CN109658101A - A kind of block chain hardware encryption safe mechanism - Google Patents

A kind of block chain hardware encryption safe mechanism Download PDF

Info

Publication number
CN109658101A
CN109658101A CN201811606555.5A CN201811606555A CN109658101A CN 109658101 A CN109658101 A CN 109658101A CN 201811606555 A CN201811606555 A CN 201811606555A CN 109658101 A CN109658101 A CN 109658101A
Authority
CN
China
Prior art keywords
block chain
hardware
algorithm
transaction
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811606555.5A
Other languages
Chinese (zh)
Inventor
庞引明
李博宇
徐炤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chain Chi Intelligent Technology (shanghai) Co Ltd
Original Assignee
Chain Chi Intelligent Technology (shanghai) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chain Chi Intelligent Technology (shanghai) Co Ltd filed Critical Chain Chi Intelligent Technology (shanghai) Co Ltd
Priority to CN201811606555.5A priority Critical patent/CN109658101A/en
Publication of CN109658101A publication Critical patent/CN109658101A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The invention discloses a kind of block chain hardware encryption safe mechanism; it is related to block chain technical field; the process of block chain hardware encryption safe mechanism is the following steps are included: the node of block chain selects hardware encipherment protection function when block chain is added; application node allows this block chain to run a set of program for inquiring hardware encoding; program by digital signature identification, ultimately generate nodal information.The block chain hardware encryption safe mechanism, it is realized and is authenticated using existing hardware, it neither will increase the cost of user, there is high reliability again, suspicious user is prevented to submit Transaction Information to system by real time monitoring, once it was found that malicious attack, system can be automatically stopped transaction, and Transaction Provider is required to provide hardware based authentication, greatly improve the safety when transaction of block chain, different hardware may be selected by the way that user is arranged, make the user do not need to add new hardware, saved cost under the premise of improving block chain transaction security for user.

Description

A kind of block chain hardware encryption safe mechanism
Technical field
The present invention relates to block chain technical field, specially a kind of block chain hardware encryption safe mechanism.
Background technique
Block chain is the novel of the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm Application model.
Now practical block chain application has many security risks, a lot of hacker attack events occurs, in order to make block We have proposed a kind of block chain hardware encryption safe mechanism, block chain encryption mechanism real time monitorings to prevent for chain more safety Suspicious user submits Transaction Information to system, once discovery malicious attack, system can be automatically stopped transaction, and transaction is required to mention Donor provides hardware based authentication.
Summary of the invention
The object of the invention is in order to make up for the deficiencies of the prior art, provide a kind of block chain hardware encryption safe machine System, it has the advantages that be significantly reduced the attack of block chain application, and it is hidden in the presence of safety to solve existing block chain The problem of suffering from.
The present invention is in order to solve the above technical problems, provide the following technical solutions: a kind of block chain hardware encryption safe mechanism, The process of block chain hardware encryption safe mechanism the following steps are included:
S1, block chain node be added block chain when select hardware encipherment protection function, application node allow this block chain run It is a set of inquiry hardware encoding program, program by digital signature identification, ultimately generate nodal information;
S2, user deploy the program of inquiry hardware encoding;
S3, it initiates to trade by the hardware of specific identity authentication information;
S4, verification information algorithm as defined in advance calculate;
S5, judge suspicious transaction and prevent the transaction application of any suspicious user.
Further, the hardware can choose USB, network interface card, CPU or display, and the algorithm defined in advance is The combination of hash algorithm, message authentication algorithm, Hashed Message Authentication and symmetric encipherment algorithm.
It by using above-mentioned technical proposal, makes the user do not need to add new hardware, in the premise for improving block chain transaction security Cost has been saved for user down, difficulty when suspicious transaction cracks can have greatly been improved, sufficiently improve customer transaction safety.
Further, the user identity authentication is the combination based on private key and hardware, the calculation of the suspicious transaction of judgement Method is algorithm or artificial neural network algorithm based on RANSAC algorithm evolution.
By using above-mentioned technical proposal, safety when customer transaction is fully ensured that, for strange hardware or strange Private key, which will do it prevention, and two kinds of algorithms are great safety for this.
Further, the nodal information is made of hardware information interface and key.
By using above-mentioned technical proposal, block chain is made effectively to prevent suspicious user and suspicious transaction.
Compared with prior art, the block chain hardware encryption safe mechanism have it is following the utility model has the advantages that
1, the present invention realizes certification using existing hardware, neither will increase the cost of user, and have high reliability, passes through Real time monitoring prevents suspicious user from submitting Transaction Information to system, once discovery malicious attack, system can be automatically stopped transaction, And Transaction Provider is required to provide hardware based authentication, greatly improve the safety when transaction of block chain.
2, different hardware may be selected by the way that user is arranged in the present invention, makes the user do not need to add new hardware, is improving block Cost has been saved for user under the premise of chain transaction security, by the way that user authentication is arranged, suspicious information can have been prevented, effectively to protect The safety for demonstrate,proving transaction can greatly improve difficulty when suspicious transaction cracks, sufficiently mention by the way that the combination of many algorithms is arranged High customer transaction safety.
Detailed description of the invention
Fig. 1 is nodal information identifying procedure figure of the present invention;
Fig. 2 is the suspicious transaction hardware identification hum pattern of the present invention;
Fig. 3 is that crypto identity information of the present invention generates and verify flow chart.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Fig. 1-3 is please referred to, the present invention provides a kind of technical solution: a kind of block chain hardware encryption safe mechanism, block chain The process of hardware encryption safe mechanism the following steps are included:
S1, block chain node be added block chain when select hardware encipherment protection function, application node allow this block chain run It is a set of inquiry hardware encoding program, program by digital signature identification, ultimately generate nodal information;
S2, user deploy the program of inquiry hardware encoding;
S3, it initiates to trade by the hardware of specific identity authentication information;
S4, verification information algorithm as defined in advance calculate;
S5, judge suspicious transaction and prevent the transaction application of any suspicious user.
Further, hardware can choose USB, network interface card, CPU or display, makes the user do not need to add new hardware, mention Cost has been saved under the premise of high block chain transaction security for user.
Further, defined algorithm is hash algorithm, message authentication algorithm, Hashed Message Authentication and symmetric cryptography in advance The combination of algorithm can greatly improve difficulty when suspicious transaction cracks, sufficiently improve customer transaction safety.
Further, user identity authentication is the combination based on private key and hardware, fully ensures that safety when customer transaction Property, for strange hardware or strange private key, which will do it prevention.
Further, the algorithm for judging suspicious transaction is the algorithm or artificial neural network based on RANSAC algorithm evolution Algorithm, two kinds of algorithms are great safety for this.
Further, nodal information is made of hardware information interface and key, and block chain is made effectively to prevent suspicious user With suspicious transaction.
The present invention realizes certification using existing hardware, neither will increase the cost of user, and have high reliability, leads to Crossing real time monitoring prevents suspicious user from submitting Transaction Information to system, once discovery malicious attack, system can be automatically stopped friendship Easily, and Transaction Provider is required to provide hardware based authentication, greatly improves the safety when transaction of block chain, leads to Crossing setting user may be selected different hardware, make the user do not need to add new hardware, under the premise of improving block chain transaction security Cost has been saved for user, by the way that user authentication is arranged, suspicious information can have effectively been prevented, to guarantee the safety of transaction, lead to The combination for crossing setting many algorithms can greatly improve difficulty when suspicious transaction cracks, sufficiently improve customer transaction safety.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (4)

1. a kind of block chain hardware encryption safe mechanism, it is characterised in that: the process of block chain hardware encryption safe mechanism includes Following steps:
S1, block chain node be added block chain when select hardware encipherment protection function, application node allow this block chain run It is a set of inquiry hardware encoding program, program by digital signature identification, ultimately generate nodal information;
S2, user deploy the program of inquiry hardware encoding;
S3, it initiates to trade by the hardware of specific identity authentication information;
S4, verification information algorithm as defined in advance calculate;
S5, judge suspicious transaction and prevent the transaction application of any suspicious user.
2. a kind of block chain hardware encryption safe mechanism according to claim 1, it is characterised in that: the hardware can select Select USB, network interface card, CPU or display, it is described in advance as defined in algorithm be that hash algorithm, message authentication algorithm, Hashed Message are recognized The combination of card and symmetric encipherment algorithm.
3. a kind of block chain hardware encryption safe mechanism according to claim 2, it is characterised in that: the user identity is recognized Card is the combination based on private key and hardware, the algorithm of the suspicious transaction of the judgement be algorithm based on RANSAC algorithm evolution or Artificial neural network algorithm.
4. a kind of block chain hardware encryption safe mechanism according to claim 3, it is characterised in that: the nodal information by Hardware information interface and key composition.
CN201811606555.5A 2018-12-27 2018-12-27 A kind of block chain hardware encryption safe mechanism Pending CN109658101A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811606555.5A CN109658101A (en) 2018-12-27 2018-12-27 A kind of block chain hardware encryption safe mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811606555.5A CN109658101A (en) 2018-12-27 2018-12-27 A kind of block chain hardware encryption safe mechanism

Publications (1)

Publication Number Publication Date
CN109658101A true CN109658101A (en) 2019-04-19

Family

ID=66116877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811606555.5A Pending CN109658101A (en) 2018-12-27 2018-12-27 A kind of block chain hardware encryption safe mechanism

Country Status (1)

Country Link
CN (1) CN109658101A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113506104A (en) * 2021-05-07 2021-10-15 杭州宇链科技有限公司 Software and hardware combined signature generation and verification method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113506104A (en) * 2021-05-07 2021-10-15 杭州宇链科技有限公司 Software and hardware combined signature generation and verification method and system
CN113506104B (en) * 2021-05-07 2024-03-01 杭州宇链科技有限公司 Signature generation and verification modes and system combining software and hardware

Similar Documents

Publication Publication Date Title
CN109309565B (en) Security authentication method and device
CN111046352B (en) Identity information security authorization system and method based on block chain
CN110677418B (en) Trusted voiceprint authentication method and device, electronic equipment and storage medium
CN106878318B (en) Block chain real-time polling cloud system
CN111027036B (en) Identity association method based on block chain
CN100496025C (en) Ternary equal identification based reliable network access control method
CN103312691A (en) Method and system for authenticating and accessing cloud platform
CN109687965A (en) The real name identification method of subscriber identity information in a kind of protection network
CN110958110A (en) Block chain private data management method and system based on zero knowledge proof
Zhong et al. Distributed blockchain-based authentication and authorization protocol for smart grid
CN110069918A (en) A kind of efficient double factor cross-domain authentication method based on block chain technology
CN104767731A (en) Identity authentication protection method of Restful mobile transaction system
CN110519300A (en) Client key method for secure storing based on password bidirectional authentication
CN103152732B (en) Cloud password system and operation method thereof
CN101420302A (en) Safe identification method and device
CN102035838A (en) Trust service connecting method and trust service system based on platform identity
CN104079413A (en) Enhancement type one-time dynamic password authentication method and system
CN109816386A (en) Data get through method on a kind of chain of the unified identity authentication based on block chain
CN112235301B (en) Access right verification method and device and electronic equipment
CN105554018A (en) Network real name verification method
CN104125230A (en) Short message authentication service system and authentication method
CN102377573A (en) Double-factor authentication method capable of securely updating password
CN111585995B (en) Secure wind control information transmission and processing method and device, computer equipment and storage medium
CN112330443A (en) Public credit information system based on block chain
CN114584331A (en) Power distribution internet of things edge internet of things agent network security protection method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination