CN109818751A - Key handling and application method, device, equipment and storage medium - Google Patents

Key handling and application method, device, equipment and storage medium Download PDF

Info

Publication number
CN109818751A
CN109818751A CN201910107557.8A CN201910107557A CN109818751A CN 109818751 A CN109818751 A CN 109818751A CN 201910107557 A CN201910107557 A CN 201910107557A CN 109818751 A CN109818751 A CN 109818751A
Authority
CN
China
Prior art keywords
key
block chain
string
chain account
local block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910107557.8A
Other languages
Chinese (zh)
Other versions
CN109818751B (en
Inventor
荆博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201910107557.8A priority Critical patent/CN109818751B/en
Publication of CN109818751A publication Critical patent/CN109818751A/en
Application granted granted Critical
Publication of CN109818751B publication Critical patent/CN109818751B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the invention discloses a kind of key handlings and application method, device, equipment and storage medium.Wherein, cipher key processing method is applied to subscriber terminal equipment, this method comprises: determining the key of local block chain account using Encryption Algorithm;According to the feature of the feature of the Encryption Algorithm and the key, the key string of local block chain account is determined;According to the affairs password of local user, the key string of the local block chain account is handled, obtains key string ciphertext, the key string ciphertext is for being recorded in subscriber terminal equipment.The technical solution provided through the embodiment of the present invention converts key string ciphertext for the key of local block chain account and is recorded in subscriber terminal equipment, can avoid key plain and is stolen by other people, safety with higher and availability.In addition, user is without the key for remembering local block chain account.

Description

Key handling and application method, device, equipment and storage medium
Technical field
The present embodiments relate to block chain technical field more particularly to a kind of key handling and application method, device, set Standby and storage medium.
Background technique
The block chain local account of user can be preserved on terminal device, user can use oneself key in client It trades to sign and issue, uses the assets of oneself.
But there are the following problems for this process: 1) key for the asymmetric encryption techniques that block chain network generally uses be with What machine generated, and hundred are up to, user is difficult to remember;If 2) the key stored in clear of user is on the terminal device, exist by The risk stolen, assets are easily lost.Therefore it provides a kind of new key handling mode is very necessary.
Summary of the invention
The embodiment of the invention provides a kind of key handlings and application method, device, equipment and storage medium, avoid close Key is stolen by other people in plain text, safety with higher and availability.
In a first aspect, being applied to subscriber terminal equipment, this method the embodiment of the invention provides a kind of cipher key processing method Include:
Using Encryption Algorithm, the key of local block chain account is determined;
According to the feature of the feature of the Encryption Algorithm and the key, the key character of local block chain account is determined String;
According to the affairs password of local user, the key string of the local block chain account is handled, is obtained Key string ciphertext, the key string ciphertext is for being recorded in subscriber terminal equipment.
Second aspect, the embodiment of the invention provides a kind of key application methods, are applied to subscriber terminal equipment, this method Include:
Obtain the affairs password of local user's input;
Obtain the key string ciphertext of the local block chain account stored in the subscriber terminal equipment;
Using the affairs password, key string ciphertext is decrypted, obtains the key word of local block chain account Symbol string;
According to the key string of local block chain account, the key of Encryption Algorithm and local block chain account is reconstructed;
Using the Encryption Algorithm and key of reconstruct, sign to the block chain transactions requests of local block chain account.
The third aspect, the embodiment of the invention provides a kind of key handling devices, are configured at subscriber terminal equipment, the device Include:
Key determining module determines the key of local block chain account for utilizing Encryption Algorithm;
Key string determining module, for determining this according to the feature of the Encryption Algorithm and the feature of the key The key string of ground block chain account;
Ciphertext determining module, for the affairs password according to local user, to the key word of the local block chain account Symbol string is handled, and obtains key string ciphertext, the key string ciphertext is for being recorded in subscriber terminal equipment.
Fourth aspect, the embodiment of the invention provides a kind of key use devices, are configured at subscriber terminal equipment, the device Include:
Affairs password obtains module, for obtaining the affairs password of local user's input;
Ciphertext obtains module, for obtaining the key character of the local block chain account stored in the subscriber terminal equipment String ciphertext;
Ciphertext deciphering module is decrypted key string ciphertext, obtains this area for using the affairs password The key string of block chain account;
Algorithm secret key reconstructed module reconstructs Encryption Algorithm and this for the key string according to local block chain account The key of ground block chain account;
Signature blocks ask the block chain affairs of local block chain account for using the Encryption Algorithm and key of reconstruct It asks and signs.
5th aspect, the embodiment of the invention also provides a kind of equipment, which includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes any cipher key processing method in first aspect, or realizes any key user in second aspect Method.
6th aspect, the embodiment of the invention also provides a kind of storage mediums, are stored thereon with computer program, the program Any cipher key processing method in first aspect is realized when being executed by processor, or is realized any described in second aspect Key application method.
Key handling and application method provided in an embodiment of the present invention, device, equipment and storage medium are calculated using encryption After method determines the key of local block chain account, local block can be determined according to the feature of Encryption Algorithm and the feature of key The key string of chain account;Then carried out using the key string of the affairs key pair local block chain account of local user Processing, obtains key string ciphertext, and the key string ciphertext is recorded in subscriber terminal equipment.Compared to existing Technical solution, the key of the local block chain account in this programme are converted into key string ciphertext record by handling layer by layer In subscriber terminal equipment, it can avoid key plain and stolen by other people, safety with higher and availability.In addition, with Family is without the key for remembering local block chain account.
Detailed description of the invention
Fig. 1 is a kind of flow chart for cipher key processing method that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow chart of cipher key processing method provided by Embodiment 2 of the present invention;
Fig. 3 is a kind of flow chart for cipher key processing method that the embodiment of the present invention three provides;
Fig. 4 is a kind of flow chart for cipher key processing method that the embodiment of the present invention four provides;
Fig. 5 is a kind of flow chart for key application method that the embodiment of the present invention five provides;
Fig. 6 is a kind of flow chart for key application method that the embodiment of the present invention six provides;
Fig. 7 is a kind of flow chart for key application method that the embodiment of the present invention seven provides;
Fig. 8 is a kind of flow chart for key application method that the embodiment of the present invention eight provides;
Fig. 9 is a kind of structural block diagram for key handling device that the embodiment of the present invention nine provides;
Figure 10 is a kind of structural block diagram for key use device that the embodiment of the present invention ten provides;
Figure 11 is a kind of structural schematic diagram for equipment that the embodiment of the present invention 11 provides.
Specific embodiment
The embodiment of the present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this Locate described specific embodiment and is used only for explaining the embodiment of the present invention, rather than limitation of the invention.It further needs exist for Bright, only parts related to embodiments of the present invention are shown for ease of description, in attached drawing rather than entire infrastructure.
Embodiment one
Fig. 1 is a kind of flow chart for cipher key processing method that the embodiment of the present invention one provides, and the present embodiment is applicable to close Key disposition is particularly suitable for the key handling to block chain account, is stored in user to solve prior art key plain On terminal device, it is easy the problems such as being stolen.Wherein, subscriber terminal equipment for example can be mobile terminal, personal computer etc.. The scheme of the embodiment of the present invention can be executed by subscriber terminal equipment, may further be light by the block chain in subscriber terminal equipment Magnitude node or the application program interacted with lightweight node execute.Wherein, lightweight node, which refers to, is deployed with block chain Deployment data, such as intelligent contract, common recognition mechanism, but the block chain of not stored or storage section block data and Transaction Information Network node can participate in the transactions requests interactive process of block chain.Lightweight node can generally be deployed in subscriber terminal equipment In, such as can load in the operating system of subscriber terminal equipment, it is also used as an independent third party application peace It is attached in subscriber terminal equipment, can also be loaded into a certain application program of subscriber terminal equipment and (be handed over lightweight node Mutual application program) etc..
This method can be executed by key handling device provided in an embodiment of the present invention, the device can be used hardware and/ Or the mode of software is realized, and can be integrated in subscriber terminal equipment, in the block chain lightweight node in subscriber terminal equipment, Or the application program interacted with lightweight node is medium.Referring to Fig. 1, this method be can specifically include:
S110 determines the key of local block chain account using Encryption Algorithm.
In the present embodiment, Encryption Algorithm may include symmetry encryption algorithm and unsymmetrical tridiagonal matrix algorithm etc..Due to right Title formula Encryption Algorithm is suitable for encrypting big data quantity, and the data volume of block chain account is smaller, and therefore, the present embodiment is preferably adopted The key of local block chain account is determined with rivest, shamir, adelman.Wherein, unsymmetrical tridiagonal matrix algorithm may include rsa encryption Algorithm, elliptic curve encryption algorithm (Elliptic Curves Cryptography, ECC) etc..
Optionally, different Encryption Algorithm corresponds to different encryption rules, therefore according to its corresponding encryption rule to this Ground block chain account data is encrypted, using encrypted result as the key of local block chain account.Wherein, local block chain account User data can include but is not limited to local block chain account name and password etc..The key of local block chain account may include this The public key and private key of ground block chain account, wherein when private key is that user be related to the transaction of assets class, show identity it is important with Card.
S120 determines the key string of local block chain account according to the feature of the feature of Encryption Algorithm and key.
In the present embodiment, the feature of Encryption Algorithm refers to the feature for characterizing Encryption Algorithm essence, further, adds The feature of close algorithm can be embodied by the parameter of encryption function or analytical function associated by Encryption Algorithm and value etc..It is right It answers, the feature of key refers to the feature for characterizing key essence, can carry out multilayer Kazakhstan to key using hash algorithm Uncommon operation obtains;It is also possible to obtain the progress such as key and block chain address Hash operation.Optionally, the feature of key can be with It is indicated using string format, the length of the character string is smaller than the length etc. of key itself.
Key string can be determined according to the feature of Encryption Algorithm and the feature of key.Specifically, encryption can be calculated The feature of method and the Feature Conversion of key are identical presentation format such as string format, then will using the connection type of setting It is connected, and the key string of local block chain account can be obtained.Wherein, the connection type of setting can be Encryption Algorithm Feature is located at before or after the feature of key, can also be that the feature of Encryption Algorithm is added to the fixed bit in the feature of key It sets and locates the feature at such as intermediate position or key and be added to fixed position etc. in the feature of Encryption Algorithm.
Illustratively, if Encryption Algorithm is elliptic curve encryption algorithm, according to the spy of the feature of Encryption Algorithm and key Sign determines that the key string of local block chain account may include following:
A, the parameter of elliptic curve and the parameter of key used in ciphering process are extracted;
In the present embodiment, the parameter of elliptic curve may include the crucial ginseng in analytical expression corresponding to elliptic curve Number, the key parameter are used to determine the track of elliptic curve, are parameters necessary to determining the key of local block chain account;It is ellipse The parameter of circular curve can also include directly or indirectly influencing the other parameters etc. of key parameter.The parameter of key is to determine key Have the parameter of uniqueness, key etc. can be determined using the parameter of key.
Specifically, using elliptic curve encryption algorithm, it, can be respectively from institute after the key for determining local block chain account The parameter of elliptic curve and the parameter of key are extracted in the elliptic curve and key used, then according to the parameter of elliptic curve The key string of local block chain account, i.e. execution B are determined with the parameter of key.
B, character string is converted by the parameter of the parameter of elliptic curve and key, obtains the key word of local block chain account Symbol string.
Specifically, can be according to the transformation rule of setting, by the parameter for the elliptic curve being drawn into and the parameter of key point Character string is not converted to, is then connected using the connection type of setting, the key word of local block chain account can be obtained Symbol string.Wherein, the transformation rule of setting may include that the format of post-conversion characters string such as can be JSON (JavaScript Object Notation, JS object numbered musical notation) change the character string etc. expressed.
S130 handles the key string of local block chain account, obtains according to the affairs password of local user Key string ciphertext, key string ciphertext is for being recorded in subscriber terminal equipment.
In the present embodiment, affairs password refers to the preset payment cipher of user, and user can carry out according to the actual situation Setting.Optionally, affairs password is the natural semantic character string of user's input, and format can be multidigit such as 6 bit digitals or word Mother is also possible to number and the combination of letter etc..
Optionally, it is answered using what the key string of the affairs key pair local block chain account of local user was handled Miscellaneous degree or level determine the complexity that key string ciphertext is cracked, can be according to user's actual selection key string Ciphertext security level is handled.Specifically, can be the affairs password according to local user to the close of local block chain account Key character string is encrypted, and then obtains key string ciphertext, and key string ciphertext is recorded in subscriber terminal equipment In.In order to increase the complexity that key string ciphertext is cracked, can also be first to the affairs password of local user at Reason, is obtained a derivative key, is then encrypted using key string of the derivative key to local block chain account, in turn Obtain key string ciphertext etc..
In addition, it should be noted that, key of the user without remembering local block chain account, due to key string ciphertext It is recorded in subscriber terminal equipment, when user needs the key using local block chain account, subscriber terminal equipment be can be used The present embodiment provides the reversed of determining key string ciphertext and shifts process onto, determines that the key of local block chain account is simultaneously supplied to User further increases the experience of user.
Technical solution provided in an embodiment of the present invention, the key that local block chain account is determined using Encryption Algorithm it Afterwards, the key string of local block chain account can be determined according to the feature of Encryption Algorithm and the feature of key;Then using this The key string of the affairs key pair local block chain account of ground user is handled, and obtains key string ciphertext, and will The key string ciphertext is recorded in subscriber terminal equipment.Local block compared to existing technical solution, in this programme The key of chain account is converted into key string ciphertext and is recorded in subscriber terminal equipment, can avoid key by handling layer by layer It is stolen in plain text by other people, safety with higher and availability.In addition, user is without the local block chain account of memory Key.
Embodiment two
Fig. 2 is a kind of flow chart of cipher key processing method provided by Embodiment 2 of the present invention, and the present embodiment is in above-mentioned implementation On the basis of example, further to the affairs password according to local user, at the key string of local block chain account Reason, obtains key string ciphertext and is explained.Referring to fig. 2, this method specifically includes:
S210 determines the key of local block chain account using Encryption Algorithm.
S220 determines the key string of local block chain account according to the feature of the feature of Encryption Algorithm and key.
S230 carries out cipher key derivative derivation using affairs password of the encryption function to local user, obtains derivative key.
In the present embodiment, encryption function refers to pre-set fixed function, for keeping the affairs password of local user multiple Miscellaneous degree increases.Further, can be by increasing the length of the affairs password of local user, and then increase its complexity etc..It can Choosing, encryption function can be the encryption function of the length of any affairs password that can make local user in the prior art One or more of, the present embodiment does not limit this.Such as it can be DES (Data Encryption Standard, number According to encryption standard), in AES (Advanced Encryption Standard, Advanced Encryption Standard) and hash function etc. At least one.In addition, if two kinds of encryption functions can be such that the length of the affairs password of local user increases, preferred encryption intensity It is stronger.
Derivative key is to carry out cipher key derivative using affairs password of the encryption function to local user to be derived by, length It is determined, be can be fixed by encryption function;And its length is greater than the affairs Password Length of local user.For example, local user Affairs Password Length be 16 bytes (i.e. 128 bits), derivative key can with length can be for 32 bytes (i.e. 256 bits).
Specifically, the complexity that key string ciphertext is cracked in order to further increase, can be used fixed encryption letter The affairs password of several couples of local users carries out cipher key derivative derivation, and then obtains derivative key.
S240 handles according to key string of the derivative key to local block chain account, obtains key string Ciphertext.
Specifically, after the key string for executing the determining local block chain account of S220, it can be first with encryption letter The affairs password of several couples of local users carries out cipher key derivative derivation, obtains derivative key, then can use derivative key to this The key string of ground block chain account is handled as encrypted, and then obtains key string ciphertext.The present embodiment is equivalent to Two-stage is carried out to the key string of local block chain account to encrypt to obtain key string ciphertext, further increases key word The complexity that symbol string ciphertext is cracked.
It optionally, can also be first using derivative key to local block chain account after executing S230 and obtaining derivative key The key string at family is encrypted, then using other Encryption Algorithm again to encrypted result encryption etc.;Be also possible to it is other more Advanced encipherment scheme, subsequent embodiment will be described in detail, and no explanation is provided here.
Technical solution provided in an embodiment of the present invention, the key that local block chain account is determined using Encryption Algorithm it Afterwards, the key string of local block chain account can be determined according to the feature of Encryption Algorithm and the feature of key;It then utilizes and adds Close function carries out cipher key derivative derivation to the affairs password of local user, obtains derivative key, and using derivative key to local The key string of block chain account is handled, and obtains key string ciphertext, and the key string ciphertext is recorded in In subscriber terminal equipment.Compared to existing technical solution, the key of the local block chain account in this programme is by layer by layer Processing first determines the key string of local block chain account, then carries out to the key string of local block chain account Two-stage treatment is converted into key string ciphertext, further increases the complexity that key string ciphertext is cracked, and can avoid Key plain is stolen by other people, safety with higher and availability.In addition, user is without the local block chain account of memory The key at family.
Embodiment three
Fig. 3 is a kind of flow chart for cipher key processing method that the embodiment of the present invention three provides, and the present embodiment is in above-mentioned implementation On the basis of example, further to the affairs password according to local user, the key string of local block chain account is carried out Processing, obtains key string ciphertext and is explained.Referring to Fig. 3, this method is specifically included:
S310 determines the key of local block chain account using Encryption Algorithm.
S320 determines the key string of local block chain account according to the feature of the feature of Encryption Algorithm and key.
S330 carries out cipher key derivative derivation using affairs password of the encryption function to local user, obtains derivative key.
S340 determines additional character string according to the key string of derivative key and local block chain account.
In the present embodiment, additional character string is used to assist increasing the complexity of the key string of local block chain account, It can be determined according to the key string of derivative key and local block chain account.
Specifically, can be first by the byte long of the byte length of derivative key and the key string of local block chain account Degree is unified into equally, and the two is then carried out XOR operation, the number that statistic is 1 from exclusive or result, if numerical value is 1 Number is one digit number such as 3, then directly can be used as additional character string for 33;If the number that numerical value is 1 is at least two such as 48, Then may select from number it is big such as 8, then can be directly by 88 as additional character string etc..
It can also be and multilayer Hash operation is carried out according to the key string of derivative key and local block chain account, obtain The character string of regular length, using the character string of regular length as additional character string etc..
S350 increases additional character string in the fixed position of the key string of local block chain account, obtains new Key string.
In the present embodiment, fixed position can be preset fills in the key string of local block chain account The position of additional character string, such as can be the front and/tail portion of the key string of local block chain account, it can also be this Other positions in the key string of ground block chain account, such as fixed intermediate position.
Specifically, in the key string according to derivative key and local block chain account, after determining additional character string, Additional character string can be added to the fixed position such as tail portion of the key string of local block chain account, and then obtained new Key string.
S360 encrypts new key string using derivative key, obtains key string ciphertext.
Specifically, after the key string for executing the determining local block chain account of S320, it can be first with encryption letter The affairs password of several couples of local users carries out cipher key derivative derivation, obtains derivative key;S340 and S350 is then executed by deriving The key string of key and local block chain account, obtains new key string, and then using derivative key to new close Key character string is encrypted, and then obtains key string ciphertext.In the present embodiment, it is equivalent to the close of local block chain account Key character string carries out three-level and encrypts to obtain key string ciphertext, and further increase that key string ciphertext is cracked answers Miscellaneous degree.
Technical solution provided in an embodiment of the present invention, the key that local block chain account is determined using Encryption Algorithm it Afterwards, the key string of local block chain account can be determined according to the feature of Encryption Algorithm and the feature of key;It utilizes and adds later Close function carries out cipher key derivative derivation to the affairs password of local user, obtains derivative key, and according to derivative key and local The key string of block chain account obtains new key string, and then is carried out using derivative key to new key string Processing, obtains key string ciphertext, and the key string ciphertext is recorded in subscriber terminal equipment.Compared to existing Technical solution, the key of the local block chain account in this programme first determine local block chain account by handling layer by layer Key string, then carrying out tertiary treatment to the key string of local block chain account, to be converted into key string close Text further increases the complexity that key string ciphertext is cracked, can avoid key plain stolen by other people, have compared with High safety and availability.In addition, user is without the key for remembering local block chain account.
Example IV
Fig. 4 is a kind of flow chart for cipher key processing method that the embodiment of the present invention four provides, and the present embodiment is in above-mentioned implementation On the basis of example, further to the affairs password according to local user, the key string of local block chain account is carried out Processing, obtains key string ciphertext and is explained.Referring to fig. 4, this method specifically includes:
S410 determines the key of local block chain account using Encryption Algorithm.
S420 determines the key string of local block chain account according to the feature of the feature of Encryption Algorithm and key.
S430 carries out cipher key derivative derivation using affairs password of the encryption function to local user, obtains derivative key.
S440 takes the byte length of the key string of local block chain account to the byte length of derivative key Mould processing, obtains intermediate characteristic value.
Specifically, if the byte length of the key string of local block chain account is greater than the byte length of derivative key, Then by the byte length of the key string of local block chain account divided by the character length of derivative key, and remainder is used as Between characteristic value;Otherwise, by the character length of derivative key divided by the byte length of the key string of local block chain account, and Using remainder as intermediate characteristic value.In general, the byte length of key string is greater than the byte length of derivative key.
The byte length of the key string of local block chain account is subtracted the difference of intermediate characteristic value, as auxiliary by S450 Help characteristic value.
In the present embodiment, directly the byte length of the key string of local block chain account will can be subtracted intermediate features The difference of value, as supplemental characteristic value.For example, the byte length of the key string of local block chain account is 16, it is intermediate special Value indicative is 7, then supplemental characteristic value is 9.
It optionally, can also be by the biggish work of number in difference result when difference result is two or more several For auxiliary characteristic value etc..Such as the byte length of the key string of local block chain account is 32, the byte long of derivative key Degree is 31, intermediate characteristic value 1, then supplemental characteristic value is 31, therefore can be used as supplemental characteristic value for 31;3 can also be made To assist characteristic value.
Supplemental characteristic value value is the character for assisting characteristic value, as additional character string by S460.
Specifically, can be the character for assisting characteristic value by supplemental characteristic value value, as additional character string.For example, Supplemental characteristic is 6, then the character string that can be formed 66, as additional character string.
S470 increases additional character string in the fixed position of the key string of local block chain account, obtains new Key string.
S480 encrypts new key string using derivative key, obtains key string ciphertext.
Technical solution provided in an embodiment of the present invention provides a kind of according to the close of derivative key and local block chain account Key character string determines the mode of additional character string, and additional character string is added to the key string of local block chain account later Fixed position obtain new key string, and then new key string is handled using derivative key, is obtained Key string ciphertext, and the key string ciphertext is recorded in subscriber terminal equipment.Compared to existing technical solution, The key of local block chain account in this programme is being converted into key string ciphertext by processing layer by layer, increases key word The complexity that symbol string ciphertext is cracked, can avoid key plain and is stolen by other people, safety with higher and availability.This Outside, user is without the key for remembering local block chain account.
Embodiment five
Fig. 5 is a kind of flow chart for key application method that the embodiment of the present invention five provides, and the present embodiment is suitable for using The case where block chain account key.Wherein, key handling side provided by above-described embodiment can be used in the key of block chain account Method is handled.The scheme of the embodiment of the present invention can be executed by subscriber terminal equipment, may further be by subscriber terminal equipment In block chain lightweight node or the application program that is interacted with lightweight node execute.This method can be implemented by the present invention The key use device that example provides executes, which can be used hardware and/or the mode of software is realized, and can be integrated in user In terminal device, or in the application program that is interacted with lightweight node.Referring to Fig. 5, this method is specifically included:
S510 obtains the affairs password of local user's input.
In the present embodiment, affairs password refers to the preset payment cipher of user, and user can carry out according to the actual situation Setting.Optionally, affairs password is the natural semantic character string of user's input, and format can be multidigit such as 6 bit digitals or word Mother is also possible to number and the combination of letter etc..
Specifically, the assets in the case where detecting that local user's needs use local block chain account carry out operational event such as friendship Yi Shi, block chain lightweight node in subscriber terminal equipment or the application program interacted with lightweight node can show that affairs are close Code input interface to prompt user to input affairs password, and then obtains the affairs password of local user's input.
It illustratively, can also include: to obtain Client-initiated block before the affairs password for obtaining local user's input Chain transactions requests;If the operational event comprising local block chain account in block chain transactions requests, initiates alert notification, with User is notified to input affairs password.
In the present embodiment, block chain transactions requests refer to user need block chain to transactions requests such as transaction request etc. into The request initiated when row processing.Optionally, user can by with the block chain lightweight node in subscriber terminal equipment, or into Person and the application program interacted with lightweight node interact, and then initiate block chain transactions requests etc..Local block chain account The operational event at family may include being related to the assets class of local block chain account the operation such as trade, transfer accounts.Alert notification can be It is reminded in the form of text importing or short message etc., can also be reminded in the form of showing and inputting affairs key interface etc..
Specifically, obtaining Client-initiated block chain transactions requests, whether detect in the block chain transactions requests comprising this The operational event of ground block chain account to notify user to input affairs password, and then obtains this if so, initiating alert notification The affairs password of ground user input.If it is not, but the block chain transactions requests that obtain are that block chain in subscriber terminal equipment is light The direct block chain transactions requests then can be transmitted to block chain network by magnitude node;If the block chain transactions requests obtained Be the application program interacted with lightweight node, then the block chain transactions requests can be transmitted to by area by lightweight node Block chain network.
S520 obtains the key string ciphertext of the local block chain account stored in subscriber terminal equipment.
In the present embodiment, the key string of local block chain account is recordable in user's specific bit in subscriber terminal equipment Set place.
Specifically, obtain local user input affairs password after, can from subscriber terminal equipment local user Specified location obtains the key string ciphertext of local block chain account.
S530 is decrypted key string ciphertext using affairs password, obtains the key word of local block chain account Symbol string.
In the present embodiment, during key handling, the key string ciphertext of local block chain account can pass through local The affairs password of user is handled encryption such as to the key string of local block chain account and is obtained.Therefore, it is used in key In the process, affairs password can be used key string ciphertext is decrypted, and then obtains the key word of local block chain account Symbol string.That is affairs password is used, the process that key string ciphertext is decrypted is, local using affairs key pair The inverse process that the key string of block chain account is encrypted.
S540, according to the key string of local block chain account, reconstruct Encryption Algorithm is close with local block chain account Key.
In the present embodiment, Encryption Algorithm refers to algorithm used in the key for determining local block chain account.
Specifically, the key string of local block chain account is the spy according to Encryption Algorithm during key handling Seek peace key feature determine.Therefore, in key use process, the key string for obtaining local block chain account it Afterwards, the feature of Encryption Algorithm and the feature of key can be read from the key string of local block chain account;It then, can be according to adding The feature reconstruction Encryption Algorithm of close algorithm, according to reconstruct Encryption Algorithm and key feature reconstruction local block chain account it is close Key.For example, the feature of Encryption Algorithm is the parameter and value etc. of encryption function associated by Encryption Algorithm, therefore can be according to adding Parameter and value of close function etc. determine analytical expression corresponding to encryption function, and then determine Encryption Algorithm;It is reconstructing After Encryption Algorithm, anti-Encryption Algorithm, i.e., the key of restructural this area block chain account can be solved according to the parameter of key.
S550 signs the block chain transactions requests of local block chain account using the Encryption Algorithm and key of reconstruct Name.
Specifically, reconstruct can be used after the key for executing S540 reconstruct Encryption Algorithm and local block chain account Encryption Algorithm and the block chain transactions requests of key pair local block chain account sign, key pair sheet can also be only used The block chain transactions requests of ground block chain account are signed etc., to show local user's identity.
Technical solution provided in an embodiment of the present invention is determining that user needs the area using key pair local block chain account When block chain transactions requests are signed, stored in the affairs password and subscriber terminal equipment of available local user's input The key string ciphertext of local block chain account;And key string ciphertext is decrypted using affairs password, obtain this The key string of ground block chain account then can reconstruct Encryption Algorithm and key according to key string, and then use The Encryption Algorithm and key of reconstruct can the block chain transactions requests to local block chain account sign.This programme user without The key of local block chain account need to be remembered, need to only input affairs password can be completed block chain thing to local block chain account The signature of business request, increases the experience of user.In addition, key string ciphertext is recorded in subscriber terminal equipment, can keep away Exempt from key plain to be stolen by other people, safety with higher and availability.
Embodiment six
Fig. 6 is a kind of flow chart for key application method that the embodiment of the present invention six provides, and the present embodiment is in above-mentioned implementation On the basis of example, further to affairs password is used, key string ciphertext is decrypted, local block chain account is obtained Key string is explained.Referring to Fig. 6, this method is specifically included:
S610 obtains the affairs password of local user's input.
S620 obtains the key string ciphertext of the local block chain account stored in subscriber terminal equipment.
S630 carries out cipher key derivative derivation to the affairs password that local user inputs using encryption function, obtains deriving close Key.
In the present embodiment, encryption function refers to pre-set fixed function, for keeping the affairs password of local user multiple Miscellaneous degree increases.Further, can be by increasing the length of the affairs password of local user, and then increase its complexity etc..It can Choosing, encryption function can be the encryption function of the length of any affairs password that can make local user in the prior art One or more of, the present embodiment does not limit this.Such as it can be DES (Data Encryption Standard, number According to encryption standard), in AES (Advanced Encryption Standard, Advanced Encryption Standard) and hash function etc. At least one.In addition, if two kinds of encryption functions can be such that the length of the affairs password of local user increases, preferred encryption intensity It is stronger.
Derivative key is to carry out cipher key derivative using affairs password of the encryption function to local user to be derived by, length It is determined, be can be fixed by encryption function;And its length is greater than the affairs Password Length of local user.For example, local user Affairs Password Length be 16 bytes (i.e. 128 bits), derivative key can with length can be for 32 bytes (i.e. 256 bits). Cipher key derivative derivation is carried out to the affairs password of local user specifically, fixed encryption function can be used, and then is derived Key.
S640 is decrypted key string ciphertext according to derivative key, obtains the close of local block chain account Key character string.
In the present embodiment, during key handling, the key string ciphertext of local block chain account can pass through derivative Key is handled encryption such as to the key string of local block chain account and is obtained.It therefore, can in key use process Key string ciphertext is decrypted using derivative key, and then obtains the key string of local block chain account. That is it is using the process that key string ciphertext is decrypted in derivative key, using derivative key to local block chain The inverse process that the key string of account is encrypted.
S650, according to the key string of local block chain account, reconstruct Encryption Algorithm is close with local block chain account Key.
S660 signs the block chain transactions requests of local block chain account using the Encryption Algorithm and key of reconstruct Name.
Technical solution provided in an embodiment of the present invention is determining that user needs the area using key pair local block chain account When block chain transactions requests are signed, stored in the affairs password and subscriber terminal equipment of available local user's input The key string ciphertext of local block chain account;And key is carried out using using affairs password of the encryption function to local user It is derivative to derive, derivative key is obtained, key string ciphertext is decrypted according to derivative key, local block chain can be obtained The key string of account;Then Encryption Algorithm and key, and then adding using reconstruct can be reconstructed according to key string Close algorithm and key can the block chain transactions requests to local block chain account sign.This programme user is without remembering this The key of ground block chain account, only need to input affairs password can be completed to the block chain transactions requests of local block chain account Signature, increases the experience of user.In addition, carrying out processing layer by layer to the key string of local block chain account is converted to key Character string ciphertext is recorded in subscriber terminal equipment, further increases the complexity that key string ciphertext is cracked, and can be kept away Exempt from key plain to be stolen by other people, safety with higher and availability.
Embodiment seven
Fig. 7 is a kind of flow chart for key application method that the embodiment of the present invention seven provides, and the present embodiment is in above-mentioned implementation On the basis of example, further to affairs password is used, key string ciphertext is decrypted, local block chain account is obtained Key string be explained.Referring to Fig. 7, this method is specifically included:
S710 obtains the affairs password of local user's input.
S720 obtains the key string ciphertext of the local block chain account stored in subscriber terminal equipment.
S730 carries out cipher key derivative derivation to the affairs password that local user inputs using encryption function, obtains deriving close Key.
S740 is decrypted key string ciphertext according to derivative key, obtains new key string.
In the present embodiment, during key handling, since key string ciphertext is according to derivative key to new close Key character string is encrypted to obtain, and new key string is in the fixation position of the key string of local block chain account Place increases what additional character string obtained.Therefore, in key use process, the key character of local block chain account in order to obtain String, the inverse process that can execute aforesaid operations process can be obtained.Specifically, can be close to key string according to derivative key Text is decrypted, and obtains new key string, then, rejects additional character from the fixed position of new key string String, the key string that local block chain account can be obtained execute S750.
S750 rejects additional character string from new key string, obtains the key string of local block chain account.
Illustratively, it may include: to read new key string that additional character string is rejected from new key string In supplemental characteristic character value;Reject the supplemental characteristic character value character for being located at new key string fixed position.
In the present embodiment, during key handling, new key string is the key word in local block chain account The fixed position of symbol string increases what additional character string obtained.Therefore, in key use process, from new key string Fixed position rejects additional character string, and the key string of local block chain account can be obtained.Wherein, fixed position with The position that additional character string is filled in the key string of local block chain account is corresponding, such as can be new key character The front of string and/tail portion, can also be the other positions in new key string, such as intermediate position.
Supplemental characteristic character value refers to the character value of fixed position in new key string, such as tail portion or head character Value etc..
For example, the tail portion character value in new key string can be read, then rejects and be located at new key string The tail portion character value character of tail portion, can be obtained the key string of local block chain account.If tail portion character value is 6, then 66 of new key string tail portion can be rejected, the key string of local block chain account can be obtained.
S760, according to the key string of local block chain account, reconstruct Encryption Algorithm is close with local block chain account Key.
S770 signs the block chain transactions requests of local block chain account using the Encryption Algorithm and key of reconstruct Name.
Technical solution provided in an embodiment of the present invention is determining that user needs the area using key pair local block chain account When block chain transactions requests are signed, stored in the affairs password and subscriber terminal equipment of available local user's input The key string ciphertext of local block chain account;And key is carried out using using affairs password of the encryption function to local user Derivative is derived by derivative key, and key string ciphertext is decrypted according to derivative key to obtain new key string, And then additional character string is rejected from new key string, the key string of local block chain account can be obtained;Then Encryption Algorithm and key can be reconstructed according to key string, and then can be to local using the Encryption Algorithm and key of reconstruct The block chain transactions requests of block chain account are signed.Key of this programme user without remembering local block chain account, only Affairs password, which need to be inputted, can be completed signature to the block chain transactions requests of local block chain account, increase the body of user It tests.Use is recorded in addition, carrying out processing layer by layer to the key string of local block chain account and being converted to key string ciphertext In the terminal device of family, the complexity that key string ciphertext is cracked is further increased, can avoid key plain by other people It steals, safety with higher and availability.
Embodiment eight
Fig. 8 is a kind of flow chart for key application method that the embodiment of the present invention eight provides, and the present embodiment is in above-mentioned implementation On the basis of example, in the case where Encryption Algorithm is elliptic curve encryption algorithm, further to according to local block chain account The key of key string, reconstruct Encryption Algorithm and local block chain account is explained.Referring to Fig. 8, this method is specific Include:
S810 obtains the affairs password of local user's input.
S820 obtains the key string ciphertext of the local block chain account stored in subscriber terminal equipment.
S830 is decrypted key string ciphertext using affairs password, obtains the key word of local block chain account Symbol string.
S840 determines the ginseng of elliptic curve used in ciphering process according to the key string of local block chain account Several and key parameter.
In the case where Encryption Algorithm is elliptic curve encryption algorithm, during key handling, local block chain account Key string be that the character string converted according to the parameter of elliptic curve and the parameter of key obtains.Therefore, in key In use process, after the key string for obtaining local block chain account, the process opposite with Cipher Processing can be used, i.e., The key of elliptic curve used in restructural ciphering process and local block chain account.Specifically, can be first from local block The parameter of elliptic curve and the parameter of key are read in the key string of chain account, then reconstruct encryption according to the parameter read The key of elliptic curve used in process and local block chain account.
S850 reconstructs elliptic curve used in ciphering process according to the parameter of elliptic curve.
Specifically, determining elliptic curve used in ciphering process in the key string according to local block chain account Parameter and key parameter after, can parameter according to elliptic curve etc. determine analytical expression corresponding to elliptic curve, And then obtain elliptic curve used in ciphering process.
S860 reconstructs the key of local block chain account according to the parameter of the elliptic curve of reconstruct and key.
Specifically, as the key of account in local block be based on determined by elliptic curve encryption algorithm, It, can be according to the elliptic curve of reconstruct and close after reconstructing elliptic curve used in ciphering process according to the parameter of elliptic curve The key of local block chain account can be obtained in the parameter of key.For example, can using the parameter of key as the value of elliptic curve, Or the value of some in elliptic curve or multiple parameters, elliptic curve is then instead solved, local block chain account can be obtained Key.
S870 signs the block chain transactions requests of local block chain account using the elliptic curve and key of reconstruct Name.
Technical solution provided in an embodiment of the present invention, provide it is a kind of in Encryption Algorithm be elliptic curve encryption algorithm feelings Under condition, how according to key string the thinking of Encryption Algorithm and key is reconstructed, and then use the Encryption Algorithm of reconstruct and close Key can the block chain transactions requests to local block chain account sign.This programme user is without remembering local block chain account The key at family, need to only input affairs password can be completed signature to the block chain transactions requests of local block chain account, increase The experience of user.In addition, key string ciphertext is recorded in subscriber terminal equipment, key plain can avoid by other people It steals, safety with higher and availability.
Embodiment nine
Fig. 9 is a kind of structural block diagram for key handling device that the embodiment of the present invention nine provides, which is configured in use In the terminal device of family.Cipher key processing method provided by the embodiment of the present invention one to four can be performed in the device, has execution method Corresponding functional module and beneficial effect.As shown in figure 9, the apparatus may include:
Key determining module 910 determines the key of local block chain account for utilizing Encryption Algorithm;
Key string determining module 920, for determining local block according to the feature of Encryption Algorithm and the feature of key The key string of chain account;
Ciphertext determining module 930, for the affairs password according to local user, to the key character of local block chain account String is handled, and obtains key string ciphertext, key string ciphertext is for being recorded in subscriber terminal equipment.
Technical solution provided in an embodiment of the present invention, the key that local block chain account is determined using Encryption Algorithm it Afterwards, the key string of local block chain account can be determined according to the feature of Encryption Algorithm and the feature of key;Then using this The key string of the affairs key pair local block chain account of ground user is handled, and obtains key string ciphertext, and will The key string ciphertext is recorded in subscriber terminal equipment.Local block compared to existing technical solution, in this programme The key of chain account is converted into key string ciphertext and is recorded in subscriber terminal equipment, can avoid key by handling layer by layer It is stolen in plain text by other people, safety with higher and availability.In addition, user is without the local block chain account of memory Key.
Illustratively, if Encryption Algorithm is elliptic curve encryption algorithm, key string determining module 920 specifically can be with For:
Extract the parameter of elliptic curve and the parameter of key used in ciphering process;
Character string is converted by the parameter of the parameter of elliptic curve and key, obtains the key character of local block chain account String.
Illustratively, ciphertext determining module 930 may include:
First derivative key determination unit, for carrying out cipher key derivative using affairs password of the encryption function to local user It derives, obtains derivative key;
Ciphertext determination unit is obtained for being handled according to key string of the derivative key to local block chain account To key string ciphertext.
Illustratively, ciphertext determination unit may include:
Additional character string determines subelement, for the key string according to derivative key and local block chain account, really Determine additional character string;
New key character string determines subelement, and the fixed position for the key string in local block chain account increases Add additional character string, obtains new key string;
Encryption sub-unit operable, for being encrypted using derivative key to new key string.
Illustratively, additional character string determines that subelement specifically can be used for:
Byte length of the byte length of the key string of local block chain account to derivative key is carried out at modulus Reason, obtains intermediate characteristic value;
The difference that the byte length of the key string of local block chain account is subtracted to intermediate characteristic value, as supplemental characteristic Value;
It is the character for assisting characteristic value by supplemental characteristic value value, as additional character string.
Illustratively, affairs password is the natural semantic character string of user's input, which is configured in user terminal and sets In standby, the block chain lightweight node being further configured in subscriber terminal equipment or the application journey interacted with lightweight node In sequence.
Embodiment ten
Figure 10 is a kind of structural block diagram for key use device that the embodiment of the present invention ten provides, which is configured in use In the terminal device of family.Key application method provided by the embodiment of the present invention five to eight can be performed in the device, has execution method Corresponding functional module and beneficial effect.As shown in Figure 10, the apparatus may include:
Affairs password obtains module 1010, for obtaining the affairs password of local user's input;
Ciphertext obtains module 1020, for obtaining the key character of the local block chain account stored in subscriber terminal equipment String ciphertext;
Ciphertext deciphering module 1030 is decrypted key string ciphertext, obtains this area for using affairs password The key string of block chain account;
Algorithm secret key reconstructed module 1040 reconstructs Encryption Algorithm for the key string according to local block chain account With the key of local block chain account;
Signature blocks 1050, for using the Encryption Algorithm and key of reconstruct, to the block chain thing of local block chain account Business request is signed.
Technical solution provided in an embodiment of the present invention is determining that user needs the area using key pair local block chain account When block chain transactions requests are signed, stored in the affairs password and subscriber terminal equipment of available local user's input The key string ciphertext of local block chain account;And key string ciphertext is decrypted using affairs password, obtain this The key string of ground block chain account then can reconstruct Encryption Algorithm and key according to key string, and then use The Encryption Algorithm and key of reconstruct can the block chain transactions requests to local block chain account sign.This programme user without The key of local block chain account need to be remembered, need to only input affairs password can be completed block chain thing to local block chain account The signature of business request, increases the experience of user.In addition, key string ciphertext is recorded in subscriber terminal equipment, can keep away Exempt from key plain to be stolen by other people, safety with higher and availability.
Illustratively, ciphertext deciphering module 1030 may include:
Second derivative key determination unit, for carrying out key to the affairs password that local user inputs using encryption function It is derivative to derive, obtain derivative key;
Ciphertext decryption unit obtains this area for key string ciphertext to be decrypted according to derivative key The key string of block chain account.
It should be noted that for same subscriber terminal equipment, the first derivative key determination unit and the second derivative key Determination unit is identical.
Illustratively, ciphertext decryption unit may include:
Ciphertext decrypts subelement and obtains new key for key string ciphertext to be decrypted according to derivative key Character string;
Character string rejects subelement, for rejecting additional character string from new key string, obtains local block chain The key string of account.
Illustratively, character string is rejected subelement and specifically be can be used for:
Read the supplemental characteristic character value in new key string;
Reject the supplemental characteristic character value character for being located at new key string fixed position.
Illustratively, if Encryption Algorithm is elliptic curve encryption algorithm, algorithm secret key reconstructed module 1040 specifically can be with For:
According to the key string of local block chain account, the parameter of elliptic curve used in ciphering process and close is determined The parameter of key;
According to the parameter of elliptic curve, elliptic curve used in ciphering process is reconstructed;
According to the parameter of the elliptic curve of reconstruct and key, the key of local block chain account is reconstructed.
Illustratively, above-mentioned apparatus can also include:
Transactions requests obtain module, for obtaining Client-initiated before the affairs password for obtaining local user's input Block chain transactions requests;
Alert notification initiation module, if for the operation thing comprising local block chain account in block chain transactions requests Preferably, then alert notification is initiated, to notify user to input affairs password.
Illustratively, affairs password is the natural semantic character string of user's input, which is configured in user terminal and sets In standby, the block chain lightweight node being further configured in subscriber terminal equipment or the application journey interacted with lightweight node In sequence.
Embodiment 11
Figure 11 is a kind of structural schematic diagram for equipment that the embodiment of the present invention 11 provides, and Figure 11, which is shown, to be suitable for being used in fact The block diagram of the example devices of existing embodiment of the embodiment of the present invention.The equipment that Figure 11 is shown is only an example, should not be right The function and use scope of the embodiment of the present invention bring any restrictions.Equipment can be subscriber terminal equipment, and typical case, which can be, to be added Carry the subscriber terminal equipment of block chain lightweight node, or the user configured with the application program that can be interacted with lightweight node Terminal device.
As shown in figure 11, equipment 12 is showed in the form of universal computing device.The component of equipment 12 may include but unlimited In one or more processor or processing unit 16, system storage 28, connecting different system components, (including system is deposited Reservoir 28 and processing unit 16) bus 18.
Bus 18 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC) Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Equipment 12 typically comprises a variety of computer system readable media.These media can be it is any can be by equipment 12 The usable medium of access, including volatile and non-volatile media, moveable and immovable medium.
System storage 28 may include the computer system readable media of form of volatile memory, such as arbitrary access Memory (RAM) 30 and/or cache memory 32.Equipment 12 may further include it is other it is removable/nonremovable, Volatile/non-volatile computer system storage medium.Only as an example, storage system 34 can be used for reading and writing irremovable , non-volatile magnetic media (Figure 11 do not show, commonly referred to as " hard disk drive ").Although being not shown in Figure 11, can provide Disc driver for being read and write to removable non-volatile magnetic disk (such as " floppy disk "), and to removable anonvolatile optical disk The CD drive of (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driver can To be connected by one or more data media interfaces with bus 18.System storage 28 may include that at least one program produces Product, the program product have one group of (for example, at least one) program module, these program modules are configured to perform of the invention real Apply the function of each embodiment of example.
Program/utility 40 with one group of (at least one) program module 42 can store and store in such as system In device 28, such program module 42 includes but is not limited to operating system, one or more application program, other program modules And program data, it may include the realization of network environment in each of these examples or certain combination.Program module 42 Usually execute the function and/or method in described embodiment of the embodiment of the present invention.
Equipment 12 can also be communicated with one or more external equipments 14 (such as keyboard, sensing equipment, display 24 etc.), Can also be enabled a user to one or more equipment interacted with the equipment 12 communication, and/or with enable the equipment 12 with One or more of the other any equipment (such as network interface card, modem etc.) communication for calculating equipment and being communicated.It is this logical Letter can be carried out by input/output (I/O) interface 22.Also, equipment 12 can also by network adapter 20 and one or The multiple networks of person (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) communication.As shown, Network adapter 20 is communicated by bus 18 with other modules of equipment 12.It should be understood that although not shown in the drawings, can combine Equipment 12 use other hardware and/or software module, including but not limited to: microcode, device driver, redundant processing unit, External disk drive array, RAID system, tape drive and data backup storage system etc..
Processing unit 16 by the program that is stored in system storage 28 of operation, thereby executing various function application and Data processing, such as realize key handling and/or key application method provided by the embodiment of the present invention.
Embodiment 12
The embodiment of the present invention 12 also provides a kind of computer readable storage medium, be stored thereon with computer program (or Referred to as computer executable instructions), for executing a kind of cipher key processing method, this method packet when which is executed by processor It includes:
Using Encryption Algorithm, the key of local block chain account is determined;
According to the feature of the feature of Encryption Algorithm and the key, the key string of local block chain account is determined;
According to the affairs password of local user, the key string of local block chain account is handled, key is obtained Character string ciphertext, key string ciphertext is for being recorded in subscriber terminal equipment.
And/or a kind of key application method, this method comprises:
Obtain the affairs password of local user's input;
Obtain the key string ciphertext of the local block chain account stored in subscriber terminal equipment;
Using affairs password, key string ciphertext is decrypted, obtains the key string of local block chain account;
According to the key string of local block chain account, the key of Encryption Algorithm and local block chain account is reconstructed;
Using the Encryption Algorithm and key of reconstruct, sign to the block chain transactions requests of local block chain account.
The computer storage medium of the embodiment of the present invention, can be using any of one or more computer-readable media Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or Device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: tool There are electrical connection, the portable computer diskette, hard disk, random access memory (RAM), read-only memory of one or more conducting wires (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD- ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage Medium can be any tangible medium for including or store program, which can be commanded execution system, device or device Using or it is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with one or more programming languages or combinations thereof come write for execute the embodiment of the present invention operation Computer program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, further include conventional procedural programming language-such as " C " language or similar program design language Speech.Program code can be executed fully on the user computer, partly be executed on the user computer, as an independence Software package execute, part on the user computer part execute on the remote computer or completely in remote computer or It is executed on server.In situations involving remote computers, remote computer can pass through the network of any kind --- packet It includes local area network (LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as benefit It is connected with ISP by internet).
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being implemented by above embodiments to the present invention Example is described in further detail, but the embodiment of the present invention is not limited only to above embodiments, is not departing from structure of the present invention It can also include more other equivalent embodiments in the case where think of, and the scope of the present invention is determined by scope of the appended claims It is fixed.

Claims (17)

1. a kind of cipher key processing method, which is characterized in that be applied to subscriber terminal equipment, which comprises
Using Encryption Algorithm, the key of local block chain account is determined;
According to the feature of the feature of the Encryption Algorithm and the key, the key string of local block chain account is determined;
According to the affairs password of local user, the key string of the local block chain account is handled, key is obtained Character string ciphertext, the key string ciphertext is for being recorded in subscriber terminal equipment.
2. the method according to claim 1, wherein if the Encryption Algorithm is elliptic curve encryption algorithm, According to the feature of the feature of the Encryption Algorithm and the key, the key string of local block chain account is determined, comprising:
Extract the parameter of elliptic curve and the parameter of the key used in ciphering process;
Character string is converted by the parameter of the parameter of the elliptic curve and the key, obtains the key of local block chain account Character string.
3. the method according to claim 1, wherein according to the affairs password of local user, to described this area The key string of block chain account is handled, and key string ciphertext is obtained, comprising:
Cipher key derivative derivation is carried out using affairs password of the encryption function to local user, obtains derivative key;
It is handled according to key string of the derivative key to the local block chain account, obtains key string ciphertext.
4. according to the method described in claim 3, it is characterized in that, according to derivative key to the close of the local block chain account Key character string is handled, comprising:
According to the key string of derivative key and the local block chain account, additional character string is determined;
Increase the additional character string in the fixed position of the key string of the local block chain account, obtains new close Key character string;
New key string is encrypted using the derivative key.
5. according to the method described in claim 4, it is characterized in that, according to the close of derivative key and the local block chain account Key character string determines additional character string, comprising:
The byte length of the key string of the local block chain account takes the byte length of the derivative key Mould processing, obtains intermediate characteristic value;
The difference that the byte length of the key string of the local block chain account is subtracted to the intermediate characteristic value, as auxiliary Characteristic value;
It is the character for assisting characteristic value by supplemental characteristic value value, as additional character string.
6. the method according to claim 1, wherein the affairs password is the natural semantic character of user's input The executing subject of string, the method is answered for the block chain lightweight node in subscriber terminal equipment or with what lightweight node interacted Use program.
7. a kind of key application method, which is characterized in that be applied to subscriber terminal equipment, which comprises
Obtain the affairs password of local user's input;
Obtain the key string ciphertext of the local block chain account stored in the subscriber terminal equipment;
Using the affairs password, key string ciphertext is decrypted, obtains the key string of local block chain account;
According to the key string of local block chain account, the key of Encryption Algorithm and local block chain account is reconstructed;
Using the Encryption Algorithm and key of reconstruct, sign to the block chain transactions requests of local block chain account.
8. the method according to the description of claim 7 is characterized in that using the affairs password, to key string ciphertext into Row decryption, obtains the key string of local block chain account, comprising:
Cipher key derivative derivation is carried out to the affairs password that local user inputs using encryption function, obtains derivative key;
The key string ciphertext is decrypted according to the derivative key, obtains the key of local block chain account Character string.
9. according to the method described in claim 8, it is characterized in that, according to the derivative key to the key string ciphertext It is decrypted, obtains the key string of local block chain account, comprising:
The key string ciphertext is decrypted according to the derivative key, obtains new key string;
Additional character string is rejected from new key string, obtains the key string of local block chain account.
10. according to the method described in claim 9, it is characterized in that, from new key string reject additional character string, packet It includes:
Read the supplemental characteristic character value in new key string;
Reject the supplemental characteristic character value character for being located at new key string fixed position.
11. the method according to the description of claim 7 is characterized in that if the Encryption Algorithm is elliptic curve encryption algorithm, root According to the key string of local block chain account, the key of Encryption Algorithm and local block chain account is reconstructed, comprising:
According to the key string of local block chain account, the parameter of elliptic curve used in ciphering process and described close is determined The parameter of key;
According to the parameter of the elliptic curve, elliptic curve used in ciphering process is reconstructed;
According to the parameter of the elliptic curve of reconstruct and the key, the key of local block chain account is reconstructed.
12. the method according to the description of claim 7 is characterized in that also being wrapped before obtaining the affairs password that local user inputs It includes:
Obtain Client-initiated block chain transactions requests;
If the operational event comprising local block chain account in the block chain transactions requests, initiates alert notification, with logical Know that user inputs affairs password.
13. the method according to the description of claim 7 is characterized in that the affairs password is the natural semantic word of user's input Symbol string, the executing subject of the method are block chain lightweight node in subscriber terminal equipment or interact with lightweight node Application program.
14. a kind of key handling device, which is characterized in that be configured in subscriber terminal equipment, described device includes:
Key determining module determines the key of local block chain account for utilizing Encryption Algorithm;
Key string determining module, for determining this area according to the feature of the Encryption Algorithm and the feature of the key The key string of block chain account;
Ciphertext determining module, for the affairs password according to local user, to the key string of the local block chain account It is handled, obtains key string ciphertext, the key string ciphertext is for being recorded in subscriber terminal equipment.
15. a kind of key use device, which is characterized in that be configured in subscriber terminal equipment, described device includes:
Affairs password obtains module, for obtaining the affairs password of local user's input;
Ciphertext obtains module, and the key string for obtaining the local block chain account stored in the subscriber terminal equipment is close Text;
Ciphertext deciphering module is decrypted key string ciphertext, obtains local block chain for using the affairs password The key string of account;
Algorithm secret key reconstructed module reconstructs Encryption Algorithm and this area for the key string according to local block chain account The key of block chain account;
Signature blocks, for using the Encryption Algorithm and key of reconstruct, to the block chain transactions requests of local block chain account into Row signature.
16. a kind of equipment characterized by comprising
One or more processors;
Memory, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real Now such as cipher key processing method of any of claims 1-6, or realize as described in any one of claim 7-13 Key application method.
17. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor It is realized when execution such as cipher key processing method of any of claims 1-6, or realization such as in claim 7-13 Key application method described in one.
CN201910107557.8A 2019-02-02 2019-02-02 Key processing and using method, device, equipment and storage medium Active CN109818751B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910107557.8A CN109818751B (en) 2019-02-02 2019-02-02 Key processing and using method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910107557.8A CN109818751B (en) 2019-02-02 2019-02-02 Key processing and using method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109818751A true CN109818751A (en) 2019-05-28
CN109818751B CN109818751B (en) 2021-12-07

Family

ID=66605229

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910107557.8A Active CN109818751B (en) 2019-02-02 2019-02-02 Key processing and using method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109818751B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990872A (en) * 2019-12-03 2020-04-10 成都链鱼科技有限公司 Private key export two-dimensional code storage and scanning recovery method based on block chain
CN111031475A (en) * 2019-12-19 2020-04-17 达闼科技成都有限公司 Method for collecting terminal position information, terminal, position collecting terminal and storage medium
CN109818751B (en) * 2019-02-02 2021-12-07 百度在线网络技术(北京)有限公司 Key processing and using method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108702287A (en) * 2018-04-16 2018-10-23 深圳前海达闼云端智能科技有限公司 Information publication based on block chain and acquisition methods, device and block chain node
CN108833093A (en) * 2018-06-14 2018-11-16 百度在线网络技术(北京)有限公司 Determination method, apparatus, equipment and the storage medium of account key
US20180351750A1 (en) * 2016-06-16 2018-12-06 The Bank Of New York Mellon Distributed, centrally authored block chain network
CN108964903A (en) * 2018-07-12 2018-12-07 腾讯科技(深圳)有限公司 password storage method and device
CN109120639A (en) * 2018-09-26 2019-01-01 众安信息技术服务有限公司 A kind of data cloud storage encryption method and system based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109818751B (en) * 2019-02-02 2021-12-07 百度在线网络技术(北京)有限公司 Key processing and using method, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180351750A1 (en) * 2016-06-16 2018-12-06 The Bank Of New York Mellon Distributed, centrally authored block chain network
CN108702287A (en) * 2018-04-16 2018-10-23 深圳前海达闼云端智能科技有限公司 Information publication based on block chain and acquisition methods, device and block chain node
CN108833093A (en) * 2018-06-14 2018-11-16 百度在线网络技术(北京)有限公司 Determination method, apparatus, equipment and the storage medium of account key
CN108964903A (en) * 2018-07-12 2018-12-07 腾讯科技(深圳)有限公司 password storage method and device
CN109120639A (en) * 2018-09-26 2019-01-01 众安信息技术服务有限公司 A kind of data cloud storage encryption method and system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘艳: "《一种用于终端小型设备的轻量级》", 《软件学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109818751B (en) * 2019-02-02 2021-12-07 百度在线网络技术(北京)有限公司 Key processing and using method, device, equipment and storage medium
CN110990872A (en) * 2019-12-03 2020-04-10 成都链鱼科技有限公司 Private key export two-dimensional code storage and scanning recovery method based on block chain
CN110990872B (en) * 2019-12-03 2022-03-25 成都链鱼科技有限公司 Private key export two-dimensional code storage and scanning recovery method based on block chain
CN111031475A (en) * 2019-12-19 2020-04-17 达闼科技成都有限公司 Method for collecting terminal position information, terminal, position collecting terminal and storage medium

Also Published As

Publication number Publication date
CN109818751B (en) 2021-12-07

Similar Documents

Publication Publication Date Title
TWI686073B (en) Key data processing method, device and server
US11196540B2 (en) End-to-end secure operations from a natural language expression
US10009179B2 (en) Trusted platform module (TPM) protected device
CN107733656A (en) A kind of cipher authentication method and device
US20170366348A1 (en) Blockchain systems and methods for user authentication
CN109951295B (en) Key processing and using method, device, equipment and medium
JP2022536645A (en) Key Recovery Using Encrypted Secret Share
CN107612683B (en) Encryption and decryption method, device, system, equipment and storage medium
CN109818751A (en) Key handling and application method, device, equipment and storage medium
US20180254904A1 (en) Integrated authentication system for authentication using single-use random numbers
JP2019527950A (en) Communication device, point-of-sale terminal, payment device, and method
CN109981297A (en) Block chain processing method, device, equipment and storage medium
CN110084599B (en) Key processing method, device, equipment and storage medium
CN103353973B (en) Banking transaction authentication method and system based on audio authentication
CN112287379B (en) Service data using method, device, equipment, storage medium and program product
CN109613990A (en) Soft keyboard secured inputting method, server, client, electronic equipment and medium
TW201315195A (en) Method and computer system for providing time ratio-based password/challenge authentication
CN113537633A (en) Prediction method, device, equipment, medium and system based on longitudinal federal learning
US11899803B2 (en) System for implementing enhanced file encryption technique
JP2013529804A (en) Method and system for data encryption, decryption and segmentation of a secure order management system
CN111062045A (en) Information encryption and decryption method and device, electronic equipment and storage medium
JP4763465B2 (en) Personal authentication apparatus, server apparatus, authentication system, and authentication method
CN108337090A (en) A kind of dynamic password acquisition methods, device, terminal and storage medium
WO2023241142A1 (en) Data processing method and apparatus, storage medium, and electronic device
CN111415155A (en) Encryption method, device, equipment and storage medium for chain-dropping transaction data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant