CN108377187A - A kind of block chain private key application method and device based on biological characteristic - Google Patents

A kind of block chain private key application method and device based on biological characteristic Download PDF

Info

Publication number
CN108377187A
CN108377187A CN201810235765.1A CN201810235765A CN108377187A CN 108377187 A CN108377187 A CN 108377187A CN 201810235765 A CN201810235765 A CN 201810235765A CN 108377187 A CN108377187 A CN 108377187A
Authority
CN
China
Prior art keywords
biological characteristic
salt
private key
block chain
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810235765.1A
Other languages
Chinese (zh)
Other versions
CN108377187B (en
Inventor
赵瑞东
李婷
朱书杉
孙晓妮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Chaoyue CNC Electronics Co Ltd
Original Assignee
Shandong Chaoyue CNC Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Chaoyue CNC Electronics Co Ltd filed Critical Shandong Chaoyue CNC Electronics Co Ltd
Priority to CN201810235765.1A priority Critical patent/CN108377187B/en
Publication of CN108377187A publication Critical patent/CN108377187A/en
Application granted granted Critical
Publication of CN108377187B publication Critical patent/CN108377187B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of block chain private key application method and device based on biological characteristic are included in client acquisition biological characteristic and generate block chain private key according to biological characteristic and salt figure;Biological characteristic is carried out in client hash operation and the Hash Value of biological characteristic and salt figure to be transmitted to server, the Hash Value of biological characteristic is received in server and salt figure and is stored the Hash Value of biological characteristic and salt figure in the form of corresponding;Biological characteristic is acquired in client and block chain private key is obtained according to biological characteristic and salt figure;Biological characteristic is acquired, hash operation is carried out to biological characteristic and the Hash Value of biological characteristic is transmitted to server in client, the Hash Value of biological characteristic is received, corresponding salt figure is read according to the Hash Value of the biological characteristic of storage and salt figure is transmitted to client in server, receives salt figure in client and according to biological characteristic and salt figure generation block chain private key.

Description

A kind of block chain private key application method and device based on biological characteristic
Technical field
The present invention relates to the communications fields, and are used more particularly, to a kind of block chain private key based on biological characteristic Method and apparatus.
Background technology
Block chain (BlockChain) is the important technology innovation of financial field, and technique is considered as after steam After mechanical, electrical power and internet, next-generation subversive core technology, in intelligent contract, securities trading, e-commerce, Internet of Things The every field such as net can use this technology.Block chain technology is by point to point network technology, cryptography and distributed common recognition The distributed account book of agreement triplicity application.Distribution is the characteristic feature of block chain, participates in without third party, is not believing mutually Appoint or the participant of weak trust between maintain a set of the whole network account book that can not be distorted.This account book safeguarded jointly by all nodes, often A equal reproducible of the node for participating in safeguarding obtains a complete account book copy.It is calculated using Hash and asymmetric encryption and decryption in block chain Method ensures the safety of block chain and can not distort.The private key of wherein asymmetric enciphering and deciphering algorithm is the identity of user, and user passes through Private key generates public key and account address, is traded signature.If private key is lost or is stolen, the property of user will be unable to give for change or It is on the hazard.
Private key is arbitrary random number in the block chain of the prior art, is stored in the following manner:
1) offline cold storage:It prints or is copied on paper on paper, secure storage paper delivery medium;Or it is stored in the storages such as USB flash disk Medium;
2) client stores:Private key is managed using wallet, private key needs schedule backup, easy to use;
3) platform trustship:Pass through remote server storage private key ciphertext.
This three kinds of modes, in addition to offline cold storage can resist hacker attack, but ease for use is poor.This three kinds of modes are being lost It is not easy to restore after mistake, property loss will be led to by losing or being stolen because of private key.Meanwhile the private key of block chain in plain text or The mode of ciphertext is stored in offline media, server or user terminal, and in the case where no user participates in, third party has can The complete information of private key can be obtained.
The problem of being difficult to resist hacker attack for block chain private key in the prior art and being not easy to restore, at present there has been no Effective solution scheme.
Invention content
In view of this, the purpose of the embodiment of the present invention is to propose a kind of block chain private key user based on biological characteristic Method and device so that block chain private key can resist hacker attack and be easy to restore.
Based on above-mentioned purpose, the one side of the embodiment of the present invention, which provides a kind of block chain private key based on biological characteristic, to be made With method, include the following steps:
Biological characteristic is acquired in client and block chain private key is generated according to biological characteristic and salt figure;
Hash operation is carried out to biological characteristic in client and the Hash Value of biological characteristic and salt figure are transmitted to server, The Hash Value of biological characteristic is received in server and salt figure and is deposited the Hash Value of biological characteristic and salt figure in the form of corresponding Storage;
Biological characteristic is acquired in client and block chain private key is obtained according to biological characteristic and salt figure;
In client acquisition biological characteristic, hash operation is carried out to biological characteristic and is transmitted to the Hash Value of biological characteristic Server receives the Hash Value of biological characteristic in server, reads corresponding salt according to the Hash Value of the biological characteristic of storage Salt figure is simultaneously transmitted to client by value, is received salt figure in client and is generated block chain private key according to biological characteristic and salt figure.
In some embodiments, biological characteristic includes at least one of:Fingerprint, iris, palmmprint and common letter Breath;Salt figure is the random number generated by client, or is client storage, input by user or by server end acquisition Predetermined number.
In some embodiments, store salt figure in an encrypted form in the server, and in the server using as The Hash Value of the form storage biological characteristic of the index of corresponding salt figure.
In some embodiments, block chain private key is generated according to biological characteristic and salt figure, for use it is one or more not Reversible single trapdoor function generates block chain private key.
In some embodiments, hash operation is any one irreversible operation or a variety of arbitrary a variety of irreversible operations Combination.
In some embodiments, client and server uses dual key encryption system, and the Hash Value of biological characteristic With salt figure between clients and servers by one or more to have encryption in key agreement, certificate, escape way It is transmitted with the mode of digital signature.
The another aspect of the embodiment of the present invention additionally provides a kind of block chain private key use device based on biological characteristic, The above method is used.
The another aspect of the embodiment of the present invention additionally provides a kind of computer equipment, including memory, at least one processing On a memory and the computer program that can run on a processor, when processor execution program, executes above-mentioned for device and storage Method.
The another aspect of the embodiment of the present invention additionally provides a kind of computer readable storage medium, computer-readable storage Media storage has computer program, and above-mentioned method is executed when computer program is executed by processor.
The another aspect of the embodiment of the present invention, additionally provides a kind of computer program product, and computer program product includes The calculation procedure being stored on computer readable storage medium, calculation procedure include instruction, when executed by the processor, are made Computer executes the above method.
The present invention has following advantageous effects:Block chain private key provided in an embodiment of the present invention based on biological characteristic Application method and device, by acquiring biological characteristic in client and generating block chain private key according to biological characteristic and salt figure; Server stores the Hash Value of biological characteristic and salt figure in the form of corresponding;The hash of biological characteristic is received in server Value reads corresponding salt figure according to the Hash Value of the biological characteristic of storage and salt figure is transmitted to client, is terminated in client It receives salt figure and generates the technical solution of block chain private key according to biological characteristic and salt figure so that block chain private key can resist hacker It attacks and is easy to restore.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to the required attached drawing of embodiment It is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, general for this field For logical technical staff, without creative efforts, other drawings may also be obtained based on these drawings.
Fig. 1 is the flow diagram of the block chain private key application method provided by the invention based on biological characteristic;
Fig. 2 is a part of detail flowchart of the block chain private key application method provided by the invention based on biological characteristic;
Fig. 3 is another part detailed process of the block chain private key application method provided by the invention based on biological characteristic Figure;
Fig. 4 is the computer equipment of the block chain private key application method based on biological characteristic described in execution provided by the invention One embodiment hardware architecture diagram.
Specific implementation mode
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with specific embodiment, and reference The embodiment of the present invention is further described in attached drawing.
It should be noted that all statements for using " first " and " second " are for differentiation two in the embodiment of the present invention The non-equal entity of a same names or non-equal parameter, it is seen that " first " " second " only for the convenience of statement, does not answer It is interpreted as the restriction to the embodiment of the present invention, subsequent embodiment no longer illustrates this one by one.
Based on above-mentioned purpose, the first aspect of the embodiment of the present invention, it is proposed that a kind of block chain based on biological characteristic The method that private key uses.Fig. 1 shows the flow of the block chain private key application method provided by the invention based on biological characteristic Schematic diagram.
The block chain private key application method based on biological characteristic, includes the following steps:
Step S101 acquires biological characteristic in client and generates block chain private key according to biological characteristic and salt figure;
Step S103 carries out hash operation to biological characteristic in client and transmits the Hash Value of biological characteristic and salt figure To server, server receive biological characteristic Hash Value and salt figure and by the Hash Value of biological characteristic and salt figure with corresponding Form storage;
Step S105 acquires biological characteristic in client and obtains block chain private key according to biological characteristic and salt figure;
Step S107 acquires biological characteristic in client, carries out hash operation to biological characteristic and by the miscellaneous of biological characteristic Value of gathering is transmitted to server, the Hash Value reading of the Hash Value in server reception biological characteristic, the biological characteristic according to storage Salt figure is simultaneously transmitted to client by corresponding salt figure, is received salt figure in client and is generated block according to biological characteristic and salt figure Chain private key.
In embodiments of the present invention, step S101 is the generation step of block chain private key, and step S103 is block chain private key Storing step, step S105 is the use step of block chain private key, and step S107 is block chain private key when salt figure is lost Recovering step.
Fig. 2 shows be step S101 to step S103.As shown in Fig. 2, user client typing biological characteristic I (such as The information such as fingerprint).Client generates random number R as salt figure S, and biological characteristic passes through a series of operation (such as Hash with random number (Hash (I) | S)) generate block chain private key.
As shown in Fig. 2, client generates public and private key to pub by asymmetric arithmetic in storing stepc、pric, and it is raw At random number R, using private key carry out signature operation Sig (Hash (R) | mark of shaking hands, pubc), and signature is sent to long-range clothes Business device.Server end obtains the pub of clientcSignature verification is carried out, public and private key is generated after being verified to pubs、pris, make Pub is encrypted to Hash (R), mark of shaking hands with the public key of clientc(Hash (R) | mark of shaking hands), signed using private key Name operation Sig (pubc(Hash (R) | mark of shaking hands), pubs), and signature is sent to client.It is public that client obtains server Key pubs, server signature verification is carried out, after sign test passes through, is decrypted using private key and obtains Hash (R), and with generation R's Hash value is compared, and after comparison passes through, client and server is shaken hands success.Then, client calculates Hash (Hash (I)), using server public key pubsHash (Hash (I)), salt figure are encrypted, signature Sig (pub are carried out using private keys (Hash (Hash (I)), S)), signature is sent to server.After client signature is crossed in server authentication, obtained by private key decryption Hash (Hash (I)), S are taken, is in the server index storage salt figure ciphertext with Hash (Hash (I)).User according to demand, can With directly otherwise storage salt figure in plain text, private key recovery is carried out when server cannot respond to facilitate.Client uses Symmetry algorithm stores salt figure S, the Hash Value of storage salt figure S.
Fig. 3 shows step S105 to step S107.As shown in figure 3, user is in client typing biological characteristic I, with It is consistent that private key generates the biological characteristic used.Client decryption obtains salt figure S ', if Hash (S ') and stored Hash (S) one It causes, then Hash (Hash (I) | S) generates block chain private key, is traded;Otherwise private key recovery is carried out.
As shown in figure 3, client repeats the handshake method acquisition other side in private key storage with server in recovering step Public key.Client obtains user biological feature I, and calculates Hash (Hash (I)).Pass through server public key pubs' encryption Hash (Hash (I)), by Sig (pub after client signatures' (Hash (Hash (I)))) it is sent to server.After server end sign test, Use privacy key pris' decryption obtains Hash (Hash (I)), and this obtains salt figure ciphertext for index, visitor is used after decryption Family end public key pubc' encryption salt figure S, by Sig (pub after server signaturec' (S)) it is sent to client.After client sign test, make With client private key pubc' decryption acquisition salt figure S, it repeats private key generating mode and carries out private key recovery.After private key restores, client Store salt figure S ciphertexts, Hash (S).On the other hand, if user directly uses other modes to restore private key, salt figure S ' is directly inputted, Repeat private key generating mode and generate private key ', pass through private key ' public key is generated, and then generate account address.By match public key or Account address, determines whether private key recovery succeeds.
In some embodiments, biological characteristic includes at least one of:Fingerprint, iris, palmmprint and common letter Breath;Salt figure is the random number generated by client, or is client storage, input by user or by server end acquisition Predetermined number.
It is any that there is uniqueness, not malleable and the biological characteristic for being not easy to steal all can serve as the embodiment of the present invention and made Biological characteristic.On the other hand, any number for capableing of salinization hash operation result can be used as salt figure, and random number is One of them preferable embodiment.
In some embodiments, store salt figure in an encrypted form in the server, and in the server using as The Hash Value of the form storage biological characteristic of the index of corresponding salt figure.
In some embodiments, block chain private key is generated according to biological characteristic and salt figure, for use it is one or more not Reversible single trapdoor function generates block chain private key.
In some embodiments, hash operation is any one irreversible operation or a variety of arbitrary a variety of irreversible operations Combination.Irreversible operation is intended to Hash Value and is in fact playing the role of eap-message digest.
In some embodiments, client and server uses dual key encryption system, and the Hash Value of biological characteristic With salt figure between clients and servers by one or more to have encryption in key agreement, certificate, escape way It is transmitted with the mode of digital signature.
From above-described embodiment as can be seen that the block chain private key user provided in an embodiment of the present invention based on biological characteristic Method, by acquiring biological characteristic in client and generating block chain private key according to biological characteristic and salt figure;Server will be biological The Hash Value and salt figure of feature are stored in the form of corresponding;The Hash Value of biological characteristic is received in server, according to storage The Hash Value of biological characteristic reads corresponding salt figure and salt figure is transmitted to client, receives salt figure in client and according to life Object feature and salt figure generate the technical solution of block chain private key so that block chain private key can resist hacker attack and be easy to extensive It is multiple.Memory block chain private key, storage salt figure do not ensure client, server in no user biological in the embodiment of the present invention Intact block chain private key can not be obtained under the premise of feature.Compared to modes such as private key encryption storage, Secret splittings, this mode is more Safety.Biological characteristic participates in private key and generates simultaneously, and salt figure upset, and is ensureing that private key is provided simultaneously with user identity and randomness Multiple characteristics also comply with the demand of the more private keys of single user.Since biological characteristic has uniqueness, not malleable and is not easy to steal Etc. features, without user carry out periodically manage or back up.It is special to private key and user biological even if salt figure is stolen or loses Sign does not have security implication.
It is important to note that in each embodiment of the above-mentioned block chain private key application method based on biological characteristic Each step can be intersected, replaces, increases, be deleted, and therefore, these rational permutation and combination become alternatively in based on biology The block chain private key application method of feature should also be as belonging to the scope of protection of the present invention, and should not be by protection scope of the present invention It is confined on the embodiment.
Based on above-mentioned purpose, the second aspect of the embodiment of the present invention, it is proposed that a kind of block chain based on biological characteristic The device that private key uses.
From above-described embodiment as can be seen that the block chain private key provided in an embodiment of the present invention based on biological characteristic uses dress It sets, by acquiring biological characteristic in client and generating block chain private key according to biological characteristic and salt figure;Server will be biological The Hash Value and salt figure of feature are stored in the form of corresponding;The Hash Value of biological characteristic is received in server, according to storage The Hash Value of biological characteristic reads corresponding salt figure and salt figure is transmitted to client, receives salt figure in client and according to life Object feature and salt figure generate the technical solution of block chain private key so that block chain private key can resist hacker attack and be easy to extensive It is multiple.Memory block chain private key, storage salt figure do not ensure client, server in no user biological in the embodiment of the present invention Intact block chain private key can not be obtained under the premise of feature.Compared to modes such as private key encryption storage, Secret splittings, this mode is more Safety.Biological characteristic participates in private key and generates simultaneously, and salt figure upset, and is ensureing that private key is provided simultaneously with user identity and randomness Multiple characteristics also comply with the demand of the more private keys of single user.Since biological characteristic has uniqueness, not malleable and is not easy to steal Etc. features, without user carry out periodically manage or back up.It is special to private key and user biological even if salt figure is stolen or loses Sign does not have security implication.
It is important to note that the embodiment of the above-mentioned block chain private key use device based on biological characteristic uses institute The embodiment of the block chain private key application method based on biological characteristic is stated to illustrate the course of work of each module, this field skill Art personnel can it is readily conceivable that by these module applications to the block chain private key application method based on biological characteristic its In his embodiment.Certainly, each step due to described in the block chain private key application method embodiment based on biological characteristic is equal It can intersect, replace, increase, delete, therefore, these rational permutation and combination become alternatively in described based on biological characteristic Block chain private key use device should also be as belonging to the scope of protection of the present invention, and should not be confined to protection scope of the present invention On the embodiment.
Based on above-mentioned purpose, in terms of the third of the embodiment of the present invention, it is proposed that be based on biological characteristic described in a kind of execution Block chain private key application method computer equipment one embodiment.
The computer equipment for executing the block chain private key application method based on biological characteristic includes memory, at least one On a memory and the computer program that can run on a processor, when processor execution program, executes for a processor and storage Any one of the above method.
As shown in figure 4, for the meter of the block chain private key application method based on biological characteristic described in execution provided by the invention Calculate the hardware architecture diagram of one embodiment of machine equipment.
Include a processor 401 and one in the computer equipment by taking computer equipment as shown in Figure 4 as an example Memory 402, and can also include:Input unit 403 and output device 404.
Processor 401, memory 402, input unit 403 and output device 404 can pass through bus or other modes It connects, in Fig. 4 for being connected by bus.
Memory 402 is used as a kind of non-volatile computer readable storage medium storing program for executing, can be used for storing non-volatile software journey Sequence, non-volatile computer executable program and module, the block based on biological characteristic as described in the embodiment of the present application Corresponding program instruction/the module of chain private key application method.Processor 401 is stored in non-volatile in memory 402 by operation Property software program, instruction and module, to execute server various function application and data processing, that is, realize above-mentioned side The block chain private key application method based on biological characteristic of method embodiment.
Memory 402 may include storing program area and storage data field, wherein storing program area can store operation system System, the required application program of at least one function;Storage data field can be stored according to the block chain private key based on biological characteristic Use device uses created data etc..It, can be in addition, memory 402 may include high-speed random access memory Including nonvolatile memory, for example, at least a disk memory, flush memory device or other non-volatile solid state memories Part.In some embodiments, it includes the memory remotely located relative to processor 401 that memory 402 is optional, these are remotely deposited Reservoir can pass through network connection to local module.The example of above-mentioned network includes but not limited to internet, intranet, office Domain net, mobile radio communication and combinations thereof.
Input unit 403 can receive the number or character information of input, and generate and the block chain based on biological characteristic The related key signals input of user setting and function control of private key use device.Output device 404 may include display screen etc. Show equipment.
One or more of corresponding program instruction/modules of block chain private key application method based on biological characteristic are deposited Storage in the memory 402, when being executed by the processor 401, execute in above-mentioned any means embodiment based on life The block chain private key application method of object feature.
Any one embodiment of the computer equipment for executing the block chain private key application method based on biological characteristic, It can achieve the effect that corresponding aforementioned any means embodiment is identical or similar.
Based on above-mentioned purpose, the 4th aspect of the embodiment of the present invention, it is proposed that a kind of computer readable storage medium, institute Stating computer-readable recording medium storage has computer program, which can perform above-mentioned arbitrary when being executed by processor In the block chain private key application method and the above-mentioned any device/system embodiment of realization based on biological characteristic in embodiment of the method Block chain private key use device/system based on biological characteristic.The embodiment of the computer readable storage medium, Ke Yida The effect identical or similar with device/system embodiment to corresponding aforementioned any means.
Based on above-mentioned purpose, the 5th aspect of the embodiment of the present invention, it is proposed that a kind of computer program product, the calculating Machine program product includes the calculation procedure being stored on computer readable storage medium, which includes instruction, when this When instruction is computer-executed, the computer is set to execute the block chain based on biological characteristic in above-mentioned any means embodiment private Key application method with realize in above-mentioned any device/system embodiment the block chain private key use device based on biological characteristic/ System.The embodiment of the computer program product can reach corresponding aforementioned any means and implement with device/system The identical or similar effect of example.
Finally, it should be noted that one of ordinary skill in the art will appreciate that realizing the whole in above-described embodiment method Or part flow, it can be completed by computer program to instruct related hardware, the program can be stored in a computer In read/write memory medium, the program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described Storage medium can be magnetic disc, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..The embodiment of the computer program can reach corresponding aforementioned The identical or similar effect of embodiment of the method for anticipating.
In addition, typically, it can be various electric terminal equipments, example that the embodiment of the present invention, which discloses described device, equipment etc., Such as mobile phone, personal digital assistant (PDA), tablet computer (PAD), smart television, can also be large-scale terminal device, such as service Device etc., therefore protection domain disclosed by the embodiments of the present invention should not limit as certain certain types of device, equipment.The present invention is real Apply example disclose the client can be applied to the combining form of electronic hardware, computer software or both it is above-mentioned arbitrary In a kind of electric terminal equipment.
In addition, disclosed method is also implemented as the computer program executed by CPU according to embodiments of the present invention, it should Computer program can store in a computer-readable storage medium.When the computer program is executed by CPU, the present invention is executed The above-mentioned function of being limited in method disclosed in embodiment.
In addition, above method step and system unit can also utilize controller and for storing so that controller is real The computer readable storage medium of the computer program of existing above-mentioned steps or Elementary Function is realized.
In addition, it should be appreciated that computer readable storage medium (for example, memory) as described herein can be volatile Property memory or nonvolatile memory, or may include both volatile memory and nonvolatile memory.As example And not restrictive, nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable to son ROM (EPROM), electrically erasable programmable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access Memory (RAM), the RAM can serve as external cache.As an example and not restrictive, RAM can be with more Kind form obtains, such as synchronous random access memory (DRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate SDRAM (DDR SDRAM), enhancing SDRAM (ESDRAM), synchronization link DRAM (SLDRAM) and directly Rambus RAM (DRRAM). The storage device of disclosed aspect is intended to the memory of including but not limited to these and other suitable type.
Those skilled in the art will also understand is that, various illustrative logical blocks, mould in conjunction with described in disclosure herein Block, circuit and algorithm steps may be implemented as the combination of electronic hardware, computer software or both.It is hard in order to clearly demonstrate This interchangeability of part and software, with regard to various exemplary components, square, module, circuit and step function to its into General description is gone.This function is implemented as software and is also implemented as hardware depending on concrete application and application To the design constraint of whole system.Those skilled in the art can in various ways realize described for each concrete application Function, but this realization decision should not be interpreted as causing a departure from range disclosed by the embodiments of the present invention.
Various illustrative logical blocks, module and circuit in conjunction with described in disclosure herein can be utilized and be designed to The following component of function described here is executed to realize or execute:General processor, digital signal processor (DSP), special collection At circuit (ASIC), field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, divide Any combinations of vertical hardware component or these components.General processor can be microprocessor, but alternatively, processing Device can be any conventional processors, controller, microcontroller or state machine.Processor can also be implemented as computing device Combination, for example, the combination of DSP and microprocessor, multi-microprocessor, one or more microprocessors combination DSP and/or any Other this configurations.
The step of method in conjunction with described in disclosure herein or algorithm, can be directly contained in hardware, be held by processor In capable software module or in combination of the two.Software module may reside within RAM memory, flash memory, ROM storages Device, eprom memory, eeprom memory, register, hard disk, removable disk, CD-ROM or known in the art it is any its In the storage medium of its form.Illustrative storage medium is coupled to processor so that processor can be from the storage medium Information is written to the storage medium in middle reading information.In an alternative, the storage medium can be with processor collection At together.Pocessor and storage media may reside in ASIC.ASIC may reside in user terminal.It is replaced at one In scheme, pocessor and storage media can be used as discrete assembly resident in the user terminal.
In one or more exemplary designs, the function can be real in hardware, software, firmware or its arbitrary combination It is existing.If realized in software, can be stored in using the function as one or more instruction or code computer-readable It is transmitted on medium or by computer-readable medium.Computer-readable medium includes computer storage media and communication media, The communication media includes any medium for helping computer program being transmitted to another position from a position.Storage medium It can be any usable medium that can be accessed by a general purpose or special purpose computer.As an example and not restrictive, the computer Readable medium may include RAM, ROM, EEPROM, CD-ROM or other optical disc memory apparatus, disk storage equipment or other magnetic Property storage device, or can be used for carry or storage form be instruct or data structure required program code and can Any other medium accessed by general or specialized computer or general or specialized processor.In addition, any connection can It is properly termed as computer-readable medium.For example, if using coaxial cable, optical fiber cable, twisted-pair feeder, digital subscriber line (DSL) or such as wireless technology of infrared ray, radio and microwave to send software from website, server or other remote sources, Then above-mentioned coaxial cable, optical fiber cable, twisted-pair feeder, DSL or such as wireless technology of infrared ray, radio and microwave are included in The definition of medium.As used herein, disk and CD include compact disk (CD), laser disk, CD, digital versatile disc (DVD), floppy disk, Blu-ray disc, wherein disk usually magnetically reproduce data, and CD using laser optics reproduce data.On The combination for stating content should also be as being included in the range of computer-readable medium.
It is exemplary embodiment disclosed by the invention above, it should be noted that in the sheet limited without departing substantially from claim Under the premise of inventive embodiments scope of disclosure, it may be many modifications and change.According to open embodiment described herein The function of claim to a method, step and/or action be not required to execute with any particular order.In addition, although the present invention is implemented Element can be described or be required in the form of individual disclosed in example, but be odd number unless explicitly limited, it is understood that be multiple.
It should be understood that it is used in the present context, unless context clearly supports exception, singulative " one It is a " (" a ", " an ", " the ") be intended to also include plural form.It is to be further understood that "and/or" used herein is Finger includes one or the arbitrary and all possible combinations of more than one project listed in association.
It is for illustration only that the embodiments of the present invention disclose embodiment sequence number, can not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can be stored in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
Those of ordinary skills in the art should understand that:The discussion of any of the above embodiment is exemplary only, not It is intended to imply that range disclosed by the embodiments of the present invention (including claim) is limited to these examples;In the think of of the embodiment of the present invention Under road, it can also be combined between the technical characteristic in above example or different embodiments, and exist as described above Many other variations of the different aspect of the embodiment of the present invention, for simplicity, they are not provided in details.Therefore, all at this Within the spirit and principle of inventive embodiments, any omission, modification, equivalent replacement, improvement for being made etc. should be included in this hair Within the protection domain of bright embodiment.

Claims (10)

1. a kind of block chain private key application method based on biological characteristic, which is characterized in that include the following steps:
The biological characteristic is acquired in client and block chain private key is generated according to the biological characteristic and salt figure;
Hash operation is carried out to the biological characteristic in client and transmits the Hash Value of the biological characteristic and the salt figure To server, server receive the biological characteristic Hash Value and the salt figure and by the Hash Value of the biological characteristic and The salt figure is stored in the form of corresponding;
The biological characteristic is acquired in client and the block chain private key is obtained according to the biological characteristic and the salt figure;
The biological characteristic is acquired in client, carries out hash operation to the biological characteristic and by the hash of the biological characteristic Value is transmitted to server, and the Hash Value of the biological characteristic is received, according to the hash of the biological characteristic of storage in server Value reads the corresponding salt figure and the salt figure is transmitted to client, receives the salt figure in client and according to described Biological characteristic and the salt figure generate the block chain private key.
2. according to the method described in claim 1, it is characterized in that, the biological characteristic includes at least one of:Fingerprint, rainbow Film, palmmprint and general information;The salt figure is the random number generated by client, or is client storage, user's input Or by server end obtain predetermined number.
3. according to the method described in claim 1, it is characterized in that, store the salt figure in an encrypted form in the server, And the Hash Value of the biological characteristic is stored in the form of the index as the corresponding salt figure in the server.
4. according to the method described in claim 1, it is characterized in that, generating the area according to the biological characteristic and the salt figure Block chain private key, to use one or more irreversible single trapdoor functions to generate the block chain private key.
5. according to the method described in claim 1, it is characterized in that, the hash operation is any one irreversible operation or more The combination of the arbitrary a variety of irreversible operations of kind.
6. according to the method described in claim 1, it is characterized in that, client and server use dual key encryption system, and The Hash Value of the biological characteristic and the salt figure pass through key agreement, certificate, escape way between clients and servers In one or more transmitted in a manner of with encrypted and digitally signed.
7. a kind of block chain private key use device based on biological characteristic, which is characterized in that any one using such as claim 1-6 Method described in.
8. a kind of computer equipment, including memory, at least one processor and it is stored on the memory and can be in institute State the computer program run on processor, which is characterized in that the processor executes such as claim when executing described program Method described in 1-6 any one.
9. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, feature to exist In perform claim requires the method described in 1-6 any one when the computer program is executed by processor.
10. a kind of computer program product, which is characterized in that the computer program product includes being stored in computer-readable deposit Calculation procedure on storage media, the calculation procedure include instruction, when described instruction is computer-executed, make the computer Perform claim requires the method described in 1-6 any one.
CN201810235765.1A 2018-03-21 2018-03-21 Block chain private key using method and device based on biological characteristics Active CN108377187B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810235765.1A CN108377187B (en) 2018-03-21 2018-03-21 Block chain private key using method and device based on biological characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810235765.1A CN108377187B (en) 2018-03-21 2018-03-21 Block chain private key using method and device based on biological characteristics

Publications (2)

Publication Number Publication Date
CN108377187A true CN108377187A (en) 2018-08-07
CN108377187B CN108377187B (en) 2022-03-04

Family

ID=63018933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810235765.1A Active CN108377187B (en) 2018-03-21 2018-03-21 Block chain private key using method and device based on biological characteristics

Country Status (1)

Country Link
CN (1) CN108377187B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108667815A (en) * 2018-04-18 2018-10-16 价值互联(广州)信息技术有限公司 Block chain secret key encipher-decipher method, device and terminal based on bio-identification
CN109658078A (en) * 2018-12-19 2019-04-19 上海和数软件有限公司 Block chain private key generation method, device and medium based on biological characteristic
CN109660327A (en) * 2018-12-19 2019-04-19 上海和数软件有限公司 Block chain encryption method, device and readable storage medium storing program for executing based on iris
CN110599167A (en) * 2019-09-09 2019-12-20 深圳四方精创资讯股份有限公司 Identifier-based wallet private key management method, device and system and storage medium
CN110826034A (en) * 2018-08-14 2020-02-21 珠海金山办公软件有限公司 File signature method and device, electronic equipment and readable storage medium
CN110912683A (en) * 2018-09-18 2020-03-24 阿里巴巴集团控股有限公司 Password storage method and device and password verification method and device
CN110995410A (en) * 2019-11-12 2020-04-10 杭州云萃流图网络科技有限公司 Method, device, equipment and medium for generating public key and private key
CN111130751A (en) * 2019-11-04 2020-05-08 杭州云萃流图网络科技有限公司 Appointment information processing method, device and system based on block chain and electronic equipment
CN112054898A (en) * 2020-08-27 2020-12-08 中信银行股份有限公司 User private key backup and recovery method and device and electronic equipment
CN112115491A (en) * 2020-08-20 2020-12-22 恒安嘉新(北京)科技股份公司 Symmetric encryption key protection method, device, equipment and storage medium
CN112217807A (en) * 2020-09-25 2021-01-12 山西特信环宇信息技术有限公司 Cone block chain key generation method, authentication method and system
WO2021105797A1 (en) * 2019-11-25 2021-06-03 International Business Machines Corpofiation Managing physical objects using crypto-anchors
US11397760B2 (en) 2019-11-25 2022-07-26 International Business Machines Corporation Managing relationships between persons and physical objects based on physical fingerprints of the physical objects

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101013943A (en) * 2007-02-14 2007-08-08 北京邮电大学 Method for binding/recovering key using fingerprint details
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area
CN104954328A (en) * 2014-03-27 2015-09-30 阿里巴巴集团控股有限公司 On-line registration and authentication method and apparatus
CN105631675A (en) * 2015-11-30 2016-06-01 东莞酷派软件技术有限公司 Information acquisition method, device, terminal
CN105812126A (en) * 2016-05-19 2016-07-27 齐鲁工业大学 Lightweight back-up and efficient restoration method of health block chain data encryption keys
CN106302336A (en) * 2015-05-25 2017-01-04 四川长虹电器股份有限公司 A kind of method, system and equipment realizing user fingerprints safety based on cloud computing
CN106548345A (en) * 2016-12-07 2017-03-29 北京信任度科技有限公司 The method and system of block chain private key protection are realized based on Secret splitting
CN106789096A (en) * 2017-03-30 2017-05-31 山东超越数控电子有限公司 A kind of biological characteristic cipher authentication method and device
CN107528688A (en) * 2017-09-30 2017-12-29 矩阵元技术(深圳)有限公司 A kind of keeping of block chain key and restoration methods, device based on encryption commission technology
CN107623569A (en) * 2017-09-30 2018-01-23 矩阵元技术(深圳)有限公司 Block chain key escrow and restoration methods, device based on Secret sharing techniques
CN107733656A (en) * 2017-10-23 2018-02-23 北京深思数盾科技股份有限公司 A kind of cipher authentication method and device
CN107819571A (en) * 2017-09-29 2018-03-20 广东中科南海岸车联网技术有限公司 The generation method and device of private key

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101013943A (en) * 2007-02-14 2007-08-08 北京邮电大学 Method for binding/recovering key using fingerprint details
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area
CN104954328A (en) * 2014-03-27 2015-09-30 阿里巴巴集团控股有限公司 On-line registration and authentication method and apparatus
CN106302336A (en) * 2015-05-25 2017-01-04 四川长虹电器股份有限公司 A kind of method, system and equipment realizing user fingerprints safety based on cloud computing
CN105631675A (en) * 2015-11-30 2016-06-01 东莞酷派软件技术有限公司 Information acquisition method, device, terminal
CN105812126A (en) * 2016-05-19 2016-07-27 齐鲁工业大学 Lightweight back-up and efficient restoration method of health block chain data encryption keys
CN106548345A (en) * 2016-12-07 2017-03-29 北京信任度科技有限公司 The method and system of block chain private key protection are realized based on Secret splitting
CN106789096A (en) * 2017-03-30 2017-05-31 山东超越数控电子有限公司 A kind of biological characteristic cipher authentication method and device
CN107819571A (en) * 2017-09-29 2018-03-20 广东中科南海岸车联网技术有限公司 The generation method and device of private key
CN107528688A (en) * 2017-09-30 2017-12-29 矩阵元技术(深圳)有限公司 A kind of keeping of block chain key and restoration methods, device based on encryption commission technology
CN107623569A (en) * 2017-09-30 2018-01-23 矩阵元技术(深圳)有限公司 Block chain key escrow and restoration methods, device based on Secret sharing techniques
CN107733656A (en) * 2017-10-23 2018-02-23 北京深思数盾科技股份有限公司 A kind of cipher authentication method and device

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108667815A (en) * 2018-04-18 2018-10-16 价值互联(广州)信息技术有限公司 Block chain secret key encipher-decipher method, device and terminal based on bio-identification
CN110826034A (en) * 2018-08-14 2020-02-21 珠海金山办公软件有限公司 File signature method and device, electronic equipment and readable storage medium
CN110912683A (en) * 2018-09-18 2020-03-24 阿里巴巴集团控股有限公司 Password storage method and device and password verification method and device
CN109658078B (en) * 2018-12-19 2021-04-30 上海和数软件有限公司 Block chain private key generation method, device and medium based on biological characteristics
CN109658078A (en) * 2018-12-19 2019-04-19 上海和数软件有限公司 Block chain private key generation method, device and medium based on biological characteristic
CN109660327A (en) * 2018-12-19 2019-04-19 上海和数软件有限公司 Block chain encryption method, device and readable storage medium storing program for executing based on iris
CN110599167A (en) * 2019-09-09 2019-12-20 深圳四方精创资讯股份有限公司 Identifier-based wallet private key management method, device and system and storage medium
CN111130751A (en) * 2019-11-04 2020-05-08 杭州云萃流图网络科技有限公司 Appointment information processing method, device and system based on block chain and electronic equipment
CN110995410A (en) * 2019-11-12 2020-04-10 杭州云萃流图网络科技有限公司 Method, device, equipment and medium for generating public key and private key
WO2021105797A1 (en) * 2019-11-25 2021-06-03 International Business Machines Corpofiation Managing physical objects using crypto-anchors
US11397760B2 (en) 2019-11-25 2022-07-26 International Business Machines Corporation Managing relationships between persons and physical objects based on physical fingerprints of the physical objects
GB2604565A (en) * 2019-11-25 2022-09-07 Ibm Managing physical objects using crypto-anchors
US11798342B2 (en) 2019-11-25 2023-10-24 International Business Machines Corporation Managing physical objects using crypto-anchors
CN112115491A (en) * 2020-08-20 2020-12-22 恒安嘉新(北京)科技股份公司 Symmetric encryption key protection method, device, equipment and storage medium
CN112115491B (en) * 2020-08-20 2024-03-22 恒安嘉新(北京)科技股份公司 Symmetric encryption key protection method, device, equipment and storage medium
CN112054898A (en) * 2020-08-27 2020-12-08 中信银行股份有限公司 User private key backup and recovery method and device and electronic equipment
CN112054898B (en) * 2020-08-27 2022-10-25 中信银行股份有限公司 User private key backup and recovery method and device and electronic equipment
CN112217807A (en) * 2020-09-25 2021-01-12 山西特信环宇信息技术有限公司 Cone block chain key generation method, authentication method and system
CN112217807B (en) * 2020-09-25 2022-09-16 山西特信环宇信息技术有限公司 Cone block chain key generation method, authentication method and system

Also Published As

Publication number Publication date
CN108377187B (en) 2022-03-04

Similar Documents

Publication Publication Date Title
CN108377187A (en) A kind of block chain private key application method and device based on biological characteristic
Qadir et al. A review paper on cryptography
US11238543B2 (en) Payroll based blockchain identity
CN111062716B (en) Method and device for generating block chain signature data and block chain transaction initiating system
US20200084027A1 (en) Systems and methods for encryption of data on a blockchain
KR102409819B1 (en) Distributed transaction propagation and verification system
WO2020082894A1 (en) Blockchain-based data deposit and acquisition methods and devices
CN110881063B (en) Storage method, device, equipment and medium of private data
JP2020528224A (en) Secure execution of smart contract operations in a reliable execution environment
CN110096903B (en) Asset verification method based on block chain and block chain network system
WO2020051710A1 (en) System and process for managing digitized security tokens
Ali et al. Blockchain and the future of the internet: A comprehensive review
CN111047324A (en) Method and apparatus for updating a set of public keys at a blockchain node
ul Hassan et al. Blockchain and the future of the internet: a comprehensive review
US11128457B2 (en) Cryptographic key generation using external entropy generation
CN110601855A (en) Root certificate management method and device, electronic equipment and storage medium
CN112749417A (en) Electronic academic certificate data protection and sharing system based on block chain
CA3184856A1 (en) Method, participatant unit, transaction register, and payment system for managing transaction data sets
CN108768636A (en) A method of restoring private key using multi-party collaboration
Gulati et al. Self-sovereign dynamic digital identities based on blockchain technology
Kamal et al. A Proposed hash algorithm to use for blockchain base transaction flow system
Boontaetae et al. RDI: Real digital identity based on decentralized PKI
Zhang et al. Data security in cloud storage
Durán et al. An architecture for easy onboarding and key life-cycle management in blockchain applications
CN112950356B (en) Personal loan processing method, system, equipment and medium based on digital identity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 250104 No. 2877 Kehang Road, Sun Village Town, Jinan High-tech Zone, Shandong Province

Applicant after: Chaoyue Technology Co.,Ltd.

Address before: 250104 No. 2877 Kehang Road, Sun Village Town, Jinan High-tech Zone, Shandong Province

Applicant before: SHANDONG CHAOYUE DATA CONTROL ELECTRONICS Co.,Ltd.

GR01 Patent grant
GR01 Patent grant