CN108377187B - Block chain private key using method and device based on biological characteristics - Google Patents
Block chain private key using method and device based on biological characteristics Download PDFInfo
- Publication number
- CN108377187B CN108377187B CN201810235765.1A CN201810235765A CN108377187B CN 108377187 B CN108377187 B CN 108377187B CN 201810235765 A CN201810235765 A CN 201810235765A CN 108377187 B CN108377187 B CN 108377187B
- Authority
- CN
- China
- Prior art keywords
- biological characteristics
- private key
- client
- server
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a block chain private key using method and device based on biological characteristics, which comprises the steps of collecting the biological characteristics at a client and generating a block chain private key according to the biological characteristics and salt values; carrying out hash operation on the biological characteristics at the client, transmitting a hash value and a salt value of the biological characteristics to the server, receiving the hash value and the salt value of the biological characteristics at the server, and storing the hash value and the salt value of the biological characteristics in a corresponding form; collecting biological characteristics at a client and obtaining a block chain private key according to the biological characteristics and a salt value; the method comprises the steps of collecting biological characteristics at a client, carrying out hash operation on the biological characteristics, transmitting hash values of the biological characteristics to a server, receiving the hash values of the biological characteristics at the server, reading corresponding salt values according to the stored hash values of the biological characteristics, transmitting the salt values to the client, receiving the salt values at the client, and generating a block chain private key according to the biological characteristics and the salt values.
Description
Technical Field
The present invention relates to the field of communications, and more particularly, to a method and an apparatus for using a blockchain private key based on biometrics.
Background
The BlockChain (BlockChain) is an important technical innovation in the financial field, and the technology is considered as a next-generation subversive core technology after a steamer, electric power and the internet, and can be used in various fields such as intelligent contracts, stock exchange, electronic commerce, internet of things and the like. The block chain technology is a distributed book which combines and applies a point-to-point network technology, cryptography and a distributed consensus protocol. The distributed mode is a typical characteristic of a block chain, no third party participates, and a set of non-tampered whole network accounts is maintained among mutually untrustworthy or weakly-trusted participants. The account book is maintained by all nodes together, and each node participating in maintenance can be copied to obtain a complete account book copy. Hash and asymmetric encryption and decryption algorithms are used in the block chain to ensure the safety and the non-tampering of the block chain. The private key of the asymmetric encryption and decryption algorithm is the identity of the user, and the user generates a public key and an account address through the private key to perform transaction signature. If the private key is lost or stolen, the user's property cannot be retrieved or compromised.
The private key in the block chain in the prior art is any random number, and is stored in the following way:
1) and (3) off-line cold storage: printing or copying on paper, and storing paper medium safely; or stored in a storage medium such as a USB flash disk;
2) the client stores: the private key is managed by using the wallet, and the private key needs to be backed up periodically, so that the wallet is convenient to use;
3) platform hosting: and storing the private key ciphertext through the remote server.
The three ways, except that the off-line cold storage can resist the attack of hackers, but the usability is poor. The three modes are not easy to recover after being lost, and property loss is caused because the private key is lost or stolen. Meanwhile, the private key of the block chain is stored in an offline medium, a server or a user side in a plaintext or ciphertext mode, and a third party can possibly acquire the complete information of the private key under the condition that no user participates.
Aiming at the problems that the block chain private key is difficult to resist hacker attack and is not easy to recover in the prior art, no effective solution is provided at present.
Disclosure of Invention
In view of the above, an object of the embodiments of the present invention is to provide a method and an apparatus for using a blockchain private key based on biometrics, so that the blockchain private key can resist hacking and is easy to recover.
In view of the above, an aspect of the embodiments of the present invention provides a method for using a blockchain private key based on biometrics, including the following steps:
collecting biological characteristics at a client and generating a block chain private key according to the biological characteristics and the salt value;
carrying out hash operation on the biological characteristics at the client, transmitting a hash value and a salt value of the biological characteristics to the server, receiving the hash value and the salt value of the biological characteristics at the server, and storing the hash value and the salt value of the biological characteristics in a corresponding form;
collecting biological characteristics at a client and obtaining a block chain private key according to the biological characteristics and a salt value;
the method comprises the steps of collecting biological characteristics at a client, carrying out hash operation on the biological characteristics, transmitting hash values of the biological characteristics to a server, receiving the hash values of the biological characteristics at the server, reading corresponding salt values according to the stored hash values of the biological characteristics, transmitting the salt values to the client, receiving the salt values at the client, and generating a block chain private key according to the biological characteristics and the salt values.
In some embodiments, the biometric characteristic comprises at least one of: fingerprints, irises, palm prints, and common information; the salt value is a random number generated by the client or a predetermined number stored by the client, input by the user, or obtained by the server.
In some embodiments, the salt value is stored in encrypted form in the server, and the hash value of the biometric is stored in the server as an index to the corresponding salt value.
In some embodiments, the blockchain private key is generated from the biometric and the salt value, and the blockchain private key is generated for use with one or more irreversible single trapdoor functions.
In some embodiments, the hash operation is any one or a combination of any plurality of irreversible operations.
In some embodiments, the client and the server use a two-key encryption system, and the hash value and the salt value of the biometric are transmitted between the client and the server in a manner having encryption and a digital signature through one or more of key agreement, a certificate, a secure channel.
On the other hand, the embodiment of the invention also provides a device for using the block chain private key based on the biological characteristics, and the method is used.
In another aspect of the embodiments of the present invention, there is also provided a computer device including a memory, at least one processor, and a computer program stored on the memory and executable on the processor, the processor executing the program to perform the method described above.
In another aspect of the embodiments of the present invention, a computer-readable storage medium is further provided, in which a computer program is stored, and the computer program is executed by a processor to perform the above method.
In another aspect of the embodiments of the present invention, there is also provided a computer program product including a computer program stored on a computer-readable storage medium, the computer program including instructions which, when executed by a computer, cause the computer to perform the above method.
The invention has the following beneficial technical effects: according to the method and the device for using the block chain private key based on the biological characteristics, the biological characteristics are collected at the client side, and the block chain private key is generated according to the biological characteristics and the salt value; storing the hash value and the salt value of the biological characteristic in a corresponding form at the server; the server receives the hash value of the biological characteristics, reads the corresponding salt value according to the stored hash value of the biological characteristics and transmits the salt value to the client, and the client receives the salt value and generates the block chain private key according to the biological characteristics and the salt value, so that the block chain private key can resist hacker attacks and is easy to recover.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are required to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
FIG. 1 is a flow chart of a method for using a block chain private key based on biometrics according to the present invention;
FIG. 2 is a detailed flowchart of a portion of a method for using a biockchain private key according to the present invention;
FIG. 3 is a detailed flowchart of another part of the method for using the biometric-based blockchain private key according to the present invention;
fig. 4 is a schematic hardware structure diagram of an embodiment of a computer device for executing the method for using a biocharacteristic-based blockchain private key according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
In view of the above, a first aspect of the embodiments of the present invention provides a method for using a biometric-based blockchain private key. Fig. 1 is a flow chart illustrating a method for using a blockchain private key based on biometrics according to the present invention.
The block chain private key using method based on the biological characteristics comprises the following steps:
step S101, collecting biological characteristics at a client and generating a block chain private key according to the biological characteristics and a salt value;
step S103, carrying out hash operation on the biological characteristics at the client, transmitting the hash value and the salt value of the biological characteristics to the server, receiving the hash value and the salt value of the biological characteristics at the server, and storing the hash value and the salt value of the biological characteristics in a corresponding form;
step S105, collecting biological characteristics at a client and obtaining a block chain private key according to the biological characteristics and the salt value;
and S107, collecting the biological characteristics at the client, carrying out hash operation on the biological characteristics, transmitting the hash value of the biological characteristics to the server, receiving the hash value of the biological characteristics at the server, reading the corresponding salt value according to the stored hash value of the biological characteristics, transmitting the salt value to the client, receiving the salt value at the client, and generating the block chain private key according to the biological characteristics and the salt value.
In the embodiment of the present invention, step S101 is a step of generating a blockchain private key, step S103 is a step of storing the blockchain private key, step S105 is a step of using the blockchain private key, and step S107 is a step of recovering the blockchain private key when the salt value is lost.
Fig. 2 shows step S101 to step S103. As shown in fig. 2, a user enters a biometric I (information such as a fingerprint) at a client. The client generates a random number R as a salt value S, and the biometric feature and the random number generate a block chain private key through a series of operations (such as Hash (I) S).
As shown in fig. 2, in the storing step, the client generates a public-private key pair pub through an asymmetric algorithmc、pricAnd generates a random number R, performs a signature operation Sig (hash (R) handshake mark, pub) using a private keyc) And send the signature to the remote server. Server side obtains pub of client sidecSignature verification is carried out, and a public and private key pair pub is generated after the verification is passeds、prisEncrypting the Hash (R) and handshake mark by using the public key of the client end, pubc(Hash (R) handshake mark) signature operation Sig (pub) using private keyc(Hash (R) | handshake flag), pubs) And sends the signature to the client. Client-side obtaining server public key pubsAnd after the signature verification of the server is passed, decrypting by using a private key to obtain a Hash value (R), comparing the Hash value with the Hash value generated by the R, and after the comparison is passed, successfully handshaking between the client and the server. The client then computes a Hash (I)) using the server public key pubsEncrypt the Hash (I), salt, and sign Sig (pub) using private keys(Hash (I)), S)), the signature is sent to the server. After the server verifies the signature of the client, the Hash (Hash (I)) is obtained through private key decryption, and S, the Hash (Hash (I)) is used as an index to store a salt value ciphertext in the server. The user can directly store the salt value plaintext in other modes according to the requirement, so that the private key recovery can be conveniently carried out when the server cannot respond. The client stores the salt value S by using a symmetric algorithm, and stores a hash value of the salt value S.
Fig. 3 shows steps S105 to S107. As shown in fig. 3, the user enters the biometric I at the client, consistent with the biometric used for private key generation. The client decrypts to obtain a salt value S ', and if the Hash (S') is consistent with the stored Hash (S), the Hash (I) I S) generates a block chain private key for transaction; otherwise, recovering the private key.
As shown in fig. 3, in the recovery step, the client and the server repeat the handshake manner in the private key storage to obtain the public key of the other party. The client acquires the user biological characteristic I and calculates Hash (I)). By the server public key pubs' encrypted Hash (I)), Sig (pub) signed by clients' (Hash (I))) to the server. After the server side checks the signature, the server private key pri is useds' decryption obtains Hash (I)) and obtains salt ciphertext for index, and the client public key pub is used after decryptionc' encrypt salt S, Sig (pub) after server signc' (S)) to the client. After the client checks the signature, the client private key pub is usedcAnd decrypting to obtain a salt value S, and repeating the private key generation mode to recover the private key. After the private key is recovered, the client stores the salt value S ciphertext and Hash (S). On the other hand, if the user directly recovers the private key by adopting other modes, the salt value S ' is directly input, the private key generation mode is repeated to generate the private key ', and the public key is generated through the private key ', so that the account address is generated. Whether the private key recovery is successful is determined by matching the public key or the account address.
In some embodiments, the biometric characteristic comprises at least one of: fingerprints, irises, palm prints, and common information; the salt value is a random number generated by the client or a predetermined number stored by the client, input by the user, or obtained by the server.
Any biometric that is unique, not easily altered, and not easily stolen can be used as the biometric used in embodiments of the present invention. On the other hand, any number capable of salifying the result of the hash operation may be used as the salt, and a random number is just one of the preferred embodiments.
In some embodiments, the salt value is stored in encrypted form in the server, and the hash value of the biometric is stored in the server as an index to the corresponding salt value.
In some embodiments, the blockchain private key is generated from the biometric and the salt value, and the blockchain private key is generated for use with one or more irreversible single trapdoor functions.
In some embodiments, the hash operation is any one or a combination of any plurality of irreversible operations. The irreversible operation is intended to make the hash value function in fact as a message digest.
In some embodiments, the client and the server use a two-key encryption system, and the hash value and the salt value of the biometric are transmitted between the client and the server in a manner having encryption and a digital signature through one or more of key agreement, a certificate, a secure channel.
It can be seen from the foregoing embodiments that, in the method for using a biocharacteristics-based blockchain private key according to the embodiments of the present invention, the client collects the biological traits and generates the blockchain private key according to the biological traits and the salt value; storing the hash value and the salt value of the biological characteristic in a corresponding form at the server; the server receives the hash value of the biological characteristics, reads the corresponding salt value according to the stored hash value of the biological characteristics and transmits the salt value to the client, and the client receives the salt value and generates the block chain private key according to the biological characteristics and the salt value, so that the block chain private key can resist hacker attacks and is easy to recover. In the embodiment of the invention, the block chain private key is not stored, only the salt value is stored, and the client and the server can not obtain the complete block chain private key on the premise of no user biological characteristics. Compared with the ways of private key encryption storage, key division and the like, the way is safer. Meanwhile, the biological characteristics participate in the generation of the private key, the salt value is disturbed, the private key is ensured to have multiple characteristics of user identity and randomness, and the requirement of multiple private keys of a single user is met. Because the biological characteristics have the characteristics of uniqueness, difficult change, difficult stealing and the like, the user does not need to perform regular management or backup. Even if the salt value is stolen or lost, the private key and the user biological characteristics are not influenced safely.
It should be particularly noted that, the steps in the embodiments of the method for using a biockchain private key based on a biometric characteristic described above can be mutually intersected, replaced, added, and deleted, so that these reasonable permutation and combination transformations of the method for using a biockchain private key based on a biometric characteristic also belong to the scope of the present invention, and should not limit the scope of the present invention to the described embodiments.
In view of the above objects, a second aspect of the embodiments of the present invention provides an apparatus for using a biometric-based blockchain private key.
It can be seen from the foregoing embodiments that, in the device for using a biocharacteristics-based blockchain private key according to the embodiments of the present invention, the client collects the biological traits and generates the blockchain private key according to the biological traits and the salt value; storing the hash value and the salt value of the biological characteristic in a corresponding form at the server; the server receives the hash value of the biological characteristics, reads the corresponding salt value according to the stored hash value of the biological characteristics and transmits the salt value to the client, and the client receives the salt value and generates the block chain private key according to the biological characteristics and the salt value, so that the block chain private key can resist hacker attacks and is easy to recover. In the embodiment of the invention, the block chain private key is not stored, only the salt value is stored, and the client and the server can not obtain the complete block chain private key on the premise of no user biological characteristics. Compared with the ways of private key encryption storage, key division and the like, the way is safer. Meanwhile, the biological characteristics participate in the generation of the private key, the salt value is disturbed, the private key is ensured to have multiple characteristics of user identity and randomness, and the requirement of multiple private keys of a single user is met. Because the biological characteristics have the characteristics of uniqueness, difficult change, difficult stealing and the like, the user does not need to perform regular management or backup. Even if the salt value is stolen or lost, the private key and the user biological characteristics are not influenced safely.
It should be particularly noted that the above-mentioned embodiment of the apparatus for using a biocharacteristic-based blockchain private key uses an embodiment of the method for using a biocharacteristic-based blockchain private key to specifically describe the working processes of the modules, and those skilled in the art can easily think that the modules are applied to other embodiments of the method for using a biocharacteristic-based blockchain private key. Of course, since the steps in the embodiment of the method for using the biocharacteristics-based blockchain private key can be mutually intersected, replaced, added, and deleted, these reasonable permutation and combination transformations should also belong to the scope of the present invention, and should not limit the scope of the present invention to the embodiment.
In view of the above, a third aspect of the embodiments of the present invention provides an embodiment of a computer device for executing the method for using a biometric-based blockchain private key.
The computer device for executing the method for using the block chain private key based on the biological characteristics comprises a memory, at least one processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the program to execute any one of the methods.
Fig. 4 is a schematic hardware structure diagram of a computer device for executing the method for using a biocharacteristic-based blockchain private key according to an embodiment of the present invention.
Taking the computer device shown in fig. 4 as an example, the computer device includes a processor 401 and a memory 402, and may further include: an input device 403 and an output device 404.
The processor 401, the memory 402, the input device 403 and the output device 404 may be connected by a bus or other means, and fig. 4 illustrates an example of a connection by a bus.
The memory 402, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the biometric-based blockchain private key using method in the embodiments of the present application. The processor 401 executes various functional applications of the server and data processing, namely, implementing the biometric-based blockchain private key using method of the above-described method embodiment, by executing the nonvolatile software program, instructions and modules stored in the memory 402.
The memory 402 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created from use of the biometric-based blockchain private key using device, and the like. Further, the memory 402 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 402 may optionally include memory located remotely from processor 401, which may be connected to local modules via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 403 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the biometric-based blockchain private key using device. The output device 404 may include a display device such as a display screen.
Program instructions/modules corresponding to the one or more biometric-based blockchain private key usage methods are stored in the memory 402 and, when executed by the processor 401, perform the biometric-based blockchain private key usage method of any of the above-described method embodiments.
Any of the embodiments of the computer device for performing the biometric-based blockchain private key usage method may achieve the same or similar effects as any of the previous method embodiments corresponding thereto.
In view of the above object, a fourth aspect of the embodiments of the present invention provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program can execute the method for using the biometric-based blockchain private key in any of the above method embodiments and the apparatus/system for using the biometric-based blockchain private key in any of the above apparatus/system embodiments. Embodiments of the computer-readable storage medium may achieve the same or similar effects as any of the aforementioned method and apparatus/system embodiments corresponding thereto.
In view of the above object, a fifth aspect of the embodiments of the present invention proposes a computer program product, which includes a computer program stored on a computer-readable storage medium, the computer program including instructions that, when executed by a computer, cause the computer to execute the method for using a biometric-based blockchain private key in any of the above method embodiments and the apparatus/system for using a biometric-based blockchain private key in any of the above apparatus/system embodiments. Embodiments of the computer program product may achieve the same or similar effects as any of the aforementioned method and apparatus/system embodiments corresponding thereto.
Finally, it should be noted that, as will be understood by those skilled in the art, all or part of the processes of the methods of the above embodiments may be implemented by a computer program, which may be stored in a computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like. Embodiments of the computer program may achieve the same or similar effects as any of the preceding method embodiments to which it corresponds.
In addition, the apparatuses, devices and the like disclosed in the embodiments of the present invention may be various electronic terminal devices, such as a mobile phone, a Personal Digital Assistant (PDA), a tablet computer (PAD), a smart television and the like, or may be a large terminal device, such as a server and the like, and therefore the scope of protection disclosed in the embodiments of the present invention should not be limited to a specific type of apparatus, device. The client disclosed in the embodiment of the present invention may be applied to any one of the above electronic terminal devices in the form of electronic hardware, computer software, or a combination of both.
Furthermore, the method disclosed according to an embodiment of the present invention may also be implemented as a computer program executed by a CPU, and the computer program may be stored in a computer-readable storage medium. The computer program, when executed by the CPU, performs the above-described functions defined in the method disclosed in the embodiments of the present invention.
Further, the above method steps and system elements may also be implemented using a controller and a computer readable storage medium for storing a computer program for causing the controller to implement the functions of the above steps or elements.
Further, it should be appreciated that the computer-readable storage media (e.g., memory) described herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of example, and not limitation, nonvolatile memory can include Read Only Memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which can act as external cache memory. By way of example and not limitation, RAM is available in a variety of forms such as synchronous RAM (DRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The storage devices of the disclosed aspects are intended to comprise, without being limited to, these and other suitable types of memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with the following components designed to perform the functions described herein: a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP, and/or any other such configuration.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary designs, the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk, blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a," "an," "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of an embodiment of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.
Claims (7)
1. A block chain private key using method based on biological characteristics is characterized by comprising the following steps:
generating a private key of the block chain: collecting the biological characteristics at a client and generating a block chain private key according to the biological characteristics and the salt value;
and a storage step of the private key of the block chain: performing hash operation on the biological characteristics at a client, transmitting the hash value and the salt value of the biological characteristics to a server, receiving the hash value and the salt value of the biological characteristics at the server, and storing the hash value and the salt value of the biological characteristics in a corresponding form;
the use step of the private key of the block chain comprises the following steps: collecting the biological characteristics at a client and obtaining the block chain private key according to the biological characteristics and the salt value;
and (3) recovering the private key of the block chain when the salt value is lost: collecting the biological characteristics at a client, carrying out hash operation on the biological characteristics and transmitting a hash value of the biological characteristics to a server, receiving the hash value of the biological characteristics at the server, reading the corresponding salt value according to the stored hash value of the biological characteristics and transmitting the salt value to the client, receiving the salt value at the client and generating the block chain private key according to the biological characteristics and the salt value,
wherein said salt value is stored in encrypted form in the server and a hash value of said biometric is stored in the server as an index to the corresponding said salt value.
2. The method of claim 1, wherein the biometric characteristic comprises at least one of: fingerprints, irises and palm prints; the salt value is a random number generated by the client, or a predetermined number stored by the client, input by the user, or obtained by the server.
3. The method of claim 1, wherein the blockchain private key is generated based on the biometric and the salt value, and wherein the blockchain private key is generated using one or more irreversible single trapdoor functions.
4. The method of claim 1, wherein the hash operation is any one or a combination of any plurality of irreversible operations.
5. The method of claim 1, wherein the client and the server use a two-key encryption system, and wherein the hash value of the biometric and the salt value are transmitted between the client and the server with encryption and digital signatures via one or more of key agreement, certificates, secure channels.
6. A computer device comprising a memory, at least one processor and a computer program stored on the memory and executable on the processor, characterized in that the processor performs the method according to any of claims 1-5 when executing the program.
7. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the method of any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810235765.1A CN108377187B (en) | 2018-03-21 | 2018-03-21 | Block chain private key using method and device based on biological characteristics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810235765.1A CN108377187B (en) | 2018-03-21 | 2018-03-21 | Block chain private key using method and device based on biological characteristics |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108377187A CN108377187A (en) | 2018-08-07 |
CN108377187B true CN108377187B (en) | 2022-03-04 |
Family
ID=63018933
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810235765.1A Active CN108377187B (en) | 2018-03-21 | 2018-03-21 | Block chain private key using method and device based on biological characteristics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108377187B (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108667815A (en) * | 2018-04-18 | 2018-10-16 | 价值互联(广州)信息技术有限公司 | Block chain secret key encipher-decipher method, device and terminal based on bio-identification |
CN110826034B (en) * | 2018-08-14 | 2022-09-02 | 珠海金山办公软件有限公司 | File signature method and device, electronic equipment and readable storage medium |
CN110912683B (en) * | 2018-09-18 | 2022-09-23 | 阿里巴巴集团控股有限公司 | Password storage method and device and password verification method and device |
US10970372B2 (en) * | 2018-11-01 | 2021-04-06 | Microsoft Technology Licensing, Llc | Revocable biometric print based identification |
CN109660327A (en) * | 2018-12-19 | 2019-04-19 | 上海和数软件有限公司 | Block chain encryption method, device and readable storage medium storing program for executing based on iris |
CN109658078B (en) * | 2018-12-19 | 2021-04-30 | 上海和数软件有限公司 | Block chain private key generation method, device and medium based on biological characteristics |
CN110599167A (en) * | 2019-09-09 | 2019-12-20 | 深圳四方精创资讯股份有限公司 | Identifier-based wallet private key management method, device and system and storage medium |
CN111130751A (en) * | 2019-11-04 | 2020-05-08 | 杭州云萃流图网络科技有限公司 | Appointment information processing method, device and system based on block chain and electronic equipment |
CN110995410A (en) * | 2019-11-12 | 2020-04-10 | 杭州云萃流图网络科技有限公司 | Method, device, equipment and medium for generating public key and private key |
US11798342B2 (en) | 2019-11-25 | 2023-10-24 | International Business Machines Corporation | Managing physical objects using crypto-anchors |
US11397760B2 (en) | 2019-11-25 | 2022-07-26 | International Business Machines Corporation | Managing relationships between persons and physical objects based on physical fingerprints of the physical objects |
CN112115491B (en) * | 2020-08-20 | 2024-03-22 | 恒安嘉新(北京)科技股份公司 | Symmetric encryption key protection method, device, equipment and storage medium |
CN112054898B (en) * | 2020-08-27 | 2022-10-25 | 中信银行股份有限公司 | User private key backup and recovery method and device and electronic equipment |
CN112217807B (en) * | 2020-09-25 | 2022-09-16 | 山西特信环宇信息技术有限公司 | Cone block chain key generation method, authentication method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101013943A (en) * | 2007-02-14 | 2007-08-08 | 北京邮电大学 | Method for binding/recovering key using fingerprint details |
CN101674299A (en) * | 2009-10-16 | 2010-03-17 | 西安电子科技大学 | Method for generating key based on amalgamation of multiple features in encryption area |
CN107819571A (en) * | 2017-09-29 | 2018-03-20 | 广东中科南海岸车联网技术有限公司 | The generation method and device of private key |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104954328B (en) * | 2014-03-27 | 2018-11-30 | 阿里巴巴集团控股有限公司 | A kind of method and device of online registration and certification |
CN106302336A (en) * | 2015-05-25 | 2017-01-04 | 四川长虹电器股份有限公司 | A kind of method, system and equipment realizing user fingerprints safety based on cloud computing |
CN105631675B (en) * | 2015-11-30 | 2019-06-11 | 东莞酷派软件技术有限公司 | Information acquisition method and device, terminal |
CN105812126B (en) * | 2016-05-19 | 2018-10-12 | 齐鲁工业大学 | Lightweight backup and the efficient restoration methods of healthy block chain data encryption key |
CN106548345B (en) * | 2016-12-07 | 2020-08-21 | 北京信任度科技有限公司 | Method and system for realizing block chain private key protection based on key partitioning |
CN106789096A (en) * | 2017-03-30 | 2017-05-31 | 山东超越数控电子有限公司 | A kind of biological characteristic cipher authentication method and device |
CN107623569A (en) * | 2017-09-30 | 2018-01-23 | 矩阵元技术(深圳)有限公司 | Block chain key escrow and restoration methods, device based on Secret sharing techniques |
CN107528688B (en) * | 2017-09-30 | 2020-04-21 | 矩阵元技术(深圳)有限公司 | Block chain key keeping and recovering method and device based on encryption delegation technology |
CN107733656A (en) * | 2017-10-23 | 2018-02-23 | 北京深思数盾科技股份有限公司 | A kind of cipher authentication method and device |
-
2018
- 2018-03-21 CN CN201810235765.1A patent/CN108377187B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101013943A (en) * | 2007-02-14 | 2007-08-08 | 北京邮电大学 | Method for binding/recovering key using fingerprint details |
CN101674299A (en) * | 2009-10-16 | 2010-03-17 | 西安电子科技大学 | Method for generating key based on amalgamation of multiple features in encryption area |
CN107819571A (en) * | 2017-09-29 | 2018-03-20 | 广东中科南海岸车联网技术有限公司 | The generation method and device of private key |
Also Published As
Publication number | Publication date |
---|---|
CN108377187A (en) | 2018-08-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108377187B (en) | Block chain private key using method and device based on biological characteristics | |
US10785035B1 (en) | Anti-replay attack authentication protocol | |
CN110603783B (en) | Secure dynamic threshold signature scheme using trusted hardware | |
US10785019B2 (en) | Data transmission method and apparatus | |
US8670563B2 (en) | System and method for designing secure client-server communication protocols based on certificateless public key infrastructure | |
US11223486B2 (en) | Digital signature method, device, and system | |
CN111639361A (en) | Block chain key management method, multi-person common signature method and electronic device | |
CN110519046B (en) | Quantum communication service station key negotiation method and system based on one-time asymmetric key pair and QKD | |
US20200228311A1 (en) | Lightweight encryption, authentication, and verification of data moving to and from intelligent devices | |
CN110381055B (en) | RFID system privacy protection authentication protocol method in medical supply chain | |
CN101399666A (en) | Safety control method and system for digital certificate of file | |
CN108696518B (en) | Block chain user communication encryption method and device, terminal equipment and storage medium | |
CN113630248B (en) | Session key negotiation method | |
CN109257183A (en) | Arbitration quantum signature method based on quantum migration Teleportation | |
CN114900304A (en) | Digital signature method and apparatus, electronic device, and computer-readable storage medium | |
JP2010231404A (en) | System, method, and program for managing secret information | |
Tiwari et al. | ACDAS: Authenticated controlled data access and sharing scheme for cloud storage | |
CN110690969A (en) | Method and system for completing bidirectional SSL/TLS authentication in cooperation of multiple parties | |
Resende et al. | PUF-based mutual multifactor entity and transaction authentication for secure banking | |
Ashraf et al. | Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication | |
Amin et al. | Anonymity preserving secure hash function based authentication scheme for consumer USB mass storage device | |
Verbücheln | How perfect offline wallets can still leak bitcoin private keys | |
CN117294417A (en) | Secure communication system, method and storage medium | |
Zhu et al. | Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography. | |
Zhu | Cryptanalysis and improvement of a mobile dynamic ID authenticated key agreement scheme based on chaotic maps |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 250104 No. 2877 Kehang Road, Sun Village Town, Jinan High-tech Zone, Shandong Province Applicant after: Chaoyue Technology Co.,Ltd. Address before: 250104 No. 2877 Kehang Road, Sun Village Town, Jinan High-tech Zone, Shandong Province Applicant before: SHANDONG CHAOYUE DATA CONTROL ELECTRONICS Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |