CN109658101A - A kind of block chain hardware encryption safe mechanism - Google Patents
A kind of block chain hardware encryption safe mechanism Download PDFInfo
- Publication number
- CN109658101A CN109658101A CN201811606555.5A CN201811606555A CN109658101A CN 109658101 A CN109658101 A CN 109658101A CN 201811606555 A CN201811606555 A CN 201811606555A CN 109658101 A CN109658101 A CN 109658101A
- Authority
- CN
- China
- Prior art keywords
- block chain
- hardware
- algorithm
- transaction
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Abstract
The invention discloses a kind of block chain hardware encryption safe mechanism; it is related to block chain technical field; the process of block chain hardware encryption safe mechanism is the following steps are included: the node of block chain selects hardware encipherment protection function when block chain is added; application node allows this block chain to run a set of program for inquiring hardware encoding; program by digital signature identification, ultimately generate nodal information.The block chain hardware encryption safe mechanism, it is realized and is authenticated using existing hardware, it neither will increase the cost of user, there is high reliability again, suspicious user is prevented to submit Transaction Information to system by real time monitoring, once it was found that malicious attack, system can be automatically stopped transaction, and Transaction Provider is required to provide hardware based authentication, greatly improve the safety when transaction of block chain, different hardware may be selected by the way that user is arranged, make the user do not need to add new hardware, saved cost under the premise of improving block chain transaction security for user.
Description
Technical field
The present invention relates to block chain technical field, specially a kind of block chain hardware encryption safe mechanism.
Background technique
Block chain is the novel of the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm
Application model.
Now practical block chain application has many security risks, a lot of hacker attack events occurs, in order to make block
We have proposed a kind of block chain hardware encryption safe mechanism, block chain encryption mechanism real time monitorings to prevent for chain more safety
Suspicious user submits Transaction Information to system, once discovery malicious attack, system can be automatically stopped transaction, and transaction is required to mention
Donor provides hardware based authentication.
Summary of the invention
The object of the invention is in order to make up for the deficiencies of the prior art, provide a kind of block chain hardware encryption safe machine
System, it has the advantages that be significantly reduced the attack of block chain application, and it is hidden in the presence of safety to solve existing block chain
The problem of suffering from.
The present invention is in order to solve the above technical problems, provide the following technical solutions: a kind of block chain hardware encryption safe mechanism,
The process of block chain hardware encryption safe mechanism the following steps are included:
S1, block chain node be added block chain when select hardware encipherment protection function, application node allow this block chain run
It is a set of inquiry hardware encoding program, program by digital signature identification, ultimately generate nodal information;
S2, user deploy the program of inquiry hardware encoding;
S3, it initiates to trade by the hardware of specific identity authentication information;
S4, verification information algorithm as defined in advance calculate;
S5, judge suspicious transaction and prevent the transaction application of any suspicious user.
Further, the hardware can choose USB, network interface card, CPU or display, and the algorithm defined in advance is
The combination of hash algorithm, message authentication algorithm, Hashed Message Authentication and symmetric encipherment algorithm.
It by using above-mentioned technical proposal, makes the user do not need to add new hardware, in the premise for improving block chain transaction security
Cost has been saved for user down, difficulty when suspicious transaction cracks can have greatly been improved, sufficiently improve customer transaction safety.
Further, the user identity authentication is the combination based on private key and hardware, the calculation of the suspicious transaction of judgement
Method is algorithm or artificial neural network algorithm based on RANSAC algorithm evolution.
By using above-mentioned technical proposal, safety when customer transaction is fully ensured that, for strange hardware or strange
Private key, which will do it prevention, and two kinds of algorithms are great safety for this.
Further, the nodal information is made of hardware information interface and key.
By using above-mentioned technical proposal, block chain is made effectively to prevent suspicious user and suspicious transaction.
Compared with prior art, the block chain hardware encryption safe mechanism have it is following the utility model has the advantages that
1, the present invention realizes certification using existing hardware, neither will increase the cost of user, and have high reliability, passes through
Real time monitoring prevents suspicious user from submitting Transaction Information to system, once discovery malicious attack, system can be automatically stopped transaction,
And Transaction Provider is required to provide hardware based authentication, greatly improve the safety when transaction of block chain.
2, different hardware may be selected by the way that user is arranged in the present invention, makes the user do not need to add new hardware, is improving block
Cost has been saved for user under the premise of chain transaction security, by the way that user authentication is arranged, suspicious information can have been prevented, effectively to protect
The safety for demonstrate,proving transaction can greatly improve difficulty when suspicious transaction cracks, sufficiently mention by the way that the combination of many algorithms is arranged
High customer transaction safety.
Detailed description of the invention
Fig. 1 is nodal information identifying procedure figure of the present invention;
Fig. 2 is the suspicious transaction hardware identification hum pattern of the present invention;
Fig. 3 is that crypto identity information of the present invention generates and verify flow chart.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Fig. 1-3 is please referred to, the present invention provides a kind of technical solution: a kind of block chain hardware encryption safe mechanism, block chain
The process of hardware encryption safe mechanism the following steps are included:
S1, block chain node be added block chain when select hardware encipherment protection function, application node allow this block chain run
It is a set of inquiry hardware encoding program, program by digital signature identification, ultimately generate nodal information;
S2, user deploy the program of inquiry hardware encoding;
S3, it initiates to trade by the hardware of specific identity authentication information;
S4, verification information algorithm as defined in advance calculate;
S5, judge suspicious transaction and prevent the transaction application of any suspicious user.
Further, hardware can choose USB, network interface card, CPU or display, makes the user do not need to add new hardware, mention
Cost has been saved under the premise of high block chain transaction security for user.
Further, defined algorithm is hash algorithm, message authentication algorithm, Hashed Message Authentication and symmetric cryptography in advance
The combination of algorithm can greatly improve difficulty when suspicious transaction cracks, sufficiently improve customer transaction safety.
Further, user identity authentication is the combination based on private key and hardware, fully ensures that safety when customer transaction
Property, for strange hardware or strange private key, which will do it prevention.
Further, the algorithm for judging suspicious transaction is the algorithm or artificial neural network based on RANSAC algorithm evolution
Algorithm, two kinds of algorithms are great safety for this.
Further, nodal information is made of hardware information interface and key, and block chain is made effectively to prevent suspicious user
With suspicious transaction.
The present invention realizes certification using existing hardware, neither will increase the cost of user, and have high reliability, leads to
Crossing real time monitoring prevents suspicious user from submitting Transaction Information to system, once discovery malicious attack, system can be automatically stopped friendship
Easily, and Transaction Provider is required to provide hardware based authentication, greatly improves the safety when transaction of block chain, leads to
Crossing setting user may be selected different hardware, make the user do not need to add new hardware, under the premise of improving block chain transaction security
Cost has been saved for user, by the way that user authentication is arranged, suspicious information can have effectively been prevented, to guarantee the safety of transaction, lead to
The combination for crossing setting many algorithms can greatly improve difficulty when suspicious transaction cracks, sufficiently improve customer transaction safety.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (4)
1. a kind of block chain hardware encryption safe mechanism, it is characterised in that: the process of block chain hardware encryption safe mechanism includes
Following steps:
S1, block chain node be added block chain when select hardware encipherment protection function, application node allow this block chain run
It is a set of inquiry hardware encoding program, program by digital signature identification, ultimately generate nodal information;
S2, user deploy the program of inquiry hardware encoding;
S3, it initiates to trade by the hardware of specific identity authentication information;
S4, verification information algorithm as defined in advance calculate;
S5, judge suspicious transaction and prevent the transaction application of any suspicious user.
2. a kind of block chain hardware encryption safe mechanism according to claim 1, it is characterised in that: the hardware can select
Select USB, network interface card, CPU or display, it is described in advance as defined in algorithm be that hash algorithm, message authentication algorithm, Hashed Message are recognized
The combination of card and symmetric encipherment algorithm.
3. a kind of block chain hardware encryption safe mechanism according to claim 2, it is characterised in that: the user identity is recognized
Card is the combination based on private key and hardware, the algorithm of the suspicious transaction of the judgement be algorithm based on RANSAC algorithm evolution or
Artificial neural network algorithm.
4. a kind of block chain hardware encryption safe mechanism according to claim 3, it is characterised in that: the nodal information by
Hardware information interface and key composition.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811606555.5A CN109658101A (en) | 2018-12-27 | 2018-12-27 | A kind of block chain hardware encryption safe mechanism |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811606555.5A CN109658101A (en) | 2018-12-27 | 2018-12-27 | A kind of block chain hardware encryption safe mechanism |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109658101A true CN109658101A (en) | 2019-04-19 |
Family
ID=66116877
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811606555.5A Pending CN109658101A (en) | 2018-12-27 | 2018-12-27 | A kind of block chain hardware encryption safe mechanism |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109658101A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113506104A (en) * | 2021-05-07 | 2021-10-15 | 杭州宇链科技有限公司 | Software and hardware combined signature generation and verification method and system |
-
2018
- 2018-12-27 CN CN201811606555.5A patent/CN109658101A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113506104A (en) * | 2021-05-07 | 2021-10-15 | 杭州宇链科技有限公司 | Software and hardware combined signature generation and verification method and system |
CN113506104B (en) * | 2021-05-07 | 2024-03-01 | 杭州宇链科技有限公司 | Signature generation and verification modes and system combining software and hardware |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109309565B (en) | Security authentication method and device | |
CN111046352B (en) | Identity information security authorization system and method based on block chain | |
CN110677418B (en) | Trusted voiceprint authentication method and device, electronic equipment and storage medium | |
CN106878318B (en) | Block chain real-time polling cloud system | |
CN111027036B (en) | Identity association method based on block chain | |
CN100496025C (en) | Ternary equal identification based reliable network access control method | |
CN103312691A (en) | Method and system for authenticating and accessing cloud platform | |
CN109687965A (en) | The real name identification method of subscriber identity information in a kind of protection network | |
CN110958110A (en) | Block chain private data management method and system based on zero knowledge proof | |
Zhong et al. | Distributed blockchain-based authentication and authorization protocol for smart grid | |
CN110069918A (en) | A kind of efficient double factor cross-domain authentication method based on block chain technology | |
CN104767731A (en) | Identity authentication protection method of Restful mobile transaction system | |
CN110519300A (en) | Client key method for secure storing based on password bidirectional authentication | |
CN103152732B (en) | Cloud password system and operation method thereof | |
CN101420302A (en) | Safe identification method and device | |
CN102035838A (en) | Trust service connecting method and trust service system based on platform identity | |
CN104079413A (en) | Enhancement type one-time dynamic password authentication method and system | |
CN109816386A (en) | Data get through method on a kind of chain of the unified identity authentication based on block chain | |
CN112235301B (en) | Access right verification method and device and electronic equipment | |
CN105554018A (en) | Network real name verification method | |
CN104125230A (en) | Short message authentication service system and authentication method | |
CN102377573A (en) | Double-factor authentication method capable of securely updating password | |
CN111585995B (en) | Secure wind control information transmission and processing method and device, computer equipment and storage medium | |
CN112330443A (en) | Public credit information system based on block chain | |
CN114584331A (en) | Power distribution internet of things edge internet of things agent network security protection method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |