is a chain of blocks, each block stores certain information, and the blocks are connected into the chain according to the time sequence generated by the blocks. This chain is maintained in all servers, and as long as one server can work in the entire system, the entire blockchain is secure. These servers, referred to as nodes in the blockchain system, provide storage space and computational support for the entire blockchain system. If the information in the block chain is to be modified, more than half of the nodes must be proved to agree and modify the information in all the nodes, and the nodes are usually held in different subjects, so that the information in the block chain is extremely difficult to tamper with.
In the application process of the block chain technology, block nodes of a terminal are involved, each block node is equivalent to a terminal, and necessary codes and resource packages must be loaded on the block nodes to participate in the operation of the whole system of the block chain. Among these, the encryption algorithm is a very important function for the blockchain. When the function implementation of the encryption algorithm is implemented in the form of a static library, which results in the need to update the encryption algorithm, the entire dynamic library must be updated, resulting in a high update cost.
Disclosure of Invention
Based on the foregoing problems, embodiments of the present application provide a method and an apparatus for updating an encryption module in a blockchain system, and a related product.
The embodiment of the application discloses the following technical scheme:
a method for updating an encryption module in a blockchain system, comprising:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included;
verifying the encryption module calling instruction according to the generated trapdoor, wherein the trapdoor is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code entry;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, comprises: the second plug-in project and the first plug-in project are in a mutual authenticity relationship through the created first plug-in project and the created second plug-in project, the plug-in project with a pseudo identity in the first plug-in project and the second plug-in project is used for managing the encryption algorithm code entry, and the plug-in project with a true identity in the first plug-in project and the second plug-in project is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, further comprises: and the plug-in project with a true identity in the first plug-in project and the second plug-in project calls the plug-in project with a false identity, so that the second encryption module is loaded in the plug-in frame loaded in the project warehouse in the form of the plug-in project.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, further comprises: and creating the first plug-in project and the second plug-in project in the created project warehouse through the created plug-in project declaration.
An apparatus for updating cryptographic modules in a blockchain system, comprising:
a first program unit for receiving an encryption module update request generated by a blockchain system;
a second program unit, configured to encrypt the encryption module update request using a security parameter to generate an encryption module fetch instruction, where a security dimension parameter value used for encryption is 100, so that a feature value dimension of the encryption module fetch instruction is equal to 2048, and the feature value dimension at least includes a receiving timestamp of the encryption module update request;
the third program unit is used for verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing hash operation according to a preset verification private key and a set encryption algorithm code entry;
a fourth program unit, configured to generate a project warehouse access request in response to that the cryptographic module fetching instruction is legal, so as to access a project warehouse in which a second cryptographic module replacing a first cryptographic module in the blockchain system is stored, where the first cryptographic module is loaded in the blockchain system in the form of a cryptographic plug-in, and the second cryptographic module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set cryptographic algorithm code entry;
a fourth program unit, configured to enable the project repository to authenticate the project repository access request, and if the authentication passes, update the first encryption module in the blockchain system to the second encryption module in a remote dependence manner.
Optionally, the fourth program element is further configured to: the second plug-in project and the first plug-in project are in a mutual authenticity relationship through the created first plug-in project and the created second plug-in project, the plug-in project with a pseudo identity in the first plug-in project and the second plug-in project is used for managing the encryption algorithm code entry, and the plug-in project with a true identity in the first plug-in project and the second plug-in project is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry.
Optionally, the fourth program element is further configured to: and the plug-in project with a true identity in the first plug-in project and the second plug-in project calls the plug-in project with a false identity, so that the second encryption module is loaded in the plug-in frame loaded in the project warehouse in the form of the plug-in project.
The apparatus according to claim 10, characterized in that the fourth program element is further adapted to: creating said first and second plug-in project in the created project repository by means of the created plug-in project declaration.
An electronic device comprising a memory having an executable program stored thereon and a processor that executes the executable program to perform the steps of:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included;
verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code inlet;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
A computer program product having an executable program stored thereon, the executable program when executed performing the steps of:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included;
verifying the encryption module calling instruction according to the generated trapdoor, wherein the trapdoor is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code entry;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
In the technical scheme of the embodiment of the application, an encryption module updating request generated by a block chain system is received; encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included; verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code inlet; if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code entry; and the project warehouse authenticates the project warehouse access request, if the authentication is passed, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode, so that the update of the encryption algorithm can be realized based on a plug-in, and the update cost of the encryption algorithm is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a flowchart illustrating a method for updating an encryption module in a block chain system according to an embodiment of the present disclosure;
FIG. 2 is a schematic structural diagram illustrating an apparatus for updating an encryption module in a blockchain system according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 4 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application.
Detailed Description
It is not necessary for any particular embodiment of the invention to achieve all of the above advantages at the same time.
In order to make those skilled in the art better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the technical scheme of the embodiment of the application, an encryption module updating request generated by a block chain system is received; encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included; verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code inlet; if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code entry; and the project warehouse authenticates the project warehouse access request, if the authentication is passed, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode, so that the update of the encryption algorithm can be realized based on a plug-in, and the update cost of the encryption algorithm is reduced.
Fig. 1 is a flowchart illustrating a method for updating an encryption module in a block chain system according to an embodiment of the present disclosure; as shown in fig. 1, it includes:
s101, receiving an encryption module updating request generated by a block chain system;
s102, encrypting the encryption module updating request by using the security parameters to generate an encryption module calling instruction;
in this embodiment, the security dimension parameter value used for encryption is 100, so that the feature value dimension of the instruction called by the encryption module is 2048, and the security dimension parameter value at least includes a receiving timestamp of the update request of the encryption module;
s103, verifying the encryption module calling instruction according to the generated trap door;
in this embodiment, the trapdoor is obtained by performing hash operation according to a predetermined verification private key and a set encryption algorithm code entry;
if so, executing S104: generating a project warehouse access request to access a project warehouse storing a second encryption module replacing a first encryption module in the blockchain system;
and if the request is illegal, rejecting the updating request of the encryption module.
In this embodiment, the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code entry;
and S105, the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, comprises: the second plug-in project and the first plug-in project are in a mutual authenticity relationship through the created first plug-in project and the created second plug-in project, the plug-in project with a pseudo identity in the first plug-in project and the second plug-in project is used for managing the encryption algorithm code entry, and the plug-in project with a true identity in the first plug-in project and the second plug-in project is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, further comprises: the plug-in project with a true identity in the first plug-in project and the second plug-in project calls the plug-in project with a false identity, so that the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of the plug-in project, thereby facilitating the quick embedding and calling of the plug-in and facilitating the subsequent upgrading of the encryption algorithm.
In this embodiment, the first plug-in project and the second plug-in project are in a mutual authenticity relationship, so that the management of the encryption algorithm code entry based on the plug-in project with the pseudo identity is realized, and the plug-in project with the real identity is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry, so that the mutual calling based on the plug-in projects is realized, and the data directness and efficiency are improved.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, further comprises: creating said first and second plug-in project in the created project repository by means of the created plug-in project declaration.
Illustratively, creating the first plug-in project and the second plug-in project in the created project repository through the created plug-in project declaration comprises: and the created plug-in project statement defines the generic argument as an execution entry of the encryption algorithm code according to the set generic argument to create a pseudo plug-in project statement and manage the encryption algorithm code entry through the plug-in project with a pseudo identity, so that the security performance of the encryption algorithm is improved and the attack is avoided.
In this embodiment, the plug-in project and the host project may be located in the same project local repository specifically by means of a mapping relationship between the plug-in project ID and the host project ID and the project local repository.
In this embodiment, based on the created plug-in project declaration, the creation of the first plug-in project and the second plug-in project can be quickly realized, and the real-time property of the encryption algorithm update is satisfied.
Optionally, the accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system, further comprises:
and calling the created plug-in project and the host project to create the project warehouse.
In this embodiment, creating the project repository based on the created plug-in project and host project may specifically include:
the plug-in project analyzes the created target declaration folder to determine a warehouse address and a dependent data packet, and the host project creates the plug-in project and the host project according to the warehouse address and the dependent data packet.
By analyzing the target declaration folder, the warehouse address and the dependent data packet can be quickly determined, so that the speed of creating the plug-in project and the host project is improved.
In this embodiment, the created target declaration folder may be specifically analyzed through a written script code file, an address of the target declaration file is specified in the script code file, a warehouse address and a dependent data packet are obtained from the address of the target declaration file, the address of the warehouse is specifically a warehouse address for storing a code, and the dependent data packet includes all data packets required for implementing encryption.
Optionally, the invoking the created plug-in project and the host project, and creating the project repository includes:
allocating IDs to the called plug-in project and the host project based on the set logic offset of the unique identifier;
creating a project repository based on the IDs assigned for the plug-in projects and hosting projects.
Illustratively, assigning IDs to called plug-in projects and host projects based on a set logical offset of unique identifiers may include: and distributing IDs for the plug-in project and the host project according to the set ID logic offset and the set ID anchor point location.
Through the logic offset and the set ID anchor point location, the allocation of the IDs of the plug-in project and the host project can be accurately realized. Specifically, the IDs of the plug-in project and the host project may be allocated by, for example, segment allocation.
Specifically, two logical offsets and an ID anchor location may be used, and the allocation of the IDs of the plug-in project and the host project is realized. Specifically, the ID of the plug-in project and the ID of the host project are calculated respectively by taking the ID anchor point location as a starting point and taking the logical offset as a step size.
Optionally, the invoking the created plug-in project and the host project, and creating the project repository, further includes:
and analyzing the created object declaration folder to determine a warehouse address and a dependent data packet, and creating a plug-in project and a host project according to the warehouse address and the dependent data packet.
Optionally, the allocating IDs for the called plug-in project and the host project based on the set logical offset of the unique identifier includes: and distributing IDs for the plug-in project and the host project according to the set ID logic offset and the set ID anchor point location.
Fig. 2 is a schematic structural diagram illustrating an apparatus for updating an encryption module in a blockchain system according to an embodiment of the present disclosure; as shown in fig. 2, it includes:
a first program unit 201, configured to receive an encryption module update request generated by a blockchain system;
a second program unit 202, configured to encrypt the encryption module update request by using a security parameter to generate an encryption module invoking instruction, where a security dimension parameter value used for encryption is 100, so that a feature value dimension of the encryption module invoking instruction is equal to 2048, and the feature value dimension at least includes a receiving timestamp of the encryption module update request;
the third program unit 203 is configured to verify the encryption module call instruction according to the generated trapdoor, where the trapdoor is obtained by performing a hash operation according to a predetermined verification private key and a set encryption algorithm code entry;
a fourth program unit 204, configured to generate a project warehouse access request in response to that the cryptographic module fetching instruction is legal, so as to access a project warehouse in which a second cryptographic module replacing a first cryptographic module in the blockchain system is stored, where the first cryptographic module is loaded in the blockchain system in the form of a cryptographic plug-in, and the second cryptographic module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set cryptographic algorithm code entry;
a fifth program element 205, configured to enable the project repository to authenticate the project repository access request, and if the authentication is passed, update the first encryption module in the blockchain system to the second encryption module in a remote dependency manner.
Optionally, the fourth program element is further configured to: the second plug-in project and the first plug-in project are in a mutual authenticity relationship through the created first plug-in project and the created second plug-in project, the plug-in project with a pseudo identity in the first plug-in project and the second plug-in project is used for managing the encryption algorithm code entry, and the plug-in project with a true identity in the first plug-in project and the second plug-in project is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry.
Optionally, the fourth program element is further configured to: and the plug-in project with a true identity in the first plug-in project and the second plug-in project calls the plug-in project with a false identity, so that the second encryption module is loaded in the plug-in frame loaded in the project warehouse in the form of the plug-in project.
The apparatus according to claim 10, characterized in that the fourth program element is further adapted to: and creating the first plug-in project and the second plug-in project in the created project warehouse through the created plug-in project declaration.
Optionally, the fourth program element is further configured to:
and calling the created plug-in project and the host project to create the project warehouse.
Optionally, the fourth program element is further configured to:
allocating IDs to the called plug-in project and the host project based on the set logic offset of the unique identifier;
creating a project repository based on the IDs assigned for the plug-in projects and hosting projects.
Optionally, the fourth program element is further configured to:
and analyzing the created object declaration folder to determine a warehouse address and a dependent data packet, and creating a plug-in project and a host project according to the warehouse address and the dependent data packet.
Optionally, the fourth program element is further configured to: and distributing IDs for the plug-in project and the host project according to the set ID logic offset and the set ID anchor point location.
Fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application; as shown in fig. 3, it includes a memory 301 and a processor 302, the memory stores an executable program, and the processor executes the executable program and executes the following steps:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of the security dimension parameter used for encryption is 100, so that the feature value dimension of the encryption module calling instruction is equal to 2048, and the feature value dimension at least comprises a receiving timestamp of the encryption module updating request;
verifying the encryption module calling instruction according to the generated trapdoor, wherein the trapdoor is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code entry;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
Fig. 4 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application; as shown in fig. 4, the hardware structure of the electronic device may include: a processor 401, a communication interface 402, a computer-readable medium 403, and a communication bus 404;
the processor 401, the communication interface 402, and the computer-readable medium 403 are configured to communicate with each other via a communication bus 404;
optionally, the communication interface 402 may be an interface of a communication module, such as an interface of a GSM module;
the processor 401 may be specifically configured to run an executable program stored in the memory, so as to perform all or part of the processing steps of any of the above-described method embodiments.
The electronic device of the embodiments of the present application exists in various forms, including but not limited to:
(1) Mobile communication devices, which are characterized by mobile communication capabilities and are primarily targeted at providing voice and data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
(4) The server is similar to a general computer architecture, but has higher requirements on processing capability, stability, reliability, safety, expandability, manageability and the like because of the need of providing high-reliability service.
(5) And other electronic devices with data interaction functions.
It should be noted that, in this specification, each embodiment is described in a progressive manner, and the same and similar parts between the embodiments are referred to each other, and each embodiment focuses on differences from other embodiments. In particular, for the apparatus and system embodiments, since they are substantially similar to the method embodiments, they are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described embodiments of the apparatus and system are merely illustrative, and the modules illustrated as separate components may or may not be physically separate, and the components suggested as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement without inventive effort.
The above description is only one specific embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (10)
1. A method for updating an encryption module in a blockchain system, comprising:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included;
verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code inlet;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
2. The method of claim 1, wherein accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system comprises: the second plug-in project and the first plug-in project are in a mutual authenticity relationship through the created first plug-in project and the created second plug-in project, the plug-in project with a pseudo identity in the first plug-in project and the second plug-in project is used for managing the encryption algorithm code entry, and the plug-in project with a true identity in the first plug-in project and the second plug-in project is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry.
3. The method of claim 2, wherein accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system further comprises: and the plug-in project with a true identity in the first plug-in project and the second plug-in project calls the plug-in project with a false identity, so that the second encryption module is loaded in the plug-in frame loaded in the project warehouse in the form of the plug-in project.
4. The method of claim 2, wherein accessing a project repository storing a second cryptographic module that replaces a first cryptographic module in the blockchain system further comprises: and creating the first plug-in project and the second plug-in project in the created project warehouse through the created plug-in project declaration.
5. An apparatus for updating cryptographic modules in a blockchain system, comprising:
a first program unit for receiving an encryption module update request generated by a block chain system;
a second program unit, configured to encrypt the encryption module update request using a security parameter, and generate an encryption module fetch instruction, where a security dimension parameter value used for encryption is 100, so that a feature value dimension of the encryption module fetch instruction is equal to 2048, and the feature value dimension at least includes a timestamp for receiving the encryption module update request;
the third program unit is used for verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing hash operation according to a preset verification private key and a set encryption algorithm code entry;
a fourth program unit, configured to, in response to that the cryptographic module fetching instruction is legal, generate a project warehouse access request to access a project warehouse in which a second cryptographic module replacing a first cryptographic module in the blockchain system is stored, where the first cryptographic module is loaded in the blockchain system in the form of a cryptographic plug-in, and the second cryptographic module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set cryptographic algorithm code entry;
a fourth program unit, configured to enable the project repository to authenticate the project repository access request, and if the authentication passes, update the first encryption module in the blockchain system to the second encryption module in a remote dependence manner.
6. The apparatus of claim 9, wherein the fourth program unit is further configured to: the second plug-in project and the first plug-in project are in a mutual authenticity relationship through the created first plug-in project and the created second plug-in project, the plug-in project with a pseudo identity in the first plug-in project and the second plug-in project is used for managing the encryption algorithm code entry, and the plug-in project with a true identity in the first plug-in project and the second plug-in project is used for enabling the plug-in project with the pseudo identity to access the encryption algorithm code entry.
7. The apparatus according to claim 10, characterized in that the fourth program element is further adapted to: and the plug-in project with a true identity in the first plug-in project and the second plug-in project calls the plug-in project with a false identity, so that the second encryption module is loaded in the plug-in frame loaded in the project warehouse in the form of the plug-in project.
8. The apparatus according to claim 10, characterized in that the fourth program element is further adapted to: and creating the first plug-in project and the second plug-in project in the created project warehouse through the created plug-in project declaration.
9. An electronic device, comprising a memory and a processor, wherein the memory stores an executable program, and the processor executes the executable program to perform the following steps:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of a security dimension parameter used for encryption is 100, so that the dimension of a characteristic value of the encryption module calling instruction is equal to 2048, and the receiving timestamp of the encryption module updating request is at least included;
verifying the encryption module calling instruction according to the generated trap door, wherein the trap door is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code inlet;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
10. A computer program product having an executable program stored thereon, the executable program when executed performs the steps of:
receiving an encryption module updating request generated by a block chain system;
encrypting the encryption module updating request by using a security parameter to generate an encryption module calling instruction, wherein the value of the security dimension parameter used for encryption is 100, so that the feature value dimension of the encryption module calling instruction is equal to 2048, and the feature value dimension at least comprises a receiving timestamp of the encryption module updating request;
verifying the encryption module calling instruction according to the generated trapdoor, wherein the trapdoor is obtained by performing Hash operation according to a preset verification private key and a set encryption algorithm code entry;
if the encryption algorithm code is legal, generating a project warehouse access request to access a project warehouse which stores a second encryption module replacing a first encryption module in the blockchain system, wherein the first encryption module is loaded in the blockchain system in the form of an encryption plug-in, and the second encryption module is loaded in a plug-in frame loaded in the project warehouse in the form of a plug-in project through the set encryption algorithm code inlet;
and the project warehouse authenticates the project warehouse access request, and if the project warehouse access request passes the authentication, the first encryption module in the block chain system is updated to the second encryption module in a remote dependence mode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210974693.9A CN115391801A (en) | 2022-08-15 | 2022-08-15 | Method and device for updating encryption module in block chain system and related products |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210974693.9A CN115391801A (en) | 2022-08-15 | 2022-08-15 | Method and device for updating encryption module in block chain system and related products |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115391801A true CN115391801A (en) | 2022-11-25 |
Family
ID=84118260
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210974693.9A Pending CN115391801A (en) | 2022-08-15 | 2022-08-15 | Method and device for updating encryption module in block chain system and related products |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115391801A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116204910A (en) * | 2023-04-27 | 2023-06-02 | 暗链科技(深圳)有限公司 | Plug-in hash encryption method, nonvolatile readable storage medium and electronic device |
-
2022
- 2022-08-15 CN CN202210974693.9A patent/CN115391801A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116204910A (en) * | 2023-04-27 | 2023-06-02 | 暗链科技(深圳)有限公司 | Plug-in hash encryption method, nonvolatile readable storage medium and electronic device |
CN116204910B (en) * | 2023-04-27 | 2023-08-18 | 暗链科技(深圳)有限公司 | Plug-in hash encryption method, nonvolatile readable storage medium and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110036613B (en) | System and method for providing identity authentication for decentralized applications | |
CN111262889B (en) | Authority authentication method, device, equipment and medium for cloud service | |
US9792374B2 (en) | Method and system for facilitating terminal identifiers | |
JP6022718B2 (en) | Configuration and validation by trusted providers | |
JP6371919B2 (en) | Secure software authentication and verification | |
CN110570196A (en) | Transaction data processing method and device, terminal equipment and storage medium | |
CN111506327B (en) | Block chain node hot upgrading method and related equipment | |
CN111338608B (en) | Distributed application development method and device, node equipment and readable storage medium | |
CN107483987B (en) | Authentication method and device for video stream address | |
CN111159657A (en) | Application program authentication method and system | |
CN112597485B (en) | Information checking method, device and equipment based on block chain and storage medium | |
CN115248919A (en) | Method and device for calling function interface, electronic equipment and storage medium | |
CN115391801A (en) | Method and device for updating encryption module in block chain system and related products | |
CN110910110A (en) | Data processing method and device and computer storage medium | |
CN113542405A (en) | Block chain-based network communication system, method, device and storage medium | |
CN111046440B (en) | Tamper verification method and system for secure area content | |
CN113986132A (en) | Method, device and related product for sharing storage resources in heterogeneous network | |
CN112738043A (en) | Method, system and related product for carrying out legality authentication on user identity in big data system | |
CN112865981A (en) | Token obtaining and verifying method and device | |
CN117040930B (en) | Resource processing method, device, product, equipment and medium of block chain network | |
CN112165399B (en) | Method and device for processing block link point faults based on credible root metrics and related products | |
CN110245518B (en) | Data storage method, device and equipment | |
CN114531486B (en) | Industrial Internet data processing method, device, equipment and storage medium | |
CN115248931A (en) | Plug-in method and device for encryption algorithm in block chain technology and related product | |
CN117896156A (en) | Data credibility verification method, information sending equipment, verification system and related device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |