CN109818751A - Key handling and application method, device, equipment and storage medium - Google Patents
Key handling and application method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN109818751A CN109818751A CN201910107557.8A CN201910107557A CN109818751A CN 109818751 A CN109818751 A CN 109818751A CN 201910107557 A CN201910107557 A CN 201910107557A CN 109818751 A CN109818751 A CN 109818751A
- Authority
- CN
- China
- Prior art keywords
- key
- block chain
- string
- chain account
- local block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The embodiment of the invention discloses a kind of key handlings and application method, device, equipment and storage medium.Wherein, cipher key processing method is applied to subscriber terminal equipment, this method comprises: determining the key of local block chain account using Encryption Algorithm;According to the feature of the feature of the Encryption Algorithm and the key, the key string of local block chain account is determined;According to the affairs password of local user, the key string of the local block chain account is handled, obtains key string ciphertext, the key string ciphertext is for being recorded in subscriber terminal equipment.The technical solution provided through the embodiment of the present invention converts key string ciphertext for the key of local block chain account and is recorded in subscriber terminal equipment, can avoid key plain and is stolen by other people, safety with higher and availability.In addition, user is without the key for remembering local block chain account.
Description
Technical field
The present embodiments relate to block chain technical field more particularly to a kind of key handling and application method, device, set
Standby and storage medium.
Background technique
The block chain local account of user can be preserved on terminal device, user can use oneself key in client
It trades to sign and issue, uses the assets of oneself.
But there are the following problems for this process: 1) key for the asymmetric encryption techniques that block chain network generally uses be with
What machine generated, and hundred are up to, user is difficult to remember;If 2) the key stored in clear of user is on the terminal device, exist by
The risk stolen, assets are easily lost.Therefore it provides a kind of new key handling mode is very necessary.
Summary of the invention
The embodiment of the invention provides a kind of key handlings and application method, device, equipment and storage medium, avoid close
Key is stolen by other people in plain text, safety with higher and availability.
In a first aspect, being applied to subscriber terminal equipment, this method the embodiment of the invention provides a kind of cipher key processing method
Include:
Using Encryption Algorithm, the key of local block chain account is determined;
According to the feature of the feature of the Encryption Algorithm and the key, the key character of local block chain account is determined
String;
According to the affairs password of local user, the key string of the local block chain account is handled, is obtained
Key string ciphertext, the key string ciphertext is for being recorded in subscriber terminal equipment.
Second aspect, the embodiment of the invention provides a kind of key application methods, are applied to subscriber terminal equipment, this method
Include:
Obtain the affairs password of local user's input;
Obtain the key string ciphertext of the local block chain account stored in the subscriber terminal equipment;
Using the affairs password, key string ciphertext is decrypted, obtains the key word of local block chain account
Symbol string;
According to the key string of local block chain account, the key of Encryption Algorithm and local block chain account is reconstructed;
Using the Encryption Algorithm and key of reconstruct, sign to the block chain transactions requests of local block chain account.
The third aspect, the embodiment of the invention provides a kind of key handling devices, are configured at subscriber terminal equipment, the device
Include:
Key determining module determines the key of local block chain account for utilizing Encryption Algorithm;
Key string determining module, for determining this according to the feature of the Encryption Algorithm and the feature of the key
The key string of ground block chain account;
Ciphertext determining module, for the affairs password according to local user, to the key word of the local block chain account
Symbol string is handled, and obtains key string ciphertext, the key string ciphertext is for being recorded in subscriber terminal equipment.
Fourth aspect, the embodiment of the invention provides a kind of key use devices, are configured at subscriber terminal equipment, the device
Include:
Affairs password obtains module, for obtaining the affairs password of local user's input;
Ciphertext obtains module, for obtaining the key character of the local block chain account stored in the subscriber terminal equipment
String ciphertext;
Ciphertext deciphering module is decrypted key string ciphertext, obtains this area for using the affairs password
The key string of block chain account;
Algorithm secret key reconstructed module reconstructs Encryption Algorithm and this for the key string according to local block chain account
The key of ground block chain account;
Signature blocks ask the block chain affairs of local block chain account for using the Encryption Algorithm and key of reconstruct
It asks and signs.
5th aspect, the embodiment of the invention also provides a kind of equipment, which includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processing
Device realizes any cipher key processing method in first aspect, or realizes any key user in second aspect
Method.
6th aspect, the embodiment of the invention also provides a kind of storage mediums, are stored thereon with computer program, the program
Any cipher key processing method in first aspect is realized when being executed by processor, or is realized any described in second aspect
Key application method.
Key handling and application method provided in an embodiment of the present invention, device, equipment and storage medium are calculated using encryption
After method determines the key of local block chain account, local block can be determined according to the feature of Encryption Algorithm and the feature of key
The key string of chain account;Then carried out using the key string of the affairs key pair local block chain account of local user
Processing, obtains key string ciphertext, and the key string ciphertext is recorded in subscriber terminal equipment.Compared to existing
Technical solution, the key of the local block chain account in this programme are converted into key string ciphertext record by handling layer by layer
In subscriber terminal equipment, it can avoid key plain and stolen by other people, safety with higher and availability.In addition, with
Family is without the key for remembering local block chain account.
Detailed description of the invention
Fig. 1 is a kind of flow chart for cipher key processing method that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow chart of cipher key processing method provided by Embodiment 2 of the present invention;
Fig. 3 is a kind of flow chart for cipher key processing method that the embodiment of the present invention three provides;
Fig. 4 is a kind of flow chart for cipher key processing method that the embodiment of the present invention four provides;
Fig. 5 is a kind of flow chart for key application method that the embodiment of the present invention five provides;
Fig. 6 is a kind of flow chart for key application method that the embodiment of the present invention six provides;
Fig. 7 is a kind of flow chart for key application method that the embodiment of the present invention seven provides;
Fig. 8 is a kind of flow chart for key application method that the embodiment of the present invention eight provides;
Fig. 9 is a kind of structural block diagram for key handling device that the embodiment of the present invention nine provides;
Figure 10 is a kind of structural block diagram for key use device that the embodiment of the present invention ten provides;
Figure 11 is a kind of structural schematic diagram for equipment that the embodiment of the present invention 11 provides.
Specific embodiment
The embodiment of the present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this
Locate described specific embodiment and is used only for explaining the embodiment of the present invention, rather than limitation of the invention.It further needs exist for
Bright, only parts related to embodiments of the present invention are shown for ease of description, in attached drawing rather than entire infrastructure.
Embodiment one
Fig. 1 is a kind of flow chart for cipher key processing method that the embodiment of the present invention one provides, and the present embodiment is applicable to close
Key disposition is particularly suitable for the key handling to block chain account, is stored in user to solve prior art key plain
On terminal device, it is easy the problems such as being stolen.Wherein, subscriber terminal equipment for example can be mobile terminal, personal computer etc..
The scheme of the embodiment of the present invention can be executed by subscriber terminal equipment, may further be light by the block chain in subscriber terminal equipment
Magnitude node or the application program interacted with lightweight node execute.Wherein, lightweight node, which refers to, is deployed with block chain
Deployment data, such as intelligent contract, common recognition mechanism, but the block chain of not stored or storage section block data and Transaction Information
Network node can participate in the transactions requests interactive process of block chain.Lightweight node can generally be deployed in subscriber terminal equipment
In, such as can load in the operating system of subscriber terminal equipment, it is also used as an independent third party application peace
It is attached in subscriber terminal equipment, can also be loaded into a certain application program of subscriber terminal equipment and (be handed over lightweight node
Mutual application program) etc..
This method can be executed by key handling device provided in an embodiment of the present invention, the device can be used hardware and/
Or the mode of software is realized, and can be integrated in subscriber terminal equipment, in the block chain lightweight node in subscriber terminal equipment,
Or the application program interacted with lightweight node is medium.Referring to Fig. 1, this method be can specifically include:
S110 determines the key of local block chain account using Encryption Algorithm.
In the present embodiment, Encryption Algorithm may include symmetry encryption algorithm and unsymmetrical tridiagonal matrix algorithm etc..Due to right
Title formula Encryption Algorithm is suitable for encrypting big data quantity, and the data volume of block chain account is smaller, and therefore, the present embodiment is preferably adopted
The key of local block chain account is determined with rivest, shamir, adelman.Wherein, unsymmetrical tridiagonal matrix algorithm may include rsa encryption
Algorithm, elliptic curve encryption algorithm (Elliptic Curves Cryptography, ECC) etc..
Optionally, different Encryption Algorithm corresponds to different encryption rules, therefore according to its corresponding encryption rule to this
Ground block chain account data is encrypted, using encrypted result as the key of local block chain account.Wherein, local block chain account
User data can include but is not limited to local block chain account name and password etc..The key of local block chain account may include this
The public key and private key of ground block chain account, wherein when private key is that user be related to the transaction of assets class, show identity it is important with
Card.
S120 determines the key string of local block chain account according to the feature of the feature of Encryption Algorithm and key.
In the present embodiment, the feature of Encryption Algorithm refers to the feature for characterizing Encryption Algorithm essence, further, adds
The feature of close algorithm can be embodied by the parameter of encryption function or analytical function associated by Encryption Algorithm and value etc..It is right
It answers, the feature of key refers to the feature for characterizing key essence, can carry out multilayer Kazakhstan to key using hash algorithm
Uncommon operation obtains;It is also possible to obtain the progress such as key and block chain address Hash operation.Optionally, the feature of key can be with
It is indicated using string format, the length of the character string is smaller than the length etc. of key itself.
Key string can be determined according to the feature of Encryption Algorithm and the feature of key.Specifically, encryption can be calculated
The feature of method and the Feature Conversion of key are identical presentation format such as string format, then will using the connection type of setting
It is connected, and the key string of local block chain account can be obtained.Wherein, the connection type of setting can be Encryption Algorithm
Feature is located at before or after the feature of key, can also be that the feature of Encryption Algorithm is added to the fixed bit in the feature of key
It sets and locates the feature at such as intermediate position or key and be added to fixed position etc. in the feature of Encryption Algorithm.
Illustratively, if Encryption Algorithm is elliptic curve encryption algorithm, according to the spy of the feature of Encryption Algorithm and key
Sign determines that the key string of local block chain account may include following:
A, the parameter of elliptic curve and the parameter of key used in ciphering process are extracted;
In the present embodiment, the parameter of elliptic curve may include the crucial ginseng in analytical expression corresponding to elliptic curve
Number, the key parameter are used to determine the track of elliptic curve, are parameters necessary to determining the key of local block chain account;It is ellipse
The parameter of circular curve can also include directly or indirectly influencing the other parameters etc. of key parameter.The parameter of key is to determine key
Have the parameter of uniqueness, key etc. can be determined using the parameter of key.
Specifically, using elliptic curve encryption algorithm, it, can be respectively from institute after the key for determining local block chain account
The parameter of elliptic curve and the parameter of key are extracted in the elliptic curve and key used, then according to the parameter of elliptic curve
The key string of local block chain account, i.e. execution B are determined with the parameter of key.
B, character string is converted by the parameter of the parameter of elliptic curve and key, obtains the key word of local block chain account
Symbol string.
Specifically, can be according to the transformation rule of setting, by the parameter for the elliptic curve being drawn into and the parameter of key point
Character string is not converted to, is then connected using the connection type of setting, the key word of local block chain account can be obtained
Symbol string.Wherein, the transformation rule of setting may include that the format of post-conversion characters string such as can be JSON (JavaScript
Object Notation, JS object numbered musical notation) change the character string etc. expressed.
S130 handles the key string of local block chain account, obtains according to the affairs password of local user
Key string ciphertext, key string ciphertext is for being recorded in subscriber terminal equipment.
In the present embodiment, affairs password refers to the preset payment cipher of user, and user can carry out according to the actual situation
Setting.Optionally, affairs password is the natural semantic character string of user's input, and format can be multidigit such as 6 bit digitals or word
Mother is also possible to number and the combination of letter etc..
Optionally, it is answered using what the key string of the affairs key pair local block chain account of local user was handled
Miscellaneous degree or level determine the complexity that key string ciphertext is cracked, can be according to user's actual selection key string
Ciphertext security level is handled.Specifically, can be the affairs password according to local user to the close of local block chain account
Key character string is encrypted, and then obtains key string ciphertext, and key string ciphertext is recorded in subscriber terminal equipment
In.In order to increase the complexity that key string ciphertext is cracked, can also be first to the affairs password of local user at
Reason, is obtained a derivative key, is then encrypted using key string of the derivative key to local block chain account, in turn
Obtain key string ciphertext etc..
In addition, it should be noted that, key of the user without remembering local block chain account, due to key string ciphertext
It is recorded in subscriber terminal equipment, when user needs the key using local block chain account, subscriber terminal equipment be can be used
The present embodiment provides the reversed of determining key string ciphertext and shifts process onto, determines that the key of local block chain account is simultaneously supplied to
User further increases the experience of user.
Technical solution provided in an embodiment of the present invention, the key that local block chain account is determined using Encryption Algorithm it
Afterwards, the key string of local block chain account can be determined according to the feature of Encryption Algorithm and the feature of key;Then using this
The key string of the affairs key pair local block chain account of ground user is handled, and obtains key string ciphertext, and will
The key string ciphertext is recorded in subscriber terminal equipment.Local block compared to existing technical solution, in this programme
The key of chain account is converted into key string ciphertext and is recorded in subscriber terminal equipment, can avoid key by handling layer by layer
It is stolen in plain text by other people, safety with higher and availability.In addition, user is without the local block chain account of memory
Key.
Embodiment two
Fig. 2 is a kind of flow chart of cipher key processing method provided by Embodiment 2 of the present invention, and the present embodiment is in above-mentioned implementation
On the basis of example, further to the affairs password according to local user, at the key string of local block chain account
Reason, obtains key string ciphertext and is explained.Referring to fig. 2, this method specifically includes:
S210 determines the key of local block chain account using Encryption Algorithm.
S220 determines the key string of local block chain account according to the feature of the feature of Encryption Algorithm and key.
S230 carries out cipher key derivative derivation using affairs password of the encryption function to local user, obtains derivative key.
In the present embodiment, encryption function refers to pre-set fixed function, for keeping the affairs password of local user multiple
Miscellaneous degree increases.Further, can be by increasing the length of the affairs password of local user, and then increase its complexity etc..It can
Choosing, encryption function can be the encryption function of the length of any affairs password that can make local user in the prior art
One or more of, the present embodiment does not limit this.Such as it can be DES (Data Encryption Standard, number
According to encryption standard), in AES (Advanced Encryption Standard, Advanced Encryption Standard) and hash function etc.
At least one.In addition, if two kinds of encryption functions can be such that the length of the affairs password of local user increases, preferred encryption intensity
It is stronger.
Derivative key is to carry out cipher key derivative using affairs password of the encryption function to local user to be derived by, length
It is determined, be can be fixed by encryption function;And its length is greater than the affairs Password Length of local user.For example, local user
Affairs Password Length be 16 bytes (i.e. 128 bits), derivative key can with length can be for 32 bytes (i.e. 256 bits).
Specifically, the complexity that key string ciphertext is cracked in order to further increase, can be used fixed encryption letter
The affairs password of several couples of local users carries out cipher key derivative derivation, and then obtains derivative key.
S240 handles according to key string of the derivative key to local block chain account, obtains key string
Ciphertext.
Specifically, after the key string for executing the determining local block chain account of S220, it can be first with encryption letter
The affairs password of several couples of local users carries out cipher key derivative derivation, obtains derivative key, then can use derivative key to this
The key string of ground block chain account is handled as encrypted, and then obtains key string ciphertext.The present embodiment is equivalent to
Two-stage is carried out to the key string of local block chain account to encrypt to obtain key string ciphertext, further increases key word
The complexity that symbol string ciphertext is cracked.
It optionally, can also be first using derivative key to local block chain account after executing S230 and obtaining derivative key
The key string at family is encrypted, then using other Encryption Algorithm again to encrypted result encryption etc.;Be also possible to it is other more
Advanced encipherment scheme, subsequent embodiment will be described in detail, and no explanation is provided here.
Technical solution provided in an embodiment of the present invention, the key that local block chain account is determined using Encryption Algorithm it
Afterwards, the key string of local block chain account can be determined according to the feature of Encryption Algorithm and the feature of key;It then utilizes and adds
Close function carries out cipher key derivative derivation to the affairs password of local user, obtains derivative key, and using derivative key to local
The key string of block chain account is handled, and obtains key string ciphertext, and the key string ciphertext is recorded in
In subscriber terminal equipment.Compared to existing technical solution, the key of the local block chain account in this programme is by layer by layer
Processing first determines the key string of local block chain account, then carries out to the key string of local block chain account
Two-stage treatment is converted into key string ciphertext, further increases the complexity that key string ciphertext is cracked, and can avoid
Key plain is stolen by other people, safety with higher and availability.In addition, user is without the local block chain account of memory
The key at family.
Embodiment three
Fig. 3 is a kind of flow chart for cipher key processing method that the embodiment of the present invention three provides, and the present embodiment is in above-mentioned implementation
On the basis of example, further to the affairs password according to local user, the key string of local block chain account is carried out
Processing, obtains key string ciphertext and is explained.Referring to Fig. 3, this method is specifically included:
S310 determines the key of local block chain account using Encryption Algorithm.
S320 determines the key string of local block chain account according to the feature of the feature of Encryption Algorithm and key.
S330 carries out cipher key derivative derivation using affairs password of the encryption function to local user, obtains derivative key.
S340 determines additional character string according to the key string of derivative key and local block chain account.
In the present embodiment, additional character string is used to assist increasing the complexity of the key string of local block chain account,
It can be determined according to the key string of derivative key and local block chain account.
Specifically, can be first by the byte long of the byte length of derivative key and the key string of local block chain account
Degree is unified into equally, and the two is then carried out XOR operation, the number that statistic is 1 from exclusive or result, if numerical value is 1
Number is one digit number such as 3, then directly can be used as additional character string for 33;If the number that numerical value is 1 is at least two such as 48,
Then may select from number it is big such as 8, then can be directly by 88 as additional character string etc..
It can also be and multilayer Hash operation is carried out according to the key string of derivative key and local block chain account, obtain
The character string of regular length, using the character string of regular length as additional character string etc..
S350 increases additional character string in the fixed position of the key string of local block chain account, obtains new
Key string.
In the present embodiment, fixed position can be preset fills in the key string of local block chain account
The position of additional character string, such as can be the front and/tail portion of the key string of local block chain account, it can also be this
Other positions in the key string of ground block chain account, such as fixed intermediate position.
Specifically, in the key string according to derivative key and local block chain account, after determining additional character string,
Additional character string can be added to the fixed position such as tail portion of the key string of local block chain account, and then obtained new
Key string.
S360 encrypts new key string using derivative key, obtains key string ciphertext.
Specifically, after the key string for executing the determining local block chain account of S320, it can be first with encryption letter
The affairs password of several couples of local users carries out cipher key derivative derivation, obtains derivative key;S340 and S350 is then executed by deriving
The key string of key and local block chain account, obtains new key string, and then using derivative key to new close
Key character string is encrypted, and then obtains key string ciphertext.In the present embodiment, it is equivalent to the close of local block chain account
Key character string carries out three-level and encrypts to obtain key string ciphertext, and further increase that key string ciphertext is cracked answers
Miscellaneous degree.
Technical solution provided in an embodiment of the present invention, the key that local block chain account is determined using Encryption Algorithm it
Afterwards, the key string of local block chain account can be determined according to the feature of Encryption Algorithm and the feature of key;It utilizes and adds later
Close function carries out cipher key derivative derivation to the affairs password of local user, obtains derivative key, and according to derivative key and local
The key string of block chain account obtains new key string, and then is carried out using derivative key to new key string
Processing, obtains key string ciphertext, and the key string ciphertext is recorded in subscriber terminal equipment.Compared to existing
Technical solution, the key of the local block chain account in this programme first determine local block chain account by handling layer by layer
Key string, then carrying out tertiary treatment to the key string of local block chain account, to be converted into key string close
Text further increases the complexity that key string ciphertext is cracked, can avoid key plain stolen by other people, have compared with
High safety and availability.In addition, user is without the key for remembering local block chain account.
Example IV
Fig. 4 is a kind of flow chart for cipher key processing method that the embodiment of the present invention four provides, and the present embodiment is in above-mentioned implementation
On the basis of example, further to the affairs password according to local user, the key string of local block chain account is carried out
Processing, obtains key string ciphertext and is explained.Referring to fig. 4, this method specifically includes:
S410 determines the key of local block chain account using Encryption Algorithm.
S420 determines the key string of local block chain account according to the feature of the feature of Encryption Algorithm and key.
S430 carries out cipher key derivative derivation using affairs password of the encryption function to local user, obtains derivative key.
S440 takes the byte length of the key string of local block chain account to the byte length of derivative key
Mould processing, obtains intermediate characteristic value.
Specifically, if the byte length of the key string of local block chain account is greater than the byte length of derivative key,
Then by the byte length of the key string of local block chain account divided by the character length of derivative key, and remainder is used as
Between characteristic value;Otherwise, by the character length of derivative key divided by the byte length of the key string of local block chain account, and
Using remainder as intermediate characteristic value.In general, the byte length of key string is greater than the byte length of derivative key.
The byte length of the key string of local block chain account is subtracted the difference of intermediate characteristic value, as auxiliary by S450
Help characteristic value.
In the present embodiment, directly the byte length of the key string of local block chain account will can be subtracted intermediate features
The difference of value, as supplemental characteristic value.For example, the byte length of the key string of local block chain account is 16, it is intermediate special
Value indicative is 7, then supplemental characteristic value is 9.
It optionally, can also be by the biggish work of number in difference result when difference result is two or more several
For auxiliary characteristic value etc..Such as the byte length of the key string of local block chain account is 32, the byte long of derivative key
Degree is 31, intermediate characteristic value 1, then supplemental characteristic value is 31, therefore can be used as supplemental characteristic value for 31;3 can also be made
To assist characteristic value.
Supplemental characteristic value value is the character for assisting characteristic value, as additional character string by S460.
Specifically, can be the character for assisting characteristic value by supplemental characteristic value value, as additional character string.For example,
Supplemental characteristic is 6, then the character string that can be formed 66, as additional character string.
S470 increases additional character string in the fixed position of the key string of local block chain account, obtains new
Key string.
S480 encrypts new key string using derivative key, obtains key string ciphertext.
Technical solution provided in an embodiment of the present invention provides a kind of according to the close of derivative key and local block chain account
Key character string determines the mode of additional character string, and additional character string is added to the key string of local block chain account later
Fixed position obtain new key string, and then new key string is handled using derivative key, is obtained
Key string ciphertext, and the key string ciphertext is recorded in subscriber terminal equipment.Compared to existing technical solution,
The key of local block chain account in this programme is being converted into key string ciphertext by processing layer by layer, increases key word
The complexity that symbol string ciphertext is cracked, can avoid key plain and is stolen by other people, safety with higher and availability.This
Outside, user is without the key for remembering local block chain account.
Embodiment five
Fig. 5 is a kind of flow chart for key application method that the embodiment of the present invention five provides, and the present embodiment is suitable for using
The case where block chain account key.Wherein, key handling side provided by above-described embodiment can be used in the key of block chain account
Method is handled.The scheme of the embodiment of the present invention can be executed by subscriber terminal equipment, may further be by subscriber terminal equipment
In block chain lightweight node or the application program that is interacted with lightweight node execute.This method can be implemented by the present invention
The key use device that example provides executes, which can be used hardware and/or the mode of software is realized, and can be integrated in user
In terminal device, or in the application program that is interacted with lightweight node.Referring to Fig. 5, this method is specifically included:
S510 obtains the affairs password of local user's input.
In the present embodiment, affairs password refers to the preset payment cipher of user, and user can carry out according to the actual situation
Setting.Optionally, affairs password is the natural semantic character string of user's input, and format can be multidigit such as 6 bit digitals or word
Mother is also possible to number and the combination of letter etc..
Specifically, the assets in the case where detecting that local user's needs use local block chain account carry out operational event such as friendship
Yi Shi, block chain lightweight node in subscriber terminal equipment or the application program interacted with lightweight node can show that affairs are close
Code input interface to prompt user to input affairs password, and then obtains the affairs password of local user's input.
It illustratively, can also include: to obtain Client-initiated block before the affairs password for obtaining local user's input
Chain transactions requests;If the operational event comprising local block chain account in block chain transactions requests, initiates alert notification, with
User is notified to input affairs password.
In the present embodiment, block chain transactions requests refer to user need block chain to transactions requests such as transaction request etc. into
The request initiated when row processing.Optionally, user can by with the block chain lightweight node in subscriber terminal equipment, or into
Person and the application program interacted with lightweight node interact, and then initiate block chain transactions requests etc..Local block chain account
The operational event at family may include being related to the assets class of local block chain account the operation such as trade, transfer accounts.Alert notification can be
It is reminded in the form of text importing or short message etc., can also be reminded in the form of showing and inputting affairs key interface etc..
Specifically, obtaining Client-initiated block chain transactions requests, whether detect in the block chain transactions requests comprising this
The operational event of ground block chain account to notify user to input affairs password, and then obtains this if so, initiating alert notification
The affairs password of ground user input.If it is not, but the block chain transactions requests that obtain are that block chain in subscriber terminal equipment is light
The direct block chain transactions requests then can be transmitted to block chain network by magnitude node;If the block chain transactions requests obtained
Be the application program interacted with lightweight node, then the block chain transactions requests can be transmitted to by area by lightweight node
Block chain network.
S520 obtains the key string ciphertext of the local block chain account stored in subscriber terminal equipment.
In the present embodiment, the key string of local block chain account is recordable in user's specific bit in subscriber terminal equipment
Set place.
Specifically, obtain local user input affairs password after, can from subscriber terminal equipment local user
Specified location obtains the key string ciphertext of local block chain account.
S530 is decrypted key string ciphertext using affairs password, obtains the key word of local block chain account
Symbol string.
In the present embodiment, during key handling, the key string ciphertext of local block chain account can pass through local
The affairs password of user is handled encryption such as to the key string of local block chain account and is obtained.Therefore, it is used in key
In the process, affairs password can be used key string ciphertext is decrypted, and then obtains the key word of local block chain account
Symbol string.That is affairs password is used, the process that key string ciphertext is decrypted is, local using affairs key pair
The inverse process that the key string of block chain account is encrypted.
S540, according to the key string of local block chain account, reconstruct Encryption Algorithm is close with local block chain account
Key.
In the present embodiment, Encryption Algorithm refers to algorithm used in the key for determining local block chain account.
Specifically, the key string of local block chain account is the spy according to Encryption Algorithm during key handling
Seek peace key feature determine.Therefore, in key use process, the key string for obtaining local block chain account it
Afterwards, the feature of Encryption Algorithm and the feature of key can be read from the key string of local block chain account;It then, can be according to adding
The feature reconstruction Encryption Algorithm of close algorithm, according to reconstruct Encryption Algorithm and key feature reconstruction local block chain account it is close
Key.For example, the feature of Encryption Algorithm is the parameter and value etc. of encryption function associated by Encryption Algorithm, therefore can be according to adding
Parameter and value of close function etc. determine analytical expression corresponding to encryption function, and then determine Encryption Algorithm;It is reconstructing
After Encryption Algorithm, anti-Encryption Algorithm, i.e., the key of restructural this area block chain account can be solved according to the parameter of key.
S550 signs the block chain transactions requests of local block chain account using the Encryption Algorithm and key of reconstruct
Name.
Specifically, reconstruct can be used after the key for executing S540 reconstruct Encryption Algorithm and local block chain account
Encryption Algorithm and the block chain transactions requests of key pair local block chain account sign, key pair sheet can also be only used
The block chain transactions requests of ground block chain account are signed etc., to show local user's identity.
Technical solution provided in an embodiment of the present invention is determining that user needs the area using key pair local block chain account
When block chain transactions requests are signed, stored in the affairs password and subscriber terminal equipment of available local user's input
The key string ciphertext of local block chain account;And key string ciphertext is decrypted using affairs password, obtain this
The key string of ground block chain account then can reconstruct Encryption Algorithm and key according to key string, and then use
The Encryption Algorithm and key of reconstruct can the block chain transactions requests to local block chain account sign.This programme user without
The key of local block chain account need to be remembered, need to only input affairs password can be completed block chain thing to local block chain account
The signature of business request, increases the experience of user.In addition, key string ciphertext is recorded in subscriber terminal equipment, can keep away
Exempt from key plain to be stolen by other people, safety with higher and availability.
Embodiment six
Fig. 6 is a kind of flow chart for key application method that the embodiment of the present invention six provides, and the present embodiment is in above-mentioned implementation
On the basis of example, further to affairs password is used, key string ciphertext is decrypted, local block chain account is obtained
Key string is explained.Referring to Fig. 6, this method is specifically included:
S610 obtains the affairs password of local user's input.
S620 obtains the key string ciphertext of the local block chain account stored in subscriber terminal equipment.
S630 carries out cipher key derivative derivation to the affairs password that local user inputs using encryption function, obtains deriving close
Key.
In the present embodiment, encryption function refers to pre-set fixed function, for keeping the affairs password of local user multiple
Miscellaneous degree increases.Further, can be by increasing the length of the affairs password of local user, and then increase its complexity etc..It can
Choosing, encryption function can be the encryption function of the length of any affairs password that can make local user in the prior art
One or more of, the present embodiment does not limit this.Such as it can be DES (Data Encryption Standard, number
According to encryption standard), in AES (Advanced Encryption Standard, Advanced Encryption Standard) and hash function etc.
At least one.In addition, if two kinds of encryption functions can be such that the length of the affairs password of local user increases, preferred encryption intensity
It is stronger.
Derivative key is to carry out cipher key derivative using affairs password of the encryption function to local user to be derived by, length
It is determined, be can be fixed by encryption function;And its length is greater than the affairs Password Length of local user.For example, local user
Affairs Password Length be 16 bytes (i.e. 128 bits), derivative key can with length can be for 32 bytes (i.e. 256 bits).
Cipher key derivative derivation is carried out to the affairs password of local user specifically, fixed encryption function can be used, and then is derived
Key.
S640 is decrypted key string ciphertext according to derivative key, obtains the close of local block chain account
Key character string.
In the present embodiment, during key handling, the key string ciphertext of local block chain account can pass through derivative
Key is handled encryption such as to the key string of local block chain account and is obtained.It therefore, can in key use process
Key string ciphertext is decrypted using derivative key, and then obtains the key string of local block chain account.
That is it is using the process that key string ciphertext is decrypted in derivative key, using derivative key to local block chain
The inverse process that the key string of account is encrypted.
S650, according to the key string of local block chain account, reconstruct Encryption Algorithm is close with local block chain account
Key.
S660 signs the block chain transactions requests of local block chain account using the Encryption Algorithm and key of reconstruct
Name.
Technical solution provided in an embodiment of the present invention is determining that user needs the area using key pair local block chain account
When block chain transactions requests are signed, stored in the affairs password and subscriber terminal equipment of available local user's input
The key string ciphertext of local block chain account;And key is carried out using using affairs password of the encryption function to local user
It is derivative to derive, derivative key is obtained, key string ciphertext is decrypted according to derivative key, local block chain can be obtained
The key string of account;Then Encryption Algorithm and key, and then adding using reconstruct can be reconstructed according to key string
Close algorithm and key can the block chain transactions requests to local block chain account sign.This programme user is without remembering this
The key of ground block chain account, only need to input affairs password can be completed to the block chain transactions requests of local block chain account
Signature, increases the experience of user.In addition, carrying out processing layer by layer to the key string of local block chain account is converted to key
Character string ciphertext is recorded in subscriber terminal equipment, further increases the complexity that key string ciphertext is cracked, and can be kept away
Exempt from key plain to be stolen by other people, safety with higher and availability.
Embodiment seven
Fig. 7 is a kind of flow chart for key application method that the embodiment of the present invention seven provides, and the present embodiment is in above-mentioned implementation
On the basis of example, further to affairs password is used, key string ciphertext is decrypted, local block chain account is obtained
Key string be explained.Referring to Fig. 7, this method is specifically included:
S710 obtains the affairs password of local user's input.
S720 obtains the key string ciphertext of the local block chain account stored in subscriber terminal equipment.
S730 carries out cipher key derivative derivation to the affairs password that local user inputs using encryption function, obtains deriving close
Key.
S740 is decrypted key string ciphertext according to derivative key, obtains new key string.
In the present embodiment, during key handling, since key string ciphertext is according to derivative key to new close
Key character string is encrypted to obtain, and new key string is in the fixation position of the key string of local block chain account
Place increases what additional character string obtained.Therefore, in key use process, the key character of local block chain account in order to obtain
String, the inverse process that can execute aforesaid operations process can be obtained.Specifically, can be close to key string according to derivative key
Text is decrypted, and obtains new key string, then, rejects additional character from the fixed position of new key string
String, the key string that local block chain account can be obtained execute S750.
S750 rejects additional character string from new key string, obtains the key string of local block chain account.
Illustratively, it may include: to read new key string that additional character string is rejected from new key string
In supplemental characteristic character value;Reject the supplemental characteristic character value character for being located at new key string fixed position.
In the present embodiment, during key handling, new key string is the key word in local block chain account
The fixed position of symbol string increases what additional character string obtained.Therefore, in key use process, from new key string
Fixed position rejects additional character string, and the key string of local block chain account can be obtained.Wherein, fixed position with
The position that additional character string is filled in the key string of local block chain account is corresponding, such as can be new key character
The front of string and/tail portion, can also be the other positions in new key string, such as intermediate position.
Supplemental characteristic character value refers to the character value of fixed position in new key string, such as tail portion or head character
Value etc..
For example, the tail portion character value in new key string can be read, then rejects and be located at new key string
The tail portion character value character of tail portion, can be obtained the key string of local block chain account.If tail portion character value is 6, then
66 of new key string tail portion can be rejected, the key string of local block chain account can be obtained.
S760, according to the key string of local block chain account, reconstruct Encryption Algorithm is close with local block chain account
Key.
S770 signs the block chain transactions requests of local block chain account using the Encryption Algorithm and key of reconstruct
Name.
Technical solution provided in an embodiment of the present invention is determining that user needs the area using key pair local block chain account
When block chain transactions requests are signed, stored in the affairs password and subscriber terminal equipment of available local user's input
The key string ciphertext of local block chain account;And key is carried out using using affairs password of the encryption function to local user
Derivative is derived by derivative key, and key string ciphertext is decrypted according to derivative key to obtain new key string,
And then additional character string is rejected from new key string, the key string of local block chain account can be obtained;Then
Encryption Algorithm and key can be reconstructed according to key string, and then can be to local using the Encryption Algorithm and key of reconstruct
The block chain transactions requests of block chain account are signed.Key of this programme user without remembering local block chain account, only
Affairs password, which need to be inputted, can be completed signature to the block chain transactions requests of local block chain account, increase the body of user
It tests.Use is recorded in addition, carrying out processing layer by layer to the key string of local block chain account and being converted to key string ciphertext
In the terminal device of family, the complexity that key string ciphertext is cracked is further increased, can avoid key plain by other people
It steals, safety with higher and availability.
Embodiment eight
Fig. 8 is a kind of flow chart for key application method that the embodiment of the present invention eight provides, and the present embodiment is in above-mentioned implementation
On the basis of example, in the case where Encryption Algorithm is elliptic curve encryption algorithm, further to according to local block chain account
The key of key string, reconstruct Encryption Algorithm and local block chain account is explained.Referring to Fig. 8, this method is specific
Include:
S810 obtains the affairs password of local user's input.
S820 obtains the key string ciphertext of the local block chain account stored in subscriber terminal equipment.
S830 is decrypted key string ciphertext using affairs password, obtains the key word of local block chain account
Symbol string.
S840 determines the ginseng of elliptic curve used in ciphering process according to the key string of local block chain account
Several and key parameter.
In the case where Encryption Algorithm is elliptic curve encryption algorithm, during key handling, local block chain account
Key string be that the character string converted according to the parameter of elliptic curve and the parameter of key obtains.Therefore, in key
In use process, after the key string for obtaining local block chain account, the process opposite with Cipher Processing can be used, i.e.,
The key of elliptic curve used in restructural ciphering process and local block chain account.Specifically, can be first from local block
The parameter of elliptic curve and the parameter of key are read in the key string of chain account, then reconstruct encryption according to the parameter read
The key of elliptic curve used in process and local block chain account.
S850 reconstructs elliptic curve used in ciphering process according to the parameter of elliptic curve.
Specifically, determining elliptic curve used in ciphering process in the key string according to local block chain account
Parameter and key parameter after, can parameter according to elliptic curve etc. determine analytical expression corresponding to elliptic curve,
And then obtain elliptic curve used in ciphering process.
S860 reconstructs the key of local block chain account according to the parameter of the elliptic curve of reconstruct and key.
Specifically, as the key of account in local block be based on determined by elliptic curve encryption algorithm,
It, can be according to the elliptic curve of reconstruct and close after reconstructing elliptic curve used in ciphering process according to the parameter of elliptic curve
The key of local block chain account can be obtained in the parameter of key.For example, can using the parameter of key as the value of elliptic curve,
Or the value of some in elliptic curve or multiple parameters, elliptic curve is then instead solved, local block chain account can be obtained
Key.
S870 signs the block chain transactions requests of local block chain account using the elliptic curve and key of reconstruct
Name.
Technical solution provided in an embodiment of the present invention, provide it is a kind of in Encryption Algorithm be elliptic curve encryption algorithm feelings
Under condition, how according to key string the thinking of Encryption Algorithm and key is reconstructed, and then use the Encryption Algorithm of reconstruct and close
Key can the block chain transactions requests to local block chain account sign.This programme user is without remembering local block chain account
The key at family, need to only input affairs password can be completed signature to the block chain transactions requests of local block chain account, increase
The experience of user.In addition, key string ciphertext is recorded in subscriber terminal equipment, key plain can avoid by other people
It steals, safety with higher and availability.
Embodiment nine
Fig. 9 is a kind of structural block diagram for key handling device that the embodiment of the present invention nine provides, which is configured in use
In the terminal device of family.Cipher key processing method provided by the embodiment of the present invention one to four can be performed in the device, has execution method
Corresponding functional module and beneficial effect.As shown in figure 9, the apparatus may include:
Key determining module 910 determines the key of local block chain account for utilizing Encryption Algorithm;
Key string determining module 920, for determining local block according to the feature of Encryption Algorithm and the feature of key
The key string of chain account;
Ciphertext determining module 930, for the affairs password according to local user, to the key character of local block chain account
String is handled, and obtains key string ciphertext, key string ciphertext is for being recorded in subscriber terminal equipment.
Technical solution provided in an embodiment of the present invention, the key that local block chain account is determined using Encryption Algorithm it
Afterwards, the key string of local block chain account can be determined according to the feature of Encryption Algorithm and the feature of key;Then using this
The key string of the affairs key pair local block chain account of ground user is handled, and obtains key string ciphertext, and will
The key string ciphertext is recorded in subscriber terminal equipment.Local block compared to existing technical solution, in this programme
The key of chain account is converted into key string ciphertext and is recorded in subscriber terminal equipment, can avoid key by handling layer by layer
It is stolen in plain text by other people, safety with higher and availability.In addition, user is without the local block chain account of memory
Key.
Illustratively, if Encryption Algorithm is elliptic curve encryption algorithm, key string determining module 920 specifically can be with
For:
Extract the parameter of elliptic curve and the parameter of key used in ciphering process;
Character string is converted by the parameter of the parameter of elliptic curve and key, obtains the key character of local block chain account
String.
Illustratively, ciphertext determining module 930 may include:
First derivative key determination unit, for carrying out cipher key derivative using affairs password of the encryption function to local user
It derives, obtains derivative key;
Ciphertext determination unit is obtained for being handled according to key string of the derivative key to local block chain account
To key string ciphertext.
Illustratively, ciphertext determination unit may include:
Additional character string determines subelement, for the key string according to derivative key and local block chain account, really
Determine additional character string;
New key character string determines subelement, and the fixed position for the key string in local block chain account increases
Add additional character string, obtains new key string;
Encryption sub-unit operable, for being encrypted using derivative key to new key string.
Illustratively, additional character string determines that subelement specifically can be used for:
Byte length of the byte length of the key string of local block chain account to derivative key is carried out at modulus
Reason, obtains intermediate characteristic value;
The difference that the byte length of the key string of local block chain account is subtracted to intermediate characteristic value, as supplemental characteristic
Value;
It is the character for assisting characteristic value by supplemental characteristic value value, as additional character string.
Illustratively, affairs password is the natural semantic character string of user's input, which is configured in user terminal and sets
In standby, the block chain lightweight node being further configured in subscriber terminal equipment or the application journey interacted with lightweight node
In sequence.
Embodiment ten
Figure 10 is a kind of structural block diagram for key use device that the embodiment of the present invention ten provides, which is configured in use
In the terminal device of family.Key application method provided by the embodiment of the present invention five to eight can be performed in the device, has execution method
Corresponding functional module and beneficial effect.As shown in Figure 10, the apparatus may include:
Affairs password obtains module 1010, for obtaining the affairs password of local user's input;
Ciphertext obtains module 1020, for obtaining the key character of the local block chain account stored in subscriber terminal equipment
String ciphertext;
Ciphertext deciphering module 1030 is decrypted key string ciphertext, obtains this area for using affairs password
The key string of block chain account;
Algorithm secret key reconstructed module 1040 reconstructs Encryption Algorithm for the key string according to local block chain account
With the key of local block chain account;
Signature blocks 1050, for using the Encryption Algorithm and key of reconstruct, to the block chain thing of local block chain account
Business request is signed.
Technical solution provided in an embodiment of the present invention is determining that user needs the area using key pair local block chain account
When block chain transactions requests are signed, stored in the affairs password and subscriber terminal equipment of available local user's input
The key string ciphertext of local block chain account;And key string ciphertext is decrypted using affairs password, obtain this
The key string of ground block chain account then can reconstruct Encryption Algorithm and key according to key string, and then use
The Encryption Algorithm and key of reconstruct can the block chain transactions requests to local block chain account sign.This programme user without
The key of local block chain account need to be remembered, need to only input affairs password can be completed block chain thing to local block chain account
The signature of business request, increases the experience of user.In addition, key string ciphertext is recorded in subscriber terminal equipment, can keep away
Exempt from key plain to be stolen by other people, safety with higher and availability.
Illustratively, ciphertext deciphering module 1030 may include:
Second derivative key determination unit, for carrying out key to the affairs password that local user inputs using encryption function
It is derivative to derive, obtain derivative key;
Ciphertext decryption unit obtains this area for key string ciphertext to be decrypted according to derivative key
The key string of block chain account.
It should be noted that for same subscriber terminal equipment, the first derivative key determination unit and the second derivative key
Determination unit is identical.
Illustratively, ciphertext decryption unit may include:
Ciphertext decrypts subelement and obtains new key for key string ciphertext to be decrypted according to derivative key
Character string;
Character string rejects subelement, for rejecting additional character string from new key string, obtains local block chain
The key string of account.
Illustratively, character string is rejected subelement and specifically be can be used for:
Read the supplemental characteristic character value in new key string;
Reject the supplemental characteristic character value character for being located at new key string fixed position.
Illustratively, if Encryption Algorithm is elliptic curve encryption algorithm, algorithm secret key reconstructed module 1040 specifically can be with
For:
According to the key string of local block chain account, the parameter of elliptic curve used in ciphering process and close is determined
The parameter of key;
According to the parameter of elliptic curve, elliptic curve used in ciphering process is reconstructed;
According to the parameter of the elliptic curve of reconstruct and key, the key of local block chain account is reconstructed.
Illustratively, above-mentioned apparatus can also include:
Transactions requests obtain module, for obtaining Client-initiated before the affairs password for obtaining local user's input
Block chain transactions requests;
Alert notification initiation module, if for the operation thing comprising local block chain account in block chain transactions requests
Preferably, then alert notification is initiated, to notify user to input affairs password.
Illustratively, affairs password is the natural semantic character string of user's input, which is configured in user terminal and sets
In standby, the block chain lightweight node being further configured in subscriber terminal equipment or the application journey interacted with lightweight node
In sequence.
Embodiment 11
Figure 11 is a kind of structural schematic diagram for equipment that the embodiment of the present invention 11 provides, and Figure 11, which is shown, to be suitable for being used in fact
The block diagram of the example devices of existing embodiment of the embodiment of the present invention.The equipment that Figure 11 is shown is only an example, should not be right
The function and use scope of the embodiment of the present invention bring any restrictions.Equipment can be subscriber terminal equipment, and typical case, which can be, to be added
Carry the subscriber terminal equipment of block chain lightweight node, or the user configured with the application program that can be interacted with lightweight node
Terminal device.
As shown in figure 11, equipment 12 is showed in the form of universal computing device.The component of equipment 12 may include but unlimited
In one or more processor or processing unit 16, system storage 28, connecting different system components, (including system is deposited
Reservoir 28 and processing unit 16) bus 18.
Bus 18 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller,
Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts
For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC)
Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Equipment 12 typically comprises a variety of computer system readable media.These media can be it is any can be by equipment 12
The usable medium of access, including volatile and non-volatile media, moveable and immovable medium.
System storage 28 may include the computer system readable media of form of volatile memory, such as arbitrary access
Memory (RAM) 30 and/or cache memory 32.Equipment 12 may further include it is other it is removable/nonremovable,
Volatile/non-volatile computer system storage medium.Only as an example, storage system 34 can be used for reading and writing irremovable
, non-volatile magnetic media (Figure 11 do not show, commonly referred to as " hard disk drive ").Although being not shown in Figure 11, can provide
Disc driver for being read and write to removable non-volatile magnetic disk (such as " floppy disk "), and to removable anonvolatile optical disk
The CD drive of (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driver can
To be connected by one or more data media interfaces with bus 18.System storage 28 may include that at least one program produces
Product, the program product have one group of (for example, at least one) program module, these program modules are configured to perform of the invention real
Apply the function of each embodiment of example.
Program/utility 40 with one group of (at least one) program module 42 can store and store in such as system
In device 28, such program module 42 includes but is not limited to operating system, one or more application program, other program modules
And program data, it may include the realization of network environment in each of these examples or certain combination.Program module 42
Usually execute the function and/or method in described embodiment of the embodiment of the present invention.
Equipment 12 can also be communicated with one or more external equipments 14 (such as keyboard, sensing equipment, display 24 etc.),
Can also be enabled a user to one or more equipment interacted with the equipment 12 communication, and/or with enable the equipment 12 with
One or more of the other any equipment (such as network interface card, modem etc.) communication for calculating equipment and being communicated.It is this logical
Letter can be carried out by input/output (I/O) interface 22.Also, equipment 12 can also by network adapter 20 and one or
The multiple networks of person (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) communication.As shown,
Network adapter 20 is communicated by bus 18 with other modules of equipment 12.It should be understood that although not shown in the drawings, can combine
Equipment 12 use other hardware and/or software module, including but not limited to: microcode, device driver, redundant processing unit,
External disk drive array, RAID system, tape drive and data backup storage system etc..
Processing unit 16 by the program that is stored in system storage 28 of operation, thereby executing various function application and
Data processing, such as realize key handling and/or key application method provided by the embodiment of the present invention.
Embodiment 12
The embodiment of the present invention 12 also provides a kind of computer readable storage medium, be stored thereon with computer program (or
Referred to as computer executable instructions), for executing a kind of cipher key processing method, this method packet when which is executed by processor
It includes:
Using Encryption Algorithm, the key of local block chain account is determined;
According to the feature of the feature of Encryption Algorithm and the key, the key string of local block chain account is determined;
According to the affairs password of local user, the key string of local block chain account is handled, key is obtained
Character string ciphertext, key string ciphertext is for being recorded in subscriber terminal equipment.
And/or a kind of key application method, this method comprises:
Obtain the affairs password of local user's input;
Obtain the key string ciphertext of the local block chain account stored in subscriber terminal equipment;
Using affairs password, key string ciphertext is decrypted, obtains the key string of local block chain account;
According to the key string of local block chain account, the key of Encryption Algorithm and local block chain account is reconstructed;
Using the Encryption Algorithm and key of reconstruct, sign to the block chain transactions requests of local block chain account.
The computer storage medium of the embodiment of the present invention, can be using any of one or more computer-readable media
Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable
Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or
Device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: tool
There are electrical connection, the portable computer diskette, hard disk, random access memory (RAM), read-only memory of one or more conducting wires
(ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-
ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage
Medium can be any tangible medium for including or store program, which can be commanded execution system, device or device
Using or it is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for
By the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited
In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with one or more programming languages or combinations thereof come write for execute the embodiment of the present invention operation
Computer program code, described program design language include object oriented program language-such as Java,
Smalltalk, C++, further include conventional procedural programming language-such as " C " language or similar program design language
Speech.Program code can be executed fully on the user computer, partly be executed on the user computer, as an independence
Software package execute, part on the user computer part execute on the remote computer or completely in remote computer or
It is executed on server.In situations involving remote computers, remote computer can pass through the network of any kind --- packet
It includes local area network (LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as benefit
It is connected with ISP by internet).
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that
The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation,
It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being implemented by above embodiments to the present invention
Example is described in further detail, but the embodiment of the present invention is not limited only to above embodiments, is not departing from structure of the present invention
It can also include more other equivalent embodiments in the case where think of, and the scope of the present invention is determined by scope of the appended claims
It is fixed.
Claims (17)
1. a kind of cipher key processing method, which is characterized in that be applied to subscriber terminal equipment, which comprises
Using Encryption Algorithm, the key of local block chain account is determined;
According to the feature of the feature of the Encryption Algorithm and the key, the key string of local block chain account is determined;
According to the affairs password of local user, the key string of the local block chain account is handled, key is obtained
Character string ciphertext, the key string ciphertext is for being recorded in subscriber terminal equipment.
2. the method according to claim 1, wherein if the Encryption Algorithm is elliptic curve encryption algorithm,
According to the feature of the feature of the Encryption Algorithm and the key, the key string of local block chain account is determined, comprising:
Extract the parameter of elliptic curve and the parameter of the key used in ciphering process;
Character string is converted by the parameter of the parameter of the elliptic curve and the key, obtains the key of local block chain account
Character string.
3. the method according to claim 1, wherein according to the affairs password of local user, to described this area
The key string of block chain account is handled, and key string ciphertext is obtained, comprising:
Cipher key derivative derivation is carried out using affairs password of the encryption function to local user, obtains derivative key;
It is handled according to key string of the derivative key to the local block chain account, obtains key string ciphertext.
4. according to the method described in claim 3, it is characterized in that, according to derivative key to the close of the local block chain account
Key character string is handled, comprising:
According to the key string of derivative key and the local block chain account, additional character string is determined;
Increase the additional character string in the fixed position of the key string of the local block chain account, obtains new close
Key character string;
New key string is encrypted using the derivative key.
5. according to the method described in claim 4, it is characterized in that, according to the close of derivative key and the local block chain account
Key character string determines additional character string, comprising:
The byte length of the key string of the local block chain account takes the byte length of the derivative key
Mould processing, obtains intermediate characteristic value;
The difference that the byte length of the key string of the local block chain account is subtracted to the intermediate characteristic value, as auxiliary
Characteristic value;
It is the character for assisting characteristic value by supplemental characteristic value value, as additional character string.
6. the method according to claim 1, wherein the affairs password is the natural semantic character of user's input
The executing subject of string, the method is answered for the block chain lightweight node in subscriber terminal equipment or with what lightweight node interacted
Use program.
7. a kind of key application method, which is characterized in that be applied to subscriber terminal equipment, which comprises
Obtain the affairs password of local user's input;
Obtain the key string ciphertext of the local block chain account stored in the subscriber terminal equipment;
Using the affairs password, key string ciphertext is decrypted, obtains the key string of local block chain account;
According to the key string of local block chain account, the key of Encryption Algorithm and local block chain account is reconstructed;
Using the Encryption Algorithm and key of reconstruct, sign to the block chain transactions requests of local block chain account.
8. the method according to the description of claim 7 is characterized in that using the affairs password, to key string ciphertext into
Row decryption, obtains the key string of local block chain account, comprising:
Cipher key derivative derivation is carried out to the affairs password that local user inputs using encryption function, obtains derivative key;
The key string ciphertext is decrypted according to the derivative key, obtains the key of local block chain account
Character string.
9. according to the method described in claim 8, it is characterized in that, according to the derivative key to the key string ciphertext
It is decrypted, obtains the key string of local block chain account, comprising:
The key string ciphertext is decrypted according to the derivative key, obtains new key string;
Additional character string is rejected from new key string, obtains the key string of local block chain account.
10. according to the method described in claim 9, it is characterized in that, from new key string reject additional character string, packet
It includes:
Read the supplemental characteristic character value in new key string;
Reject the supplemental characteristic character value character for being located at new key string fixed position.
11. the method according to the description of claim 7 is characterized in that if the Encryption Algorithm is elliptic curve encryption algorithm, root
According to the key string of local block chain account, the key of Encryption Algorithm and local block chain account is reconstructed, comprising:
According to the key string of local block chain account, the parameter of elliptic curve used in ciphering process and described close is determined
The parameter of key;
According to the parameter of the elliptic curve, elliptic curve used in ciphering process is reconstructed;
According to the parameter of the elliptic curve of reconstruct and the key, the key of local block chain account is reconstructed.
12. the method according to the description of claim 7 is characterized in that also being wrapped before obtaining the affairs password that local user inputs
It includes:
Obtain Client-initiated block chain transactions requests;
If the operational event comprising local block chain account in the block chain transactions requests, initiates alert notification, with logical
Know that user inputs affairs password.
13. the method according to the description of claim 7 is characterized in that the affairs password is the natural semantic word of user's input
Symbol string, the executing subject of the method are block chain lightweight node in subscriber terminal equipment or interact with lightweight node
Application program.
14. a kind of key handling device, which is characterized in that be configured in subscriber terminal equipment, described device includes:
Key determining module determines the key of local block chain account for utilizing Encryption Algorithm;
Key string determining module, for determining this area according to the feature of the Encryption Algorithm and the feature of the key
The key string of block chain account;
Ciphertext determining module, for the affairs password according to local user, to the key string of the local block chain account
It is handled, obtains key string ciphertext, the key string ciphertext is for being recorded in subscriber terminal equipment.
15. a kind of key use device, which is characterized in that be configured in subscriber terminal equipment, described device includes:
Affairs password obtains module, for obtaining the affairs password of local user's input;
Ciphertext obtains module, and the key string for obtaining the local block chain account stored in the subscriber terminal equipment is close
Text;
Ciphertext deciphering module is decrypted key string ciphertext, obtains local block chain for using the affairs password
The key string of account;
Algorithm secret key reconstructed module reconstructs Encryption Algorithm and this area for the key string according to local block chain account
The key of block chain account;
Signature blocks, for using the Encryption Algorithm and key of reconstruct, to the block chain transactions requests of local block chain account into
Row signature.
16. a kind of equipment characterized by comprising
One or more processors;
Memory, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real
Now such as cipher key processing method of any of claims 1-6, or realize as described in any one of claim 7-13
Key application method.
17. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor
It is realized when execution such as cipher key processing method of any of claims 1-6, or realization such as in claim 7-13
Key application method described in one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910107557.8A CN109818751B (en) | 2019-02-02 | 2019-02-02 | Key processing and using method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910107557.8A CN109818751B (en) | 2019-02-02 | 2019-02-02 | Key processing and using method, device, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109818751A true CN109818751A (en) | 2019-05-28 |
CN109818751B CN109818751B (en) | 2021-12-07 |
Family
ID=66605229
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910107557.8A Active CN109818751B (en) | 2019-02-02 | 2019-02-02 | Key processing and using method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109818751B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110990872A (en) * | 2019-12-03 | 2020-04-10 | 成都链鱼科技有限公司 | Private key export two-dimensional code storage and scanning recovery method based on block chain |
CN111031475A (en) * | 2019-12-19 | 2020-04-17 | 达闼科技成都有限公司 | Method for collecting terminal position information, terminal, position collecting terminal and storage medium |
CN109818751B (en) * | 2019-02-02 | 2021-12-07 | 百度在线网络技术(北京)有限公司 | Key processing and using method, device, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108702287A (en) * | 2018-04-16 | 2018-10-23 | 深圳前海达闼云端智能科技有限公司 | Information publication based on block chain and acquisition methods, device and block chain node |
CN108833093A (en) * | 2018-06-14 | 2018-11-16 | 百度在线网络技术(北京)有限公司 | Determination method, apparatus, equipment and the storage medium of account key |
US20180351750A1 (en) * | 2016-06-16 | 2018-12-06 | The Bank Of New York Mellon | Distributed, centrally authored block chain network |
CN108964903A (en) * | 2018-07-12 | 2018-12-07 | 腾讯科技(深圳)有限公司 | password storage method and device |
CN109120639A (en) * | 2018-09-26 | 2019-01-01 | 众安信息技术服务有限公司 | A kind of data cloud storage encryption method and system based on block chain |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109818751B (en) * | 2019-02-02 | 2021-12-07 | 百度在线网络技术(北京)有限公司 | Key processing and using method, device, equipment and storage medium |
-
2019
- 2019-02-02 CN CN201910107557.8A patent/CN109818751B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180351750A1 (en) * | 2016-06-16 | 2018-12-06 | The Bank Of New York Mellon | Distributed, centrally authored block chain network |
CN108702287A (en) * | 2018-04-16 | 2018-10-23 | 深圳前海达闼云端智能科技有限公司 | Information publication based on block chain and acquisition methods, device and block chain node |
CN108833093A (en) * | 2018-06-14 | 2018-11-16 | 百度在线网络技术(北京)有限公司 | Determination method, apparatus, equipment and the storage medium of account key |
CN108964903A (en) * | 2018-07-12 | 2018-12-07 | 腾讯科技(深圳)有限公司 | password storage method and device |
CN109120639A (en) * | 2018-09-26 | 2019-01-01 | 众安信息技术服务有限公司 | A kind of data cloud storage encryption method and system based on block chain |
Non-Patent Citations (1)
Title |
---|
刘艳: "《一种用于终端小型设备的轻量级》", 《软件学报》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109818751B (en) * | 2019-02-02 | 2021-12-07 | 百度在线网络技术(北京)有限公司 | Key processing and using method, device, equipment and storage medium |
CN110990872A (en) * | 2019-12-03 | 2020-04-10 | 成都链鱼科技有限公司 | Private key export two-dimensional code storage and scanning recovery method based on block chain |
CN110990872B (en) * | 2019-12-03 | 2022-03-25 | 成都链鱼科技有限公司 | Private key export two-dimensional code storage and scanning recovery method based on block chain |
CN111031475A (en) * | 2019-12-19 | 2020-04-17 | 达闼科技成都有限公司 | Method for collecting terminal position information, terminal, position collecting terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109818751B (en) | 2021-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI686073B (en) | Key data processing method, device and server | |
US11196540B2 (en) | End-to-end secure operations from a natural language expression | |
US10009179B2 (en) | Trusted platform module (TPM) protected device | |
CN107733656A (en) | A kind of cipher authentication method and device | |
US20170366348A1 (en) | Blockchain systems and methods for user authentication | |
CN109951295B (en) | Key processing and using method, device, equipment and medium | |
JP2022536645A (en) | Key Recovery Using Encrypted Secret Share | |
CN107612683B (en) | Encryption and decryption method, device, system, equipment and storage medium | |
CN109818751A (en) | Key handling and application method, device, equipment and storage medium | |
US20180254904A1 (en) | Integrated authentication system for authentication using single-use random numbers | |
JP2019527950A (en) | Communication device, point-of-sale terminal, payment device, and method | |
CN109981297A (en) | Block chain processing method, device, equipment and storage medium | |
CN110084599B (en) | Key processing method, device, equipment and storage medium | |
CN103353973B (en) | Banking transaction authentication method and system based on audio authentication | |
CN112287379B (en) | Service data using method, device, equipment, storage medium and program product | |
CN109613990A (en) | Soft keyboard secured inputting method, server, client, electronic equipment and medium | |
TW201315195A (en) | Method and computer system for providing time ratio-based password/challenge authentication | |
CN113537633A (en) | Prediction method, device, equipment, medium and system based on longitudinal federal learning | |
US11899803B2 (en) | System for implementing enhanced file encryption technique | |
JP2013529804A (en) | Method and system for data encryption, decryption and segmentation of a secure order management system | |
CN111062045A (en) | Information encryption and decryption method and device, electronic equipment and storage medium | |
JP4763465B2 (en) | Personal authentication apparatus, server apparatus, authentication system, and authentication method | |
CN108337090A (en) | A kind of dynamic password acquisition methods, device, terminal and storage medium | |
WO2023241142A1 (en) | Data processing method and apparatus, storage medium, and electronic device | |
CN111415155A (en) | Encryption method, device, equipment and storage medium for chain-dropping transaction data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |