CN110084599B - Key processing method, device, equipment and storage medium - Google Patents

Key processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN110084599B
CN110084599B CN201910351295.XA CN201910351295A CN110084599B CN 110084599 B CN110084599 B CN 110084599B CN 201910351295 A CN201910351295 A CN 201910351295A CN 110084599 B CN110084599 B CN 110084599B
Authority
CN
China
Prior art keywords
password
local
key
mnemonic
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910351295.XA
Other languages
Chinese (zh)
Other versions
CN110084599A (en
Inventor
荆博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201910351295.XA priority Critical patent/CN110084599B/en
Publication of CN110084599A publication Critical patent/CN110084599A/en
Application granted granted Critical
Publication of CN110084599B publication Critical patent/CN110084599B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the invention discloses a key processing method, a device, equipment and a storage medium. The method comprises the following steps: generating a password distortion function of a local user according to mnemonic word information of the local block chain account; generating a distorted transaction password of the local user according to the transaction password of the local user and the password distortion function; and encrypting the key text of the local blockchain account by adopting the distorted transaction password of the local user to obtain a key ciphertext of the local blockchain account, wherein the key ciphertext is used for being recorded in user terminal equipment. The embodiment of the invention realizes that different users adopt different encryption password generation modes, and increases the diversity of key ciphertext generation. Therefore, under the condition that the source code of the blockchain client software is sourced, different password distortion functions are used by different blockchain accounts, so that an attacker cannot violently break the original texts of the keys of different users, and the safety of the user blockchain account key is greatly enhanced.

Description

Key processing method, device, equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of block chains, in particular to a key processing method, a key processing device, key processing equipment and a storage medium.
Background
With the rapid development of the blockchain technology, blockchain clients of various applications gradually enter the lives of people, and users can manage user assets in blockchain accounts by creating and using accounts at the blockchain clients, so that the security of the blockchain accounts is particularly important.
In consideration of the security of the blockchain account, currently, the private key of the user can be encrypted, so that the encrypted private key ciphertext is stored in the blockchain client instead of the user private key original text. The generation process of the user private key ciphertext comprises the following steps: encrypting the payment password of the user to obtain a payment password ciphertext; and based on an encryption algorithm, encrypting the user private key original text by adopting a payment password ciphertext to obtain a private key ciphertext.
However, in view of the open source of the blockchain code, if the blockchain client including the encryption algorithm discloses the source code, the difficulty of violently pushing back the original private key after the attacker obtains the key ciphertext is greatly reduced, and the account security is affected.
Disclosure of Invention
Embodiments of the present invention provide a key processing method, apparatus, device, and storage medium, which can greatly enhance the security of a blockchain account key on a local device of a user on the basis of an open-source blockchain client encryption algorithm.
In a first aspect, an embodiment of the present invention provides a key processing method, which is executed by a user terminal device, and the method includes:
generating a password distortion function of a local user according to mnemonic word information of the local block chain account;
generating a distorted transaction password of the local user according to the transaction password of the local user and the password distortion function;
and encrypting the key text of the local blockchain account by adopting the distorted transaction password of the local user to obtain a key ciphertext of the local blockchain account, wherein the key ciphertext is used for being recorded in user terminal equipment.
In a second aspect, an embodiment of the present invention provides a key processing apparatus, configured in a user terminal device, where the apparatus includes:
the password distortion function generation module is used for generating a password distortion function of a local user according to the mnemonic word information of the local block chain account;
the system comprises a twisting transaction password generating module, a password twisting function generating module and a password transmitting module, wherein the twisting transaction password generating module is used for generating a twisting transaction password of a local user according to the transaction password of the local user and the password twisting function;
and the key processing module is used for encrypting the original key text of the local blockchain account by adopting the distorted transaction password of the local user to obtain a key ciphertext of the local blockchain account, and the key ciphertext is used for being recorded in user terminal equipment.
In a third aspect, an embodiment of the present invention provides an apparatus, including:
one or more processors;
a memory for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the key processing method according to any embodiment of the present invention.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements a key processing method according to any embodiment of the present invention.
When the block chain account is created on the user terminal equipment, the block chain account auxiliary word information is used as a basis, the password distortion function of the local user is generated, the transaction password of the local user is processed by the password distortion function, the distorted transaction password of the local user is generated, and therefore the distorted transaction password of the local user is adopted to encrypt the key original text of the local block chain account to obtain the key ciphertext of the local block chain account, and the key ciphertext is recorded and stored in the user terminal equipment of the local user. The embodiment of the invention is based on the mnemonic information of the local user and the complexity and uniqueness of the mnemonic information, and realizes that different users adopt different encryption password generation modes by generating the exclusive password distortion function of the block chain account, thereby increasing the diversity of the generation of the key ciphertext. Therefore, under the condition that the source code of the blockchain client software is sourced, even if an attacker steals the key ciphertext of the blockchain account, the attacker cannot violently break the key originals of different users because different blockchain accounts use different password distortion functions, and the security of the user blockchain account key is greatly enhanced.
Drawings
Fig. 1 is a flowchart of a key processing method according to an embodiment of the present invention;
fig. 2 is a flowchart of a key processing method according to a second embodiment of the present invention;
fig. 3 is a schematic diagram of a key encryption processing procedure according to a second embodiment of the present invention;
fig. 4 is a flowchart of a key usage requirement response provided by the third embodiment of the present invention;
fig. 5 is a schematic diagram of a key ciphertext decryption process according to a third embodiment of the present invention;
fig. 6 is a flowchart of a key usage requirement response during device replacement according to a fourth embodiment of the present invention;
fig. 7 is a schematic structural diagram of a key processing apparatus according to a fifth embodiment of the present invention;
fig. 8 is a schematic structural diagram of an apparatus according to a sixth embodiment of the present invention.
Detailed Description
The embodiments of the present invention will be described in further detail with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the embodiments of the invention and that no limitation of the invention is intended. It should be further noted that, for convenience of description, only some structures, not all structures, relating to the embodiments of the present invention are shown in the drawings.
Example one
Fig. 1 is a flowchart of a key processing method according to an embodiment of the present invention, where this embodiment is applicable to a case where, when a user uses a local terminal device to create a blockchain account, encryption processing is performed on key information stored in the local terminal device by the user. The method specifically comprises the following steps:
and S110, generating a password distortion function of the local user according to the mnemonic word information of the local block chain account.
In the embodiment of the present invention, the user terminal device is provided with a blockchain client, and the user performs an operation on the blockchain client of the local terminal device to create or use a local blockchain account. In response to the requirements of different security levels, the local blockchain account may refer to a blockchain account created on the local terminal device, or may refer to an account created on a blockchain network. Correspondingly, the created blockchain account can be switched to other terminal equipment for logging and use.
In the blockchain client, as long as the key, especially the private key, of the blockchain account is reserved, the blockchain account can be unlocked, and the user assets in the blockchain account can be acquired. Since the private key is usually composed of a very long 64-bit string, when a user creates multiple accounts or generates a new blockchain account each time for transaction security, it is difficult to perfect and properly keep a large number of blockchain account keys. Accordingly, the mnemonic for the blockchain account is generated accordingly. Using mnemonics to help the user manage all account information, the user does not need to generate a private address for each transaction on the blockchain.
Specifically, in the generation process of the mnemonic word, a random number with a length of 128 to 256 bits, such as 128 bits, 160 bits, 192 bits, 224 bits and 256 bits, is generated first. And taking the first n bits after the hash of the random number as a checksum, wherein n is the length of the random number/32, and then a checksum of the random number can be created. And secondly, adding a checksum at the tail of the random number, splitting the recombined random number into different parts respectively containing 11 bits by taking 11 bits as a unit, and comparing the value of each part containing 11 bits with a predefined mnemonic word library so as to convert the random number into mnemonic words consisting of words in an arrangement order. For example, if the random number is 128, the checksum is 4 bits, and a recombined random number of 132 bits is formed, and 12 words can be generated after splitting to form the mnemonic word. Therefore, the mnemonic words are generally composed of 12 to 24 words, and the mnemonic language supports a plurality of mainstream languages for the user to remember. A large number of private keys can be created through mnemonics of the blockchain account, public keys can be deduced through the private keys, and the public keys can be transformed to obtain blockchain account addresses. In this embodiment, when the blockchain account is created in the local terminal device, the local terminal device generates mnemonic word information of the locally created blockchain account by providing a random number, and provides the mnemonic word information to the user for storage, or stores the mnemonic word information in the local terminal device.
In this embodiment, the password distortion function is used to process a transaction password of a user to generate an encryption password for encrypting a key plaintext, so as to increase the security of the encryption password. The password warping function is generated according to mnemonic word information of the local block chain account, the block chain account has a special password warping function based on the uniqueness of the mnemonic word, and the password warping functions of different block chain accounts are different. The password distortion function can be recorded in the local for decrypting the key ciphertext when the local monitors the key use requirement of the local block chain account.
Specifically, in the process of generating the password warping function, the mnemonic characteristic value may be extracted according to the mnemonic word information of the local blockchain account, and a local warping algorithm is determined from candidate warping algorithms provided by the password warping function generating function, so that the local warping algorithm is run according to the mnemonic characteristic value to generate the password warping function of the local blockchain account. The candidate warping algorithm may include a hash-like algorithm and/or a pseudo-random-like algorithm. The present embodiment will explain the generation process of the password warping function in detail in the following embodiments.
Therefore, the password warping function in this embodiment is not only affected by the mnemonic feature value, so that different blockchain accounts have different password warping functions; and the calculation complexity is higher, the calculation process is time-consuming and irreversible, and the difficulty of acquiring output by violently traversing input by an attacker is greatly improved.
And S120, generating a distorted transaction password of the local user according to the transaction password of the local user and the password distortion function.
In an embodiment of the present invention, the transaction password refers to a password for confirming a user transaction, such as a payment password, or a login password of a blockchain account. The transaction password may be a natural semantic string entered by the user, such as a number, a letter of a supported language, or a combination thereof. The transaction password is simple in form and can be a character string with a short length, such as a 6-bit character string, so that the user can remember the transaction password conveniently. Unlike the key of the blockchain account, the transaction password may be modified according to the user requirement, for example, the transaction password may be reset after the original transaction password is input, the mnemonic information is imported, or the private key is used for identity authentication.
In this embodiment, because the transaction password is relatively simple, and the attack resistance of encrypting the key plaintext by using the transaction password is relatively low, in order to improve the difficulty of violence reverse thrust of an attacker on the key plaintext, the transaction password of the local user may be processed by using the password distortion function of the local user to generate the distorted transaction password of the local user, so as to realize conversion of the transaction password of the local user, and the converted distorted transaction password is used as the encryption password to encrypt the key plaintext. The computing irreversibility of the password distortion function and the strong coupling of the password distortion function and the mnemonic word information of the local block chain account are adopted, so that the converted distorted transaction password is strong in anti-adversity, and the converted distorted transaction password is used as the encryption password, so that the safety of the subsequent encrypted key is greatly improved.
S130, encrypting the key text of the local blockchain account by adopting the distorted transaction password of the local user to obtain the key ciphertext of the local blockchain account, wherein the key ciphertext is used for being recorded in user terminal equipment.
In an embodiment of the present invention, the key text refers to key original information of the blockchain account, such as information of a private key, a public key, and a blockchain account address. The key text is a character string generated based on a random number provided by the device and a key generation algorithm when the blockchain account is created. Corresponding to the generation mode of the mnemonic words, when a user creates a block chain account in local terminal equipment, generating a private key and a public key of the block chain account through a random number generated by a system, wherein the random number is the same as the random number required by the mnemonic words, and generating the private key and the public key of the block chain account according to a secret key generation algorithm, such as an elliptic encryption algorithm; and processing the public key by using a Hash algorithm to generate the address information of the block chain account. Thus, after the blockchain account is created, the key text and the mnemonic information of the blockchain account are fixed and unchangeable.
In this embodiment, the transformed distorted transaction password is used as an encryption password to encrypt the original text of the key of the local blockchain account, so as to obtain the cipher text of the key of the local blockchain account, and the cipher text is recorded and stored in the user terminal device. When the local user modifies the transaction password, the corresponding distorted transaction password is also changed, and a key ciphertext obtained by encrypting the distorted transaction password is also changed, so that the decryption difficulty of the key ciphertext is increased.
Therefore, in the embodiment, when the local terminal device creates the blockchain account, the key ciphertext of the blockchain account is stored in the local terminal device, so that the user is prevented from inputting a mnemonic word or a key original text of the user every time the user accesses the blockchain account, and the friendliness between the blockchain client and the user is improved. And secondly, the secret key ciphertext is stored on the local terminal equipment, so that the original secret key ciphertext is prevented from being leaked and stolen. Meanwhile, under the condition that a block chain code is open, even if an attacker steals a key ciphertext stored on local terminal equipment, the attacker cannot violently break the key original text of the local block chain account according to the key ciphertext based on the characteristics of the password distortion function through the strong coupling between the password distortion function and the mnemonic word information of the local block chain account.
According to the technical scheme of the embodiment, when the blockchain account is created on the user terminal equipment, the aid word information of the blockchain account is used as a basis, the password distortion function of the local user is generated, the transaction password of the local user is processed by the password distortion function, the distorted transaction password of the local user is generated, and therefore the distorted transaction password of the local user is adopted to encrypt the key text of the local blockchain account to obtain the key ciphertext of the local blockchain account, and the key ciphertext is recorded and stored in the user terminal equipment of the local user. The embodiment of the invention is based on the mnemonic information of the local user and the complexity and uniqueness of the mnemonic information, and realizes that different users adopt different encryption password generation modes by generating the exclusive password distortion function of the block chain account, thereby increasing the diversity of the generation of the key ciphertext. Therefore, under the condition that the source code of the blockchain client software is sourced, even if an attacker steals the key ciphertext of the blockchain account, the attacker cannot violently break the key originals of different users because different blockchain accounts use different password distortion functions, and the security of the user blockchain account key is greatly enhanced.
Example two
The present embodiment provides a preferred implementation of the key processing method based on the first embodiment, and is capable of generating a cryptographic warp function specific to a local blockchain account. Fig. 2 is a flowchart of a key processing method according to a second embodiment of the present invention, where step S110 may further specifically include steps S210-S230, and as shown in fig. 2, the method includes the following steps:
and S210, generating a mnemonic word bit array according to the mnemonic word information of the local block chain account.
In the embodiment of the present invention, when a blockchain account is created on a local terminal device, mnemonic word information generated when the account is created can be directly acquired. Therefore, all or part of the mnemonics in the mnemonic information are converted into the expression form of numerical data to form the mnemonic bit array.
Optionally, extracting mnemonic word segments of the local blockchain account located at the fixed position; and mapping the mnemonic word segments into mnemonic word bit arrays.
In this embodiment, since the mnemonics are composed of 12 to 24 words and the words have an arrangement order, at least one fixed word arrangement position may be preset, or a word arrangement position fixed with respect to one block chain account may be calculated based on unique mnemonic information of the block chain account based on a specific algorithm, so as to extract a word from the at least one fixed word arrangement position, thereby forming a mnemonic fragment. When the blockchain account is created, the mnemonic word segment of the blockchain account is determined and is uniquely associated with the user. The user can perfectly record and properly store the mnemonic words and the mnemonic word segments in a self mode, and the method is easier to store compared with the complete mnemonic word information and is not easy to reveal the complete mnemonic word information.
In this embodiment, the mnemonic word segment is mapped to a mnemonic word bit array expressed in a digital form by converting a character string into a number, which facilitates subsequent operations. In this embodiment, the conversion method from the character string to the number is not limited, and any method capable of converting the character string to the number may be applied to this embodiment. For example, words in the mnemonic word segments can be reversely mapped into corresponding number combinations according to a conversion mode from random numbers to mnemonic words; and each character in the mnemonic word segment can be converted into ASCII code to obtain the bit array of the mnemonic word segment. Based on a uniform conversion algorithm, the bit numbers of the generated bit arrays can be the same, so that the subsequent uniform operation on the same blockchain account is facilitated.
For example, it is assumed that the mnemonic word information of the local blockchain account includes 12 words, and the fixed positions of 1, 3 and 7 are preset. Therefore, when the block chain account is created in the local terminal device, after the generation and acquisition of the mnemonic words are completed, the words at the 1 st, 3 rd and 7 th positions can be extracted from the 12 words to form the mnemonic word segment. And mapping the mnemonic word segment into a 33-bit mnemonic word bit array according to the mnemonic word library.
S220, extracting at least one mnemonic characteristic value from the mnemonic word bit array.
In the specific embodiment of the present invention, similar to the selection manner of the mnemonic word segment, the extraction manner of the mnemonic feature values in the bit array is not limited in this embodiment, and any manner of extracting the feature values may be applied in this embodiment. For example, based on the generation manner of the mnemonic word bit array, at least one fixed feature value position may be preset according to the number of bits of the bit array generated by the generation manner, or based on a specific algorithm associated with the generation manner, a feature value position fixed with respect to one block chain account may be calculated according to the number of bits of the bit array generated by the generation manner, so as to extract at least one numerical value from the at least one fixed feature value position, thereby forming the mnemonic feature value. Based on a uniform extraction algorithm, the digits of the generated mnemonic characteristic values can be the same, so that the subsequent uniform operation on the same block chain account is facilitated.
And S230, inputting at least one mnemonic characteristic value into a password distortion function generating function to generate a password distortion function of the local user.
In an embodiment of the present invention, the password warping function generating function is a function for generating the password warping function from the mnemonic characteristic values. The password distortion function generation function comprises a distortion algorithm, and the password distortion function is generated by operating the distortion algorithm through the mnemonic characteristic value.
In an alternative embodiment, a local warping algorithm is determined from at least two candidate warping algorithms provided by the cryptographic warping function generation function, based on at least one mnemonic feature value, and operating parameters of the local warping algorithm are determined; and generating a password warping function of the local user according to the local warping algorithm and the operating parameters of the local warping algorithm.
The password warping function generating function can provide at least two candidate warping algorithms for selection, and can specify operation parameters such as operation sequence and iteration times of each warping algorithm. Specifically, by inputting at least one mnemonic characteristic value into the password warping function generating function, the password warping function generating function may determine a locally adopted warping algorithm and operation parameters from the candidate warping algorithms according to a preset rule, so as to operate and generate the password warping function of the local user. The number of the locally adopted warping algorithms can be one or more; depending on the operating parameters, each local warping algorithm may be run sequentially, alternately, iteratively a number of times, and so on.
Optionally, determining a local hash algorithm from hash algorithms provided by the cryptographic warp function generating function according to the at least one mnemonic feature value; and/or determining a local pseudo-random algorithm from pseudo-random algorithms provided by the cryptographic warp function generation function based on the at least one mnemonic feature value.
In this embodiment, the candidate warping algorithm provided by the password warping function generating function may be a hash algorithm. The hash algorithm, also called hash algorithm, maps a binary value of an arbitrary length to a binary value of a shorter fixed length, and this small binary value is called a hash value. Due to the irreversibility of the hash algorithm, the cracking difficulty of the encryption processing in the embodiment is correspondingly increased. The candidate warping algorithm provided by the cryptographic warping function generation function may also be a pseudo-random class of algorithm for generating pseudo-random numbers. The password distortion function may be any combination of hash-like and/or pseudo-random algorithms.
S240, generating a distorted transaction password of the local user according to the transaction password of the local user and the password distortion function.
And S250, encrypting the key text of the local blockchain account by adopting the distorted transaction password of the local user to obtain the key ciphertext of the local blockchain account, wherein the key ciphertext is used for being recorded in user terminal equipment.
Fig. 3 is a schematic diagram illustrating an exemplary key encryption process. As shown in fig. 3, when a user creates a blockchain account at a local terminal device, a fixed password warping function generation function is used to generate a password warping function of the local user according to mnemonic word information generated by creating the local blockchain account; processing the transaction password input by the local user by using a password distortion function of the local user to obtain a distorted transaction password; and taking the transformed distorted transaction password as an encryption password, encrypting the original text of the key of the local blockchain account to obtain the key ciphertext of the local blockchain account, and recording and storing the key ciphertext in user terminal equipment. When a user replaces a new terminal device to log in and use the block chain account, the password distortion function is rebuilt on the new terminal device based on the mnemonic word segment input by the user, so that the user is prevented from inputting all the mnemonic words, and the safety of the account is improved.
Therefore, in the embodiment, when the local terminal device creates the blockchain account, the key ciphertext of the blockchain account is stored in the local terminal device, so that the user is prevented from inputting a mnemonic word or a key original text of the user every time the user accesses the blockchain account, and the friendliness between the blockchain client and the user is improved. And secondly, the secret key ciphertext is stored on the local terminal equipment, so that the original secret key ciphertext is prevented from being leaked and stolen. Meanwhile, under the condition that a block chain code is open, even if an attacker steals a key ciphertext stored on local terminal equipment, the attacker cannot violently break the key original text of the local block chain account according to the key ciphertext based on the characteristics of the password distortion function through the strong coupling between the password distortion function and the mnemonic word information of the local block chain account.
According to the technical scheme of the embodiment, when the blockchain account is created on the user terminal equipment, the mnemonic word information of the blockchain account is used as a basis, the mnemonic word information is converted into a mnemonic word bit array, the mnemonic word bit array is converted into a mnemonic characteristic value, the mnemonic characteristic value is used as input, a local warping algorithm and an operation parameter are determined, and a password warping function is generated through a password warping function generating function. And processing the transaction password of the local user by using the password distortion function to generate the distorted transaction password of the local user, so that the original key text of the local blockchain account is encrypted by using the distorted transaction password of the local user to obtain the key ciphertext of the local blockchain account, and the key ciphertext is recorded and stored in the user terminal equipment of the local user. The embodiment of the invention is based on the mnemonic information of the local user and the complexity and uniqueness of the mnemonic information, and realizes that different users adopt different encryption password generation modes by generating the exclusive password distortion function of the block chain account, thereby increasing the diversity of the generation of the key ciphertext. Therefore, under the condition that the source code of the blockchain client software is sourced, even if an attacker steals the key ciphertext of the blockchain account, the attacker cannot violently break the key originals of different users because different blockchain accounts use different password distortion functions, and the security of the user blockchain account key is greatly enhanced.
EXAMPLE III
In this embodiment, on the basis of the first embodiment, a preferred embodiment of using the generated key ciphertext is provided, after the user creates the blockchain account at the local terminal device, when the local terminal device uses the blockchain account, by obtaining the key ciphertext of the local blockchain account from the local terminal device, the key ciphertext of the local blockchain account can be decrypted by using the password distortion function of the local user and the transaction password input by the local user, so as to respond to the key use requirement of the local user. Fig. 4 is a flowchart of a key usage requirement response provided by a third embodiment of the present invention, and as shown in fig. 4, the method includes the following steps:
s410, when the key use requirement of the local block chain account is monitored, generating a distorted transaction password of the local user according to the transaction password input by the user and the password distortion function of the local user.
In the embodiment of the present invention, the local blockchain account refers to a locally created blockchain account, and accordingly, the mnemonic word information, the password distortion function, the key ciphertext, and other information of the local blockchain account may all be stored in the local terminal device. The encrypted information of the key ciphertext may also be stored in other terminal devices, such as a cloud, where the local terminal device can communicate with the pull information.
In the embodiment, the transaction password is set by the user when the blockchain account is created, and the transaction password is simple in form and easy to remember and store. A transaction password may be understood as a much simpler login password relative to a private key. Therefore, when the user logs in the local blockchain account in the local terminal device, that is, when the key use requirement of the local blockchain account is monitored, the user can input the transaction password into the local terminal device through the login page of the blockchain client in the local terminal device. The local terminal device thus obtains the transaction password entered by the user. Meanwhile, the password distortion function of the local user can be acquired from the local terminal equipment through other account information input by the user, such as an account name and the like. And processing the transaction password input by the user according to the password distortion function of the local user so as to generate the distorted transaction password of the local user.
And S420, decrypting the key ciphertext of the local blockchain account by adopting the distorted transaction password to obtain the key ciphertext of the local blockchain account.
In the embodiment of the present invention, when a user logs in a local blockchain account at a local terminal device, that is, when a key usage requirement of the local blockchain account is monitored, the local terminal device may obtain a key ciphertext of the local user from the local terminal device or a cloud end through account information input by the user, for example, an account name. And in the encryption process of the key text in the block chain account creation, the obtained key ciphertext of the unified user is decrypted by taking the distorted transaction password as a decryption password, so that the key text of the local block chain account is obtained.
And S430, responding to the key use requirement according to the key original text of the local block chain account.
In the embodiment of the invention, the blockchain account can be unlocked through the original text of the secret key, and the blockchain account information is obtained from the blockchain account. Therefore, the local blockchain account is logged in according to the original text of the key of the local blockchain account, and other blockchain operation requirements of the user are responded. Such as asset transactions in blockchain accounts, etc.
Fig. 5 is a schematic diagram illustrating an exemplary key ciphertext decryption process. As shown in fig. 5, after the user creates the blockchain account in the terminal device, or when the user does not use the local terminal device for the first time to access the blockchain account, the user uses the password distortion function generated in the local terminal device to process the transaction password input by the local user, so as to obtain a distorted transaction password; and taking the transformed distorted transaction password as a decryption password, and decrypting the key ciphertext of the local blockchain account to obtain the key plaintext of the local blockchain account.
Therefore, in this embodiment, when the local terminal device that has created the local blockchain account uses the local blockchain account, the key ciphertext stored in the local terminal device is directly used, so that the user is prevented from inputting a mnemonic word or a key plaintext thereof every time the user accesses the local terminal device, and the user can log in and use the blockchain account by inputting a simple transaction password every time the user inputs the simple transaction password, thereby increasing the friendliness between the blockchain client and the user. Meanwhile, under the condition that a block chain code is open, through strong coupling between a password distortion function exclusive to a user and mnemonic word information of a local block chain account, even if an attacker steals a key ciphertext stored on local terminal equipment, based on the diversity of the password distortion function, the attacker cannot violently break the key original text of the local block chain account according to the key ciphertext.
According to the technical scheme of the embodiment, when the local terminal equipment which creates the local blockchain account is used for the local blockchain account, a user can directly use the blockchain account based on the transaction password input by the user through the key ciphertext and the password distortion function which are stored in the local terminal equipment. The method and the system improve the friendliness between the block chain client and the user, reduce the password storage difficulty of the user during use, improve the security of the key ciphertext and improve the brute force attack difficulty.
Example four
In this embodiment, on the basis of the first embodiment, a preferred implementation manner of using the generated key ciphertext is provided, when the local terminal device uses another blockchain account, that is, when the user changes a new terminal device to use the blockchain account, it is necessary to reconstruct the password warping function of the other blockchain account in the new terminal device according to the mnemonic word information input by the user when the new terminal device is used, in particular, when the new terminal device is used for the first time, so as to decrypt the key based on the password warping function of the new terminal device. Fig. 6 is a flowchart of a key usage requirement response during device replacement according to a fourth embodiment of the present invention, and as shown in fig. 6, the method includes the following specific steps:
s610, when the key use requirements of other local use block chain accounts are monitored, key ciphertexts of other block chain accounts are obtained.
In the embodiment of the present invention, when a key usage requirement for locally using another blockchain account is monitored, that is, the another blockchain account is not created in the local terminal device, or is a blockchain account created in another terminal device, the used terminal device is replaced, and the key usage requirement is used in the local terminal device. In this case, especially when the local terminal device first uses another blockchain account, the local terminal device does not store the mnemonic word information, the password distortion function, the key ciphertext, and other information of the other blockchain account. Therefore, when monitoring that the key usage requirement of other local blockchain accounts is locally used, the local terminal device may obtain the key ciphertext of the other blockchain accounts from the intermediate device, such as a cloud, through account information input by other users, such as an account name, or the local terminal device may also receive the key ciphertext transmitted by the original terminal device of the other blockchain accounts.
And S620, generating password distortion functions of other users according to the mnemonic word information of other block chain accounts.
In the embodiment of the present invention, due to the switching of the devices using other blockchain accounts, especially the first use of the local terminal device, the local terminal device does not store the password distortion functions of other blockchain accounts. Therefore, in view of the security of the password warping function, the password warping function of the blockchain account is not stored in the intermediate device. Since the password distortion function generation function is fixed and unchangeable, at this time, when the user uses the blockchain account in the new terminal device, the mnemonic word information can be input into the local terminal device through the use page of the blockchain client in the local terminal device, so that the local terminal device can reconstruct the password distortion function of other blockchain accounts in the local terminal device according to the mnemonic word information and the password distortion function generation function. When the mnemonic word information input by the user is preferably block chain creation, the user is prompted to record and store the mnemonic word segments. Therefore, the reconstruction of the password distortion function does not need to input complete mnemonic information again, and the safety of the mnemonic information is further ensured. Therefore, for other blockchain accounts, the local terminal device collects and reconstructs necessary information again, so that the other blockchain accounts are bound with the local terminal device, and smooth and safe use of the other blockchain accounts in the local terminal device is ensured.
The block chain client of the local terminal equipment can also provide other users with an option of saving or not, and when other users select to allow saving, the information can be stored in the local terminal equipment so as to be used quickly when the local terminal equipment is used again later; when other users choose not to allow storage, the information is only used in the current use, so that the temporary use safety of the user at the new terminal equipment is improved, and at the moment, if the other users use the local terminal equipment again subsequently, the collection and reconstruction processes of the information also need to be repeated.
S630, generating the distorted transaction passwords of other users according to the transaction passwords of other users and the password distortion functions of other users.
In the specific embodiment of the present invention, other users may input the transaction passwords of other users into the local terminal device through the use page of the blockchain client in the local terminal device. The local terminal equipment obtains the transaction passwords input by other users, collects the key ciphertexts of other block chain accounts and reconstructs the password distortion functions of other users. Therefore, the local terminal device can process the transaction passwords input by other users according to the password distortion functions of other users, so as to generate the distorted transaction passwords of other users.
And S640, decrypting the key ciphertext of the other block chain accounts by adopting the distorted transaction passwords of other users to obtain the key ciphertext of the other block chain accounts.
In the embodiment of the present invention, when other users log in other blockchain accounts at the local terminal device, that is, when the key usage requirements of other blockchain accounts are monitored, the encryption process of the key plaintext in the blockchain account creation may be performed in the same manner as the above-mentioned encryption process of the key plaintext in the blockchain account creation, and the obtained key ciphertext of other users is decrypted by using the distorted transaction password as the decryption password, so as to obtain the key plaintext of other blockchain accounts.
According to the technical scheme of the embodiment, when other block chain accounts established in other terminal equipment are used in the local terminal equipment, especially for the first time, the local terminal equipment acquires the key ciphertext of the other block chain accounts, reconstructs the password distortion functions of other users according to the mnemonic word information input by the other users, and can directly use the block chain accounts in the local terminal equipment based on the transaction passwords input by the other users. The method and the system improve the friendliness between the blockchain client and the user, reduce the difficulty of storing the password when the user uses the password, and simultaneously improve the binding relationship between the blockchain account and the equipment, the security of the key ciphertext of other blockchain accounts and the difficulty of brute force attack.
EXAMPLE five
Fig. 7 is a schematic structural diagram of a key processing apparatus according to a fifth embodiment of the present invention, where this embodiment is applicable to a case where a user encrypts key information stored in a local terminal device when the user uses the local terminal device to create a blockchain account, and the apparatus can implement the key processing method according to any embodiment of the present invention. The device specifically includes:
the password warping function generating module 710 is configured to generate a password warping function of the local user according to the mnemonic information of the local blockchain account;
a warped transaction password generating module 720, configured to generate a warped transaction password of the local user according to the transaction password of the local user and the password warping function;
and the key processing module 730 is configured to encrypt the key plaintext of the local blockchain account by using the distorted transaction password of the local user to obtain a key ciphertext of the local blockchain account, where the key ciphertext is used to be recorded in the user terminal device.
Optionally, the password warping function generating module 710 includes:
a mnemonic word bit array generating unit 7101, configured to generate a mnemonic word bit array according to the mnemonic word information of the local block chain account;
a mnemonic feature value extraction unit 7102 for extracting at least one mnemonic feature value from the mnemonic word bit array;
a password warping function generating unit 7103, configured to input the at least one mnemonic feature value into a password warping function generating function, and generate a password warping function of the local user.
Optionally, the mnemonic word bit array generating unit 7101 is specifically configured to:
extracting mnemonic word segments of a local blockchain account located at a fixed position;
and mapping the mnemonic word segments into the mnemonic word bit array.
Optionally, the password warping function generating unit 7103 is specifically configured to:
determining a local warping algorithm from at least two candidate warping algorithms provided by a cryptographic warping function generating function, and determining operating parameters of the local warping algorithm, according to the at least one mnemonic feature value;
and generating a password warping function of the local user according to the local warping algorithm and the operating parameters of the local warping algorithm.
Optionally, the password warping function generating unit 7103 is specifically configured to:
determining a local hash algorithm from hash-like algorithms provided by a password warping function generating function according to the at least one mnemonic characteristic value; and/or the presence of a gas in the gas,
and determining a local pseudo-random algorithm from pseudo-random algorithms provided by the password distortion function generating function according to the at least one mnemonic characteristic value.
Further, the apparatus further includes a key usage response module 740; the key usage response module 740 is specifically configured to:
after the key ciphertext of the local blockchain account is obtained, when the key use requirement of the local blockchain account is monitored, generating a distorted transaction password of the local user according to a transaction password input by the user and a password distortion function of the local user;
decrypting the key ciphertext of the local blockchain account by adopting the distorted transaction password to obtain a key plaintext of the local blockchain account;
and responding to the key use requirement according to the key original text of the local block chain account.
Further, the apparatus further comprises an other blockchain account response module 750; the other blockchain account response module 750 is specifically configured to:
when the key use requirements of other local block chain accounts are monitored, key ciphertexts of other block chain accounts are obtained;
generating password distortion functions of other users according to mnemonic word information of other block chain accounts;
generating a distorted transaction password of other users according to the transaction password of other users and password distortion functions of other users;
and decrypting the key ciphertext of the other block chain accounts by adopting the distorted transaction passwords of the other users to obtain the key ciphertext of the other block chain accounts.
Optionally, the transaction password is a natural semantic character string input by the user, and the key plaintext is a character string generated according to a random number and a key generation algorithm.
According to the technical scheme of the embodiment, through the mutual cooperation of the functional modules, the functions of creating a blockchain account, generating mnemonics, generating a key, generating a password warping function, receiving a transaction password, generating a warped transaction password, encrypting a key text, responding to the use of the key and the like are realized. The embodiment of the invention is based on the mnemonic information of the local user and the complexity and uniqueness of the mnemonic information, and realizes that different users adopt different encryption password generation modes by generating the exclusive password distortion function of the block chain account, thereby increasing the diversity of the generation of the key ciphertext. Therefore, under the condition that the source code of the blockchain client software is sourced, even if an attacker steals the key ciphertext of the blockchain account, the attacker cannot violently break the key originals of different users because different blockchain accounts use different password distortion functions, and the security of the user blockchain account key is greatly enhanced.
EXAMPLE six
Fig. 8 is a schematic structural diagram of an apparatus according to a sixth embodiment of the present invention, and fig. 8 shows a block diagram of an exemplary apparatus suitable for implementing the embodiment of the present invention. The device shown in fig. 8 is only an example and should not bring any limitation to the function and the scope of use of the embodiments of the present invention.
The device 12 shown in fig. 8 is only an example and should not bring any limitation to the function and scope of use of the embodiments of the present invention. The device 12 is preferably a terminal device having a blockchain client installed.
As shown in FIG. 8, device 12 is in the form of a general purpose computing device. The components of device 12 may include, but are not limited to: one or more processors 16, a system memory 28, and a bus 18 that connects the various system components (including the system memory 28 and the processors 16).
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. Device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 8, and commonly referred to as a "hard drive"). Although not shown in FIG. 8, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. System memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in system memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of embodiments described herein.
Device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with device 12, and/or with any devices (e.g., network card, modem, etc.) that enable device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, the device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via the network adapter 20. As shown, the network adapter 20 communicates with the other modules of the device 12 via the bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with device 12, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processor 16 executes various functional applications and data processing, such as implementing a key processing method provided by an embodiment of the present invention, by executing programs stored in the system memory 28.
EXAMPLE seven
An embodiment of the present invention further provides a computer-readable storage medium, on which a computer program (or referred to as computer-executable instructions) is stored, where the computer program is used for executing a key processing method when executed by a processor, and the method includes:
generating a password distortion function of a local user according to mnemonic word information of the local block chain account;
generating a distorted transaction password of the local user according to the transaction password of the local user and the password distortion function;
and encrypting the key text of the local blockchain account by adopting the distorted transaction password of the local user to obtain a key ciphertext of the local blockchain account, wherein the key ciphertext is used for being recorded in user terminal equipment.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for embodiments of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or device. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the embodiments of the present invention have been described in more detail through the above embodiments, the embodiments of the present invention are not limited to the above embodiments, and many other equivalent embodiments may be included without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A key processing method, performed by a user terminal device, the method comprising:
generating a password distortion function of a local user according to mnemonic word information of the local block chain account;
generating a distorted transaction password of the local user according to the transaction password of the local user and the password distortion function;
encrypting the key text of the local blockchain account by adopting the distorted transaction password of the local user to obtain a key ciphertext of the local blockchain account, wherein the key ciphertext is used for being recorded in user terminal equipment;
the generating a password distortion function of the local user according to the mnemonic word information of the local blockchain account includes:
generating a mnemonic word bit array according to the mnemonic word information of the local block chain account;
extracting at least one mnemonic characteristic value from the mnemonic word bit array;
and inputting the at least one mnemonic characteristic value into a password distortion function generating function to generate a password distortion function of the local user.
2. The method of claim 1, wherein generating a mnemonic bit array from mnemonic information of the local blockchain account comprises:
extracting mnemonic word segments of a local blockchain account located at a fixed position;
and mapping the mnemonic word segments into the mnemonic word bit array.
3. The method of claim 1, wherein the entering the at least one mnemonic feature value into a password warping function generating function, generating a password warping function for the local user, comprises:
determining a local warping algorithm from at least two candidate warping algorithms provided by a cryptographic warping function generating function, and determining operating parameters of the local warping algorithm, according to the at least one mnemonic feature value;
and generating a password warping function of the local user according to the local warping algorithm and the operating parameters of the local warping algorithm.
4. The method of claim 3, wherein determining a local warping algorithm from at least two candidate warping algorithms provided by a cryptographic warping function generating function based on the at least one mnemonic feature value comprises:
determining a local hash algorithm from hash-like algorithms provided by a password warping function generating function according to the at least one mnemonic characteristic value; and/or the presence of a gas in the gas,
and determining a local pseudo-random algorithm from pseudo-random algorithms provided by the password distortion function generating function according to the at least one mnemonic characteristic value.
5. The method of claim 1, further comprising, after the obtaining a key ciphertext of the local blockchain account:
when the key use requirement of the local block chain account is monitored, generating a distorted transaction password of the local user according to the transaction password input by the user and a password distortion function of the local user;
decrypting the key ciphertext of the local blockchain account by adopting the distorted transaction password to obtain a key plaintext of the local blockchain account;
and responding to the key use requirement according to the key original text of the local block chain account.
6. The method of claim 1, further comprising:
when the key use requirements of other local block chain accounts are monitored, key ciphertexts of other block chain accounts are obtained;
generating password distortion functions of other users according to mnemonic word information of other block chain accounts;
generating a distorted transaction password of other users according to the transaction password of other users and password distortion functions of other users;
and decrypting the key ciphertext of the other block chain accounts by adopting the distorted transaction passwords of the other users to obtain the key ciphertext of the other block chain accounts.
7. The method of claim 1, wherein the transaction password is a natural semantic string entered by a user, and wherein the key text is a string generated according to a random number and a key generation algorithm.
8. A key processing apparatus, configured to be provided in a user terminal device, the apparatus comprising:
the password distortion function generation module is used for generating a password distortion function of a local user according to the mnemonic word information of the local block chain account;
the system comprises a twisting transaction password generating module, a password twisting function generating module and a password transmitting module, wherein the twisting transaction password generating module is used for generating a twisting transaction password of a local user according to the transaction password of the local user and the password twisting function;
the key processing module is used for encrypting the original key text of the local blockchain account by adopting the distorted transaction password of the local user to obtain a key ciphertext of the local blockchain account, and the key ciphertext is used for being recorded in user terminal equipment;
the password warping function generating module comprises:
the mnemonic word bit array generating unit is used for generating a mnemonic word bit array according to the mnemonic word information of the local block chain account;
the mnemonic characteristic value extraction unit is used for extracting at least one mnemonic characteristic value from the mnemonic word bit array;
a password warping function generating unit, configured to input the at least one mnemonic feature value into a password warping function generating function, and generate a password warping function of the local user;
9. an electronic device, comprising:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the key processing method of any one of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a key processing method according to any one of claims 1 to 7.
CN201910351295.XA 2019-04-28 2019-04-28 Key processing method, device, equipment and storage medium Active CN110084599B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910351295.XA CN110084599B (en) 2019-04-28 2019-04-28 Key processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910351295.XA CN110084599B (en) 2019-04-28 2019-04-28 Key processing method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110084599A CN110084599A (en) 2019-08-02
CN110084599B true CN110084599B (en) 2021-04-20

Family

ID=67417463

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910351295.XA Active CN110084599B (en) 2019-04-28 2019-04-28 Key processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110084599B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110473104B (en) * 2019-08-20 2023-11-17 深圳市迅雷网络技术有限公司 Transaction processing method and related equipment
SG10201910425SA (en) * 2019-11-07 2020-10-29 Alipay Labs Singapore Pte Ltd Methods and devices for preventing denial-of-service attack on blockchain system
CN111027087B (en) * 2019-12-16 2022-06-21 智慧谷(厦门)物联科技有限公司 Enterprise information management system and method for encrypting mnemonics by applying block chain
CN111400743B (en) * 2020-04-07 2023-08-15 百度国际科技(深圳)有限公司 Transaction processing method, device, electronic equipment and medium based on blockchain network
CN111586445B (en) * 2020-05-14 2022-04-12 中国人民公安大学 Video data transmission method and device
CN112184223B (en) * 2020-09-28 2023-05-26 江苏恒宝智能系统技术有限公司 Block chain account protection method and device, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600182A (en) * 2018-03-29 2018-09-28 深圳前海微众银行股份有限公司 Block chain key management method, system and key management apparatus, storage medium
CN108664770A (en) * 2018-05-22 2018-10-16 上海七印信息科技有限公司 There are methods of proof for a kind of high confidence level based on block chain technology
CN108833093A (en) * 2018-06-14 2018-11-16 百度在线网络技术(北京)有限公司 Determination method, apparatus, equipment and the storage medium of account key
CN109474424A (en) * 2018-12-17 2019-03-15 江苏恒宝智能系统技术有限公司 Block chain account cipher key backup and method, the system of recovery
CN109474420A (en) * 2018-10-26 2019-03-15 深圳市元征科技股份有限公司 A kind of private key backup method and relevant device
CN109543434A (en) * 2018-11-28 2019-03-29 深圳市墨者安全科技有限公司 Block chain information encryption method, decryption method, storage method and device
CN109658078A (en) * 2018-12-19 2019-04-19 上海和数软件有限公司 Block chain private key generation method, device and medium based on biological characteristic

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600182A (en) * 2018-03-29 2018-09-28 深圳前海微众银行股份有限公司 Block chain key management method, system and key management apparatus, storage medium
CN108664770A (en) * 2018-05-22 2018-10-16 上海七印信息科技有限公司 There are methods of proof for a kind of high confidence level based on block chain technology
CN108833093A (en) * 2018-06-14 2018-11-16 百度在线网络技术(北京)有限公司 Determination method, apparatus, equipment and the storage medium of account key
CN109474420A (en) * 2018-10-26 2019-03-15 深圳市元征科技股份有限公司 A kind of private key backup method and relevant device
CN109543434A (en) * 2018-11-28 2019-03-29 深圳市墨者安全科技有限公司 Block chain information encryption method, decryption method, storage method and device
CN109474424A (en) * 2018-12-17 2019-03-15 江苏恒宝智能系统技术有限公司 Block chain account cipher key backup and method, the system of recovery
CN109658078A (en) * 2018-12-19 2019-04-19 上海和数软件有限公司 Block chain private key generation method, device and medium based on biological characteristic

Also Published As

Publication number Publication date
CN110084599A (en) 2019-08-02

Similar Documents

Publication Publication Date Title
CN110084599B (en) Key processing method, device, equipment and storage medium
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
EP3451575B1 (en) Methods, systems and computer program product for providing encryption on a plurality of devices
JP6479758B2 (en) Establishing reliability between applications on a computer
US8694467B2 (en) Random number based data integrity verification method and system for distributed cloud storage
CN110324143A (en) Data transmission method, electronic equipment and storage medium
CN107612683B (en) Encryption and decryption method, device, system, equipment and storage medium
US9020149B1 (en) Protected storage for cryptographic materials
US9118645B2 (en) Distributed authentication using persistent stateless credentials
US10608813B1 (en) Layered encryption for long-lived data
CN109951295B (en) Key processing and using method, device, equipment and medium
KR101103403B1 (en) Control method of data management system with emproved security
TW201349823A (en) Data encryption method, data verification method and electronic apparatus
US10476663B1 (en) Layered encryption of short-lived data
CN110708291B (en) Data authorization access method, device, medium and electronic equipment in distributed network
CN116015767A (en) Data processing method, device, equipment and medium
CN114615031A (en) File storage method and device, electronic equipment and storage medium
CN111865869B (en) Registration and authentication method and device based on random mapping, medium and electronic equipment
US10623400B2 (en) Method and device for credential and data protection
CN109818751B (en) Key processing and using method, device, equipment and storage medium
CN106919348A (en) Distributed memory system and storage method that anti-violence is cracked
US8751819B1 (en) Systems and methods for encoding data
CN113946863A (en) Data encryption storage method, system, equipment and storage medium
CN113726515A (en) UKEY-based key processing method, storage medium and electronic device
US11356254B1 (en) Encryption using indexed data from large data pads

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant