CN108847931B - Block chain key generation method and device based on biological identification result - Google Patents

Block chain key generation method and device based on biological identification result Download PDF

Info

Publication number
CN108847931B
CN108847931B CN201810659131.9A CN201810659131A CN108847931B CN 108847931 B CN108847931 B CN 108847931B CN 201810659131 A CN201810659131 A CN 201810659131A CN 108847931 B CN108847931 B CN 108847931B
Authority
CN
China
Prior art keywords
key
block chain
blockchain
features
preset algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810659131.9A
Other languages
Chinese (zh)
Other versions
CN108847931A (en
Inventor
张荣康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201810659131.9A priority Critical patent/CN108847931B/en
Publication of CN108847931A publication Critical patent/CN108847931A/en
Application granted granted Critical
Publication of CN108847931B publication Critical patent/CN108847931B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention discloses a block chain key generation method, a block chain key generation device and a computer storage medium based on a biological identification result, wherein the block chain key generation method based on the biological identification result comprises the following steps: acquiring biological characteristics and/or behavior characteristics of a user; identifying the acquired biological characteristics and/or behavior characteristics to obtain at least one biological identification result; and taking at least one biological identification result as a key seed, and calculating the key seed by using a preset algorithm to generate a block chain key for use in transaction. According to the technical scheme provided by the invention, at least one biological identification result is used as the key seed to generate the block chain key, so that a user does not need to specially memorize or keep the key seed or the block chain key, the safety is effectively improved, the key seed and the block chain key are prevented from being stolen by other people, and the block chain key generation mode is optimized.

Description

Block chain key generation method and device based on biological identification result
Technical Field
The invention relates to the technical field of internet, in particular to a block chain key generation method and device based on a biological identification result, a computing device and a computer storage medium.
Background
In the conventional block chain key generation method, various random numbers, such as a random number generated by an operating system, a random number generated by a high-precision clock, and the like, are mainly used as key seeds, or mnemonics are used as key seeds, and then a block chain key is generated by an encryption algorithm. The generated blockchain key is mostly a long string of completely irregular combinations of numbers, letters or other symbols, which are difficult for the user to remember, and similarly, random numbers or mnemonics as key seeds are difficult to remember. Therefore, it is difficult to keep the blockchain key and the key seed. Most users choose to store the blockchain key or the key seed, but the storage of the blockchain key or the key seed is at risk of theft, and once the blockchain key or the key seed is stolen, the digital assets of the users are lost.
Disclosure of Invention
In view of the above, the present invention has been made to provide a method, an apparatus, a computing device and a computer storage medium for generating a blockchain key based on a biometric result, which overcome or at least partially solve the above-mentioned problems.
According to an aspect of the present invention, there is provided a method for generating a blockchain key based on a biometric result, the method including:
acquiring biological characteristics and/or behavior characteristics of a user;
identifying the acquired biological characteristics and/or behavior characteristics to obtain at least one biological identification result;
and taking at least one biological identification result as a key seed, and calculating the key seed by using a preset algorithm to generate a block chain key for use in transaction.
According to another aspect of the present invention, there is provided a blockchain key generation apparatus based on a biometric result, the apparatus including:
the acquisition module is suitable for acquiring biological characteristics and/or behavior characteristics of a user;
the identification module is suitable for identifying the acquired biological characteristics and/or behavior characteristics to obtain at least one biological identification result;
and the key generation module is suitable for taking at least one biological identification result as a key seed, calculating the key seed by using a preset algorithm, and generating a block chain key for use in transaction.
According to yet another aspect of the present invention, there is provided a computing device comprising: the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction enables the processor to execute the operation corresponding to the block chain key generation method based on the biological identification result.
According to still another aspect of the present invention, there is provided a computer storage medium having at least one executable instruction stored therein, the executable instruction causing a processor to perform operations corresponding to the above block chain key generation method based on biometric identification results.
According to the technical scheme provided by the invention, the biological characteristics and/or the behavior characteristics of the user are acquired, the acquired biological characteristics and/or behavior characteristics are identified to obtain at least one biological identification result, then the at least one biological identification result is used as a key seed, the key seed is calculated by using a preset algorithm to generate a block chain key for use in transaction. By utilizing the technical scheme provided by the invention, at least one biological identification result can be conveniently adopted as the key seed to generate the block chain key, so that a user does not need to specially memorize or keep the key seed or the block chain key, the safety is effectively improved, the key seed and the block chain key are prevented from being stolen by other people, and the block chain key generation mode is optimized. When the digital assets are required to be operated, the user can quickly determine the own block chain key only by providing the inherent biological characteristics and/or behavior characteristics of the user, and the use of the user is greatly facilitated.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart illustrating a method for generating a blockchain key based on a biometric result according to an embodiment of the present invention;
FIG. 2a is a flow chart of a method for generating a blockchain key based on biometric results according to another embodiment of the present invention;
FIG. 2b is a schematic diagram of a generation process of a blockchain key;
fig. 3 is a block diagram showing a configuration of a biockchain key generation apparatus based on a biometric result according to an embodiment of the present invention;
FIG. 4 shows a schematic structural diagram of a computing device according to an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Fig. 1 is a flowchart illustrating a method for generating a blockchain key based on a biometric result according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
step S100, acquiring the biological characteristics and/or behavior characteristics of the user.
In the existing blockchain network, the user identity is mainly authenticated by using a blockchain key, and the blockchain key is generally generated by using a random number or a mnemonic word as a key seed, but since the random number, the mnemonic word and the blockchain key are all foreign objects, once the information is stolen by others, the user identity may be spoofed by others, so that the digital assets of the user are lost. To solve this problem, the present invention utilizes the inherent features that a user has to generate a blockchain key.
In particular, human beings have inherent biological characteristics and behavior characteristics, which are generally unique and difficult to forge and steal, and have the advantages of being "carried around" and readily available, so that the user's biological characteristics or behavior characteristics can be used to generate the blockchain key in the present invention, and the user's biological characteristics and behavior characteristics can also be used to generate the blockchain key. Wherein the biometric characteristic may comprise one or more of the following characteristics: fingerprint features, hand features, face features, iris features, retinal features, genetic features, and pulse features; the behavioral characteristics may include: voice features and/or signature features, etc. The person skilled in the art may set the biological and/or behavioral characteristics according to actual needs, and is not limited herein. Specifically, for a certain feature, a corresponding feature acquisition device may be used for acquisition, and then the acquired feature is acquired in step S100. Taking biological characteristics as fingerprint characteristics, the fingerprint may be collected by a fingerprint collector.
Step S101, identifying the acquired biological characteristics and/or behavior characteristics to obtain at least one biological identification result.
The acquired biological characteristics and/or behavior characteristics can be identified by using a preset identification method, so that at least one corresponding biological identification result is obtained. In particular, the at least one biometric identification result may comprise one or more of the following identification results: fingerprint recognition results, hand shape recognition results, face recognition results, voice print recognition results, iris recognition results, retina recognition results, gene recognition results, vein recognition results, and signature recognition results. The preset identification method and the at least one biometric identification result can be set by those skilled in the art according to actual needs, and are not specifically limited herein. For example, if the acquired biometric features are fingerprint features, the fingerprint features may be identified by using a fingerprint identification method in step S101 to obtain a fingerprint identification result; if the acquired biometric features are iris features, in step S101, iris features may be identified by using an iris identification method to obtain an iris identification result.
And S102, taking at least one biological identification result as a key seed, calculating the key seed by using a preset algorithm, and generating a block chain key for use in transaction.
And after the at least one biological identification result is obtained, taking the at least one biological identification result as a key seed, then calculating the key seed by using a preset algorithm, and taking the calculation result as a block chain key. The user may use the generated blockchain key to conduct a transaction, such as for receiving transaction revenue or paying for a transaction expenditure. The skilled person can select the preset algorithm according to the actual requirement, and the preset algorithm is not limited in detail here. Specifically, the preset algorithm may be a hash algorithm, such as SSHA256 algorithm. The hash algorithm is also called as a digest algorithm, and can convert any data into a data string with a fixed length through a function, wherein the data string is generally represented by a 16-system character string, a one-to-one mapping relationship is formed between the function and the data string, and the hash algorithm has no requirement on the data for calculation, so that the hash calculation can be conveniently performed on the data. In addition, different blockchain networks have different requirements on the blockchain key, so that the generated blockchain key is different for different blockchain networks so as to be suitable for the corresponding blockchain networks.
Because the block chain key is generated by adopting at least one biological identification result as the key seed, when a user needs to use the block chain key, the user only needs to provide biological characteristics and/or behavior characteristics, and then the method provided by the invention can be used for conveniently generating the block chain key, so that the user does not need to specially memorize or keep the key seed or the block chain key, thereby effectively improving the safety and preventing the key seed and the block chain key from being stolen by other people.
According to the block chain key generation method based on the biometric identification result provided by the embodiment, the biometric characteristics and/or the behavior characteristics of the user are acquired, the acquired biometric characteristics and/or behavior characteristics are identified to obtain at least one biometric identification result, then the at least one biometric identification result is used as a key seed, the key seed is calculated by using a preset algorithm, and a block chain key is generated for use in transaction. By utilizing the technical scheme provided by the invention, at least one biological identification result can be conveniently adopted as the key seed to generate the block chain key, so that a user does not need to specially memorize or keep the key seed or the block chain key, the safety is effectively improved, the key seed and the block chain key are prevented from being stolen by other people, and the block chain key generation mode is optimized. When the digital assets are required to be operated, the user can quickly determine the own block chain key only by providing the inherent biological characteristics and/or behavior characteristics of the user, and the use of the user is greatly facilitated.
Fig. 2a is a flowchart illustrating a method for generating a blockchain key based on a biometric result according to another embodiment of the present invention, as shown in fig. 2a, the method includes the following steps:
step S200, acquiring the biological characteristics and/or behavior characteristics of the user.
Specifically, the feature acquisition device may be used to acquire a biometric feature and/or a behavior feature of the user, and the biometric feature and/or the behavior feature acquired by the feature acquisition device is acquired through a preset interface in step S200. Wherein the biometric characteristic may comprise one or more of the following characteristics: fingerprint features, hand features, face features, iris features, retinal features, genetic features, and pulse features; the behavioral characteristics may include: voice features and/or signature features, etc. The person skilled in the art may set the biological and/or behavioral characteristics according to actual needs, and is not limited herein.
Step S201, using a biometric device to identify the acquired biometric features and/or behavior features, and obtaining at least one biometric result.
After the biological characteristics and/or the behavior characteristics are acquired, the acquired biological characteristics and/or behavior characteristics are identified by using the existing biological identification equipment, so that at least one corresponding biological identification result is obtained. Wherein the at least one biometric identification result may include one or more of the following identification results: fingerprint recognition results, hand shape recognition results, face recognition results, voice print recognition results, iris recognition results, retina recognition results, gene recognition results, vein recognition results, and signature recognition results. Taking the acquired biological characteristics as fingerprint characteristics and face shape characteristics as an example, the fingerprint characteristics can be identified by using the existing fingerprint identification equipment to obtain a fingerprint identification result, and the face shape characteristics can be identified by using the existing face identification equipment to obtain a face identification result. In addition, the biometric device may also be a mobile phone, a computer, or the like having a biometric function, and is not limited specifically here. In a specific application, the obtained biometric result may be information composed of numbers or the like so as to be used for generating the blockchain key.
Step S202, at least one biological identification result is used as a key seed, and the key seed is calculated by using a preset algorithm to generate a block chain key.
When the number of the at least one biological identification result is one, the biological identification result can be directly used as a key seed; when the number of the at least one biometric result is multiple, the multiple biometric results may be combined according to a preset combination rule, and the combined biometric result is used as a key seed. The preset combination rule can be set by a person skilled in the art according to actual needs, and is not specifically limited herein. Taking the example that the biological recognition result comprises a voiceprint recognition result and an iris recognition result, and the voiceprint recognition result and the iris recognition result are respectively a group of information consisting of numbers, the voiceprint recognition result and the iris recognition result can be subjected to operation processing such as addition, and then the operation result is used as a key seed.
After the key seed is determined, the key seed can be calculated by using a preset algorithm such as a hash algorithm, and the block chain key is generated. Specifically, the key seeds may be calculated by using different preset algorithms, so as to generate different blockchain keys. In the present invention, the blockchain key is specifically a private key, and then after the blockchain key is generated, the corresponding public key can be generated by calculating the blockchain key using an asymmetric encryption algorithm.
Optionally, the generated blockchain key may further include: a blockchain root key and a blockchain subkey. Specifically, the key seed is calculated by using a first preset algorithm to generate a blockchain root key, then the blockchain root key is calculated by using a second preset algorithm to generate a blockchain subkey corresponding to the blockchain root key, and then the blockchain subkey corresponding to the blockchain root key is calculated by using a third preset algorithm to generate a blockchain subkey corresponding to the blockchain subkey. Similarly, the block chain subkey corresponding to the block chain subkey may also be calculated by using other preset algorithms, so as to generate more block chain subkeys. The number of the required block chain subkeys can be determined by those skilled in the art according to actual needs, and is not limited in detail here.
Fig. 2b shows a schematic diagram of a generation process of the blockchain key, and as shown in fig. 2b, the key seed is calculated by using a first preset algorithm to generate a blockchain root key, where the generated blockchain root key is the key a. And calculating the block chain root key by using a second preset algorithm, wherein the generated block chain sub-keys corresponding to the block chain root key comprise a key B, a key C, a key D and a key E, namely the key B, the key C, the key D and the key E are the block chain sub-keys corresponding to the key A. And respectively calculating a key B, a key C, a key D and a key E by using a third preset algorithm, wherein the generated corresponding block chain subkeys comprise a key F, a key G, a key H, a key I, a key J, a key K, a key L and a key M, the key F and the key G are block chain subkeys corresponding to the key B, the key H and the key I are block chain subkeys corresponding to the key C, the key J and the key K are block chain subkeys corresponding to the key D, and the key L and the key M are block chain subkeys corresponding to the key E. It can be seen that a plurality of different keys can be generated from the same key seed.
The first preset algorithm, the second preset algorithm, and the third preset algorithm may be the same algorithm or different algorithms, and are not specifically limited herein. Preferably, the first preset algorithm, the second preset algorithm and the third preset algorithm adopt a hash algorithm, the hash algorithm is a one-way algorithm, the data string can be conveniently calculated by using the data, but the data used is difficult to reversely deduce through the data string, so that even if a certain block chain sub-key is stolen by others, others are difficult to reversely deduce a block chain root key or a key seed through the block chain sub-key, thereby improving the security.
Step S203, generating a transaction address by using the blockchain key, and storing a preset algorithm for generating the blockchain key corresponding to the transaction address in the blockchain wallet, so as to generate a required blockchain key when performing a transaction.
The block chain key is calculated by using an encryption algorithm to generate a corresponding transaction address, the length of the transaction address is generally 34 bits, the transaction address can be public, and other people cannot reversely deduce the block chain key according to the transaction address. Control of all digital assets in a transaction address depends on ownership and control of the corresponding blockchain key. The same or different blockchain keys may be used for different transactions, and those skilled in the art may select the keys according to actual needs, which are not specifically limited herein.
It is common in the art to manage blockchain keys using blockchain wallets so that others can steal blockchain keys from blockchain wallets. In the invention, in order to avoid stealing the blockchain key from the blockchain wallet by others, the generated blockchain key is not stored in the blockchain wallet, but a preset algorithm for generating the blockchain key corresponding to the transaction address is stored, namely, the corresponding relation between the transaction address and the preset algorithm for generating the blockchain key is stored, so that the required blockchain key is generated by using the preset algorithm during transaction, thereby effectively improving the security and avoiding stealing the blockchain key by others. In addition, the blockchain wallet can also record transaction addresses in historical transactions of the user, such as recording transaction addresses where the user frequently transfers money and the like.
When a user needs to perform a transaction, only the biological characteristics and/or the behavior characteristics need to be provided, then the method provided by the invention can be used for conveniently generating the block chain key, specifically, the biological characteristics and/or the behavior characteristics of the user are obtained, then the obtained biological characteristics and/or the behavior characteristics are identified by using biological identification equipment such as a mobile phone, a computer and the like to obtain at least one biological identification result, then the at least one biological identification result is used as a key seed, the key seed is calculated by using a preset algorithm stored in the block chain wallet, and the block chain key is generated for use in the transaction. And when the plurality of transaction addresses correspond to different blockchain keys, correspondingly calculating the key seeds by using a preset algorithm which is stored in the blockchain wallet and corresponds to the transaction addresses and is used for generating the blockchain keys, and generating the corresponding blockchain keys.
According to the block chain key generation method based on the biological identification result provided by the embodiment, at least one biological identification result can be conveniently adopted as the key seed to generate the block chain key, different block chain keys can be generated according to the same key seed, and the generated block chain key is not stored in the block chain wallet, but a preset algorithm corresponding to the transaction address and used for generating the block chain key is stored, so that the block chain key required by the transaction is generated by using the preset algorithm, the safety is further improved, the block chain key is effectively prevented from being stolen by other people, and the block chain key is conveniently generated by a user. When the digital assets are required to be operated, the user can quickly determine the own block chain key only by providing the inherent biological characteristics and/or behavior characteristics of the user, and the use of the user is greatly facilitated.
Fig. 3 is a block diagram showing a configuration of a biockchain key generation apparatus based on a biometric result according to an embodiment of the present invention, as shown in fig. 3, the apparatus including: an acquisition module 310, an identification module 320, and a key generation module 330.
The acquisition module 310 is adapted to: biometric and/or behavioral characteristics of the user are obtained.
Wherein the biometric characteristic comprises one or more of the following characteristics: fingerprint features, hand features, face features, iris features, retinal features, genetic features, and pulse features; the behavior characteristics comprise: voice features and/or signature features.
The identification module 320 is adapted to: and identifying the acquired biological characteristics and/or behavior characteristics to obtain at least one biological identification result.
In particular, the identification module 320 is further adapted to: and identifying the acquired biological characteristics and/or behavior characteristics by using a biological identification device to obtain at least one biological identification result. Wherein the at least one biometric identification result comprises one or more of the following identification results: fingerprint recognition results, hand shape recognition results, face recognition results, voice print recognition results, iris recognition results, retina recognition results, gene recognition results, vein recognition results, and signature recognition results.
The key generation module 330 is adapted to: and taking at least one biological identification result as a key seed, and calculating the key seed by using a preset algorithm to generate a block chain key for use in transaction.
When at least one biometric result is multiple, the key generation module 330 combines the multiple biometric results according to a preset combination rule, and uses the combined biometric result as a key seed. The preset combination rule can be set by a person skilled in the art according to actual needs, and is not specifically limited herein.
Specifically, the blockchain key may include: a block chain root key and a block chain subkey; the key generation module 330 is further adapted to: calculating the key seed by using a first preset algorithm to generate a blockchain root key; calculating the block chain root key by using a second preset algorithm to generate a block chain sub-key corresponding to the block chain root key; and calculating the block chain subkey corresponding to the block chain root key by using a third preset algorithm to generate the block chain subkey corresponding to the block chain subkey. The first preset algorithm, the second preset algorithm and the third preset algorithm may be the same algorithm or different algorithms, and those skilled in the art may set the first preset algorithm, the second preset algorithm and the third preset algorithm according to actual needs, which is not specifically limited herein. In addition, those skilled in the art may also calculate the block chain subkey corresponding to the block chain subkey to generate more corresponding block chain subkeys, which is not limited herein.
Optionally, the apparatus further comprises: an address generation module 340 and a storage module 350.
The address generation module 340 is adapted to: a transaction address is generated using the blockchain key.
The storage module 350 is adapted to: a preset algorithm corresponding to the transaction address for generating the blockchain key is stored in the blockchain wallet for generating the required blockchain key when the transaction is conducted.
According to the block chain key generation device based on the biological identification result provided by the embodiment, at least one biological identification result can be conveniently adopted as the key seed to generate the block chain key, different block chain keys can be generated according to the same key seed, and the generated block chain key is not stored in the block chain wallet, but a preset algorithm corresponding to the transaction address and used for generating the block chain key is stored, so that the block chain key required by the transaction is generated by using the preset algorithm, the safety is further improved, the block chain key is effectively prevented from being stolen by other people, and the block chain key is conveniently generated by a user. When the digital assets are required to be operated, the user can quickly determine the own block chain key only by providing the inherent biological characteristics and/or behavior characteristics of the user, and the use of the user is greatly facilitated.
The invention also provides a nonvolatile computer storage medium, and the computer storage medium stores at least one executable instruction, and the executable instruction can execute the block chain key generation method based on the biological identification result in any method embodiment.
Fig. 4 is a schematic structural diagram of a computing device according to an embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the computing device.
As shown in fig. 4, the computing device may include: a processor (processor)402, a Communications Interface 404, a memory 406, and a Communications bus 408.
Wherein:
the processor 402, communication interface 404, and memory 406 communicate with each other via a communication bus 408.
A communication interface 404 for communicating with network elements of other devices, such as clients or other servers.
The processor 402, configured to execute the program 410, may specifically perform the relevant steps in the above embodiments of the block chain key generation method based on the biometric identification result.
In particular, program 410 may include program code comprising computer operating instructions.
The processor 402 may be a central processing unit CPU or an application Specific Integrated circuit asic or one or more Integrated circuits configured to implement embodiments of the present invention. The computing device includes one or more processors, which may be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 406 for storing a program 410. Memory 406 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 410 may be specifically configured to enable the processor 402 to execute the method for generating the blockchain key based on the biometric identification result in any of the method embodiments described above. For specific implementation of each step in the program 410, reference may be made to corresponding steps and corresponding descriptions in units in the above embodiments of generating a blockchain key based on a biometric result, which are not described herein again. It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described devices and modules may refer to the corresponding process descriptions in the foregoing method embodiments, and are not described herein again.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components in accordance with embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

Claims (16)

1. A method for blockchain key generation based on biometric results, the method comprising:
acquiring biological characteristics and/or behavior characteristics of a user;
identifying the acquired biological characteristics and/or behavior characteristics to obtain at least one biological identification result;
taking the at least one biological identification result as a key seed, and calculating the key seed by using different preset algorithms in the blockchain wallet to generate a blockchain key for use in transaction;
the generated blockchain key is not stored in the blockchain wallet, but a preset algorithm for generating the blockchain key corresponding to the transaction address is stored, that is, a corresponding relationship between the transaction address and the preset algorithm for generating the blockchain key is stored, so that the required blockchain key is generated by using the preset algorithm when the transaction is performed.
2. The method of claim 1, wherein the identifying the acquired biometric and/or behavioral characteristics to obtain at least one biometric result further comprises:
and identifying the acquired biological characteristics and/or behavior characteristics by using a biological identification device to obtain at least one biological identification result.
3. The method of claim 1, wherein the at least one biometric result is a plurality; the using the at least one biometric result as a key seed further comprises:
and combining the plurality of biological identification results according to a preset combination rule, and taking the combined biological identification result as a key seed.
4. The method of any of claims 1-3, wherein the blockchain key comprises: a block chain root key and a block chain subkey; the calculating the key seed by using a preset algorithm, and the generating the block chain key further comprises:
calculating the key seed by using a first preset algorithm to generate a blockchain root key;
calculating a block chain root key by using a second preset algorithm to generate a block chain sub-key corresponding to the block chain root key;
and calculating the block chain sub-key corresponding to the block chain root key by using a third preset algorithm to generate the block chain sub-key corresponding to the block chain sub-key.
5. The method according to any one of claims 1-3, wherein after the calculating the key seed using a preset algorithm to generate a blockchain key, the method further comprises:
and storing a preset algorithm corresponding to the transaction address and used for generating a blockchain key in the blockchain wallet so as to generate the required blockchain key when a transaction is carried out.
6. The method of any one of claims 1-3, wherein the biometric features include one or more of the following features: fingerprint features, hand features, face features, iris features, retinal features, genetic features, and pulse features;
the behavior characteristics include: voice features and/or signature features.
7. The method of any of claims 1-3, wherein the at least one biometric identification includes one or more of the following identifications: fingerprint recognition results, hand shape recognition results, face recognition results, voice print recognition results, iris recognition results, retina recognition results, gene recognition results, vein recognition results, and signature recognition results.
8. A blockchain key generation apparatus based on a biometric result, the apparatus comprising:
the acquisition module is suitable for acquiring biological characteristics and/or behavior characteristics of a user;
the identification module is suitable for identifying the acquired biological characteristics and/or behavior characteristics to obtain at least one biological identification result;
the key generation module is suitable for taking the at least one biological identification result as a key seed, calculating the key seed by using different preset algorithms in the blockchain wallet, and generating a blockchain key for use in transaction;
the generated blockchain key is not stored in the blockchain wallet, but a preset algorithm for generating the blockchain key corresponding to the transaction address is stored, that is, a corresponding relationship between the transaction address and the preset algorithm for generating the blockchain key is stored, so that the required blockchain key is generated by using the preset algorithm when the transaction is performed.
9. The apparatus of claim 8, wherein the identification module is further adapted to:
and identifying the acquired biological characteristics and/or behavior characteristics by using a biological identification device to obtain at least one biological identification result.
10. The apparatus of claim 8, wherein the at least one biometric result is a plurality; the key generation module is further adapted to:
and combining the plurality of biological identification results according to a preset combination rule, and taking the combined biological identification result as a key seed.
11. The apparatus of any of claims 8-10, wherein the blockchain key comprises: a block chain root key and a block chain subkey; the key generation module is further adapted to:
calculating the key seed by using a first preset algorithm to generate a blockchain root key;
calculating a block chain root key by using a second preset algorithm to generate a block chain sub-key corresponding to the block chain root key;
and calculating the block chain sub-key corresponding to the block chain root key by using a third preset algorithm to generate the block chain sub-key corresponding to the block chain sub-key.
12. The apparatus of any one of claims 8-10, wherein the apparatus further comprises:
and the storage module is suitable for storing a preset algorithm which corresponds to the transaction address and is used for generating the blockchain key in the blockchain wallet so as to generate the required blockchain key when the transaction is carried out.
13. The apparatus of any one of claims 8-10, wherein the biometric features include one or more of the following features: fingerprint features, hand features, face features, iris features, retinal features, genetic features, and pulse features;
the behavior characteristics include: voice features and/or signature features.
14. The apparatus of any of claims 8-10, wherein the at least one biometric identification includes one or more of the following identifications: fingerprint recognition results, hand shape recognition results, face recognition results, voice print recognition results, iris recognition results, retina recognition results, gene recognition results, vein recognition results, and signature recognition results.
15. A computing device, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the block chain key generation method based on the biological identification result according to any one of claims 1-7.
16. A computer storage medium having at least one executable instruction stored therein, the executable instruction causing a processor to perform operations corresponding to the method for generating a blockchain key based on a biometric result according to any one of claims 1 to 7.
CN201810659131.9A 2018-06-25 2018-06-25 Block chain key generation method and device based on biological identification result Active CN108847931B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810659131.9A CN108847931B (en) 2018-06-25 2018-06-25 Block chain key generation method and device based on biological identification result

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810659131.9A CN108847931B (en) 2018-06-25 2018-06-25 Block chain key generation method and device based on biological identification result

Publications (2)

Publication Number Publication Date
CN108847931A CN108847931A (en) 2018-11-20
CN108847931B true CN108847931B (en) 2021-06-15

Family

ID=64203699

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810659131.9A Active CN108847931B (en) 2018-06-25 2018-06-25 Block chain key generation method and device based on biological identification result

Country Status (1)

Country Link
CN (1) CN108847931B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020107233A1 (en) * 2018-11-27 2020-06-04 区链通网络有限公司 Blockchain-based wallet system, method of use of wallet and storage medium
CN109660327A (en) * 2018-12-19 2019-04-19 上海和数软件有限公司 Block chain encryption method, device and readable storage medium storing program for executing based on iris
CN109801072B (en) * 2019-01-24 2021-08-27 易保互联医疗信息科技(北京)有限公司 Private key generation method and system of block chain electronic wallet based on facial features
CN111193741B (en) * 2019-12-31 2022-09-13 中国银行股份有限公司 Information sending method, information obtaining method, device and equipment
CN111553691A (en) * 2020-05-21 2020-08-18 陈议尊 Pure decentralized block chain method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106651363A (en) * 2016-12-28 2017-05-10 飞天诚信科技股份有限公司 Hardware wallet and hardware wallet holder identity verification method
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN108055258A (en) * 2017-12-08 2018-05-18 中链科技有限公司 A kind of identity data management method, system and computer readable storage medium
CN108183801A (en) * 2017-12-29 2018-06-19 中链科技有限公司 A kind of service authentication method, system and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106651363A (en) * 2016-12-28 2017-05-10 飞天诚信科技股份有限公司 Hardware wallet and hardware wallet holder identity verification method
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN108055258A (en) * 2017-12-08 2018-05-18 中链科技有限公司 A kind of identity data management method, system and computer readable storage medium
CN108183801A (en) * 2017-12-29 2018-06-19 中链科技有限公司 A kind of service authentication method, system and computer readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
比特币的技术原理与经济学分析;凌清;《中国优秀硕士学位论文全文数据库 经济与管理科学辑》;20160315(第03期);第3.2节 *

Also Published As

Publication number Publication date
CN108847931A (en) 2018-11-20

Similar Documents

Publication Publication Date Title
CN108847931B (en) Block chain key generation method and device based on biological identification result
JP3220620U (en) System to realize blockchain multi-factor personal identity authentication
AU2018266602B2 (en) System and method for biometric identification
US10560451B2 (en) Table-connected tokenization
JP4886371B2 (en) Biometric authentication method and system
US10425408B2 (en) Encrypted biometric authenication
KR102388698B1 (en) Method for enrolling data in a base to protect said data
US11038686B2 (en) Encrypted biometric registration
CN110494854A (en) Use the Verification System of multi-party computations
JP6524899B2 (en) Secret data matching device, secret data matching program, and secret data matching method
WO2017063546A1 (en) Fingerprint information-based user identity identification method and device
US20200076592A1 (en) Method for generating seed and device thereof
CN109241701A (en) A kind of application program Activiation method, correlation technique and relevant apparatus
Dwivedi et al. Cancelable iris template generation using look-up table mapping
Asthana et al. A novel biometric crypto system based on cryptographic key binding with user biometrics
EP3440805A1 (en) Method and system for secure password storage
KR20180001455A (en) Mobile device of authenticating a purchase transaction and method there-of
KR102255286B1 (en) Method for physical identity management in blockchain using a decentralized biometrics system
CN114429344A (en) Transaction method and transaction system of digital currency
CN114547684A (en) Method and device for protecting multi-party joint training tree model of private data
CN107094079A (en) A kind of method for opening termination function, device and equipment
CN111092721A (en) Method and device for setting access password
JP2007272776A (en) Biometric system
KR20160079310A (en) Method and server for authenticating password based on pattern information
CN117808571A (en) Risk prediction method and device for bank card transaction, computing equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant