CN111447070A - Block chain signature verification method and device and storage medium - Google Patents

Block chain signature verification method and device and storage medium Download PDF

Info

Publication number
CN111447070A
CN111447070A CN202010221268.3A CN202010221268A CN111447070A CN 111447070 A CN111447070 A CN 111447070A CN 202010221268 A CN202010221268 A CN 202010221268A CN 111447070 A CN111447070 A CN 111447070A
Authority
CN
China
Prior art keywords
key
block chain
signature verification
blockchain
private
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010221268.3A
Other languages
Chinese (zh)
Other versions
CN111447070B (en
Inventor
丁莉萍
吴燕琼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010221268.3A priority Critical patent/CN111447070B/en
Publication of CN111447070A publication Critical patent/CN111447070A/en
Application granted granted Critical
Publication of CN111447070B publication Critical patent/CN111447070B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses a block chain signature verification method, which comprises the following steps: generating a plurality of private keys by using an encryption algorithm according to the plurality of key generation elements, and respectively generating corresponding public keys for each private key by using the encryption algorithm; storing the public key in an information storage area of a key block chain block; setting a signature verification mode for accessing the key block chain; performing signature verification on the key block chain according to the setting; judging whether the signature verification passes; obtaining the authority of an original private key for accessing the target block chain to access the target block chain through a VPN channel; and establishing the VPN channel connection to access the target block chain. According to the technical scheme provided by the invention, the plurality of private keys and the public keys are generated by using the plurality of different key generation elements, and the plurality of private keys and the combination thereof are used for carrying out signature verification on the key block chain, so that the safe access to the target block chain is realized, and the safety and the reliability of the block chain are improved.

Description

Block chain signature verification method and device and storage medium
Technical Field
The present invention relates to the field of security technologies for verifying a block chain signature, and in particular, to a method and an apparatus for verifying a block chain signature, and a storage medium.
Background
In the existing block chain technology, when a user accesses a block chain, the user needs to use a private key grasped by the user to complete signature verification, and the private key needs to be properly stored on physical media such as a U disk, paper, a computer hard disk and the like, but once an unexpected situation occurs, such as the loss of the private key, the U disk storing the private key may be lost, or the private key stored on the computer hard disk is lost due to the failure or deletion operation of the hard disk, or the paper recording the private key is lost or damaged. When the private key is lost and cannot be found back, the user loses access to the block chain and the right to process the transaction. In addition, when the private key is stolen by a thief, the thief can easily use the private key of the user to access and process transactions, such as transferring assets or tampering data, to the blockchain, so that the loss is caused to the user. Therefore, although the blockchain technology has many advantages in data storage, encryption and the like, there are weak links of loss and theft in the aspect of private key storage, and security protection needs to be strengthened in the aspects of key storage and key use. Therefore, a need exists for a secure mechanism for blockchain access that improves the security and reliability of use of blockchain techniques.
Disclosure of Invention
The invention provides a block chain signature verification method, a block chain signature verification device and a storage medium, which are used for realizing the safety protection of block chain signature verification and improving the safety and reliability of a block chain.
The invention provides a block chain signature verification method, which comprises the following steps:
step S10: generating a plurality of private keys by using an encryption algorithm according to the plurality of key generation elements, and respectively generating corresponding public keys for each private key by using the encryption algorithm;
step S20: storing the public key in an information storage area of a key block chain block;
step S30: setting a signature verification mode for the key block chain access, wherein the signature verification mode for the key block chain access comprises the number of the private keys and the combination of the private keys;
step S40: performing signature verification on the key block chain according to the setting;
step S50: judging whether the signature verification passes, if so, executing the step S60, otherwise, rejecting and ending;
step S60: obtaining the authority of an original private key for accessing the target block chain to access the target block chain through a VPN channel;
step S70: and establishing the VPN channel connection to access the target block chain.
Further, the key generation element includes any one or more of a string of characters without a fixed length limit saved on the physical medium, biometric information of the individual of the user, biometric information of one or more others specified by the user, and specific data information held by the organization to which the user delegates.
Further, the encryption algorithm is an irreversible encryption algorithm.
Further, the block chain signature verification method further comprises setting the validity period of the private key and the public key, and prompting the user to regenerate the private key and the public key when the validity period is exceeded.
Further, the blocks of the key block chain include information storage areas of a plurality of users.
Further, the information storage area of the key block chain block stores the public key, an original private key of a target block chain, a setting of a signature verification mode accessed by the key block chain, and a validity period setting of the private key and the public key.
Further, the key block chain includes a key chain signature check processing module.
Further, the key chain signature verification processing module is configured to perform signature verification according to the setting on accessing the key blockchain.
In order to achieve the above object, the present invention further provides a block chain signature verification apparatus, where the block chain signature verification apparatus includes a memory module and a processor module, the memory module stores a block chain signature verification program operable on the processor module, and the block chain signature verification program implements the steps of the block chain signature verification method when executed by the processor module.
In addition, to achieve the above object, the present invention further provides a storage medium, which is a computer-readable storage medium, and the storage medium stores thereon a block chain signature verification program, which is executable by one or more processor modules to implement the steps of the above block chain signature verification method.
According to the block chain signature verification method, device and storage medium, the plurality of private keys and the public keys are generated by using the plurality of different key generation elements, and the plurality of private keys and the combination thereof are used for signature verification of the key block chain, so that the safe access to the target block chain is realized, and the safety and reliability of the block chain are improved.
Drawings
Fig. 1 is a schematic flow chart of a block chain signature verification method according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating generation of a private key and a public key of a key block chain according to an embodiment of the present invention;
fig. 3 is a schematic diagram illustrating an internal structure of a block chain signature verification apparatus according to an embodiment of the present invention;
fig. 4 is a block chain signature verification program module in the block chain signature verification apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a schematic flow chart of a block chain signature verification method according to an embodiment of the present invention, the method including:
step S10: generating a plurality of private keys by using an encryption algorithm according to the plurality of key generation elements, and respectively generating corresponding public keys for each private key by using the encryption algorithm; the key generation element includes any one or more of a string of characters without a fixed length limit stored on a physical medium, biometric information of a user's individual, biometric information of one or more others specified by the user, and specific data information held by an organization to which the user has delegated.
Step S20: storing the public key in an information storage area of a key block chain block;
step S30: setting a signature verification mode for the key block chain access, wherein the signature verification mode for the key block chain access comprises the number of the private keys and the combination of the private keys;
step S40: performing signature verification on the key block chain according to the setting;
step S50: judging whether the signature verification passes, if so, executing the step S60, otherwise, rejecting and ending;
step S60: obtaining the authority of an original private key for accessing the target block chain to access the target block chain through a VPN channel;
step S70: and establishing the VPN channel connection to access the target block chain.
Referring to fig. 2, in an embodiment, a user generates a private key using an irreversible encryption algorithm, such as a Secure Hash Algorithm (SHA) 256 algorithm, according to a plurality of key generation elements, and further generates a public key using the encryption algorithm based on the generated private key. In this embodiment, the key generating elements include a first key generating element, a second key generating element, a third key generating element, and a fourth key generating element, the first key generating element is a string of characters stored on a physical medium, for example, a string of characters stored on a usb disk, a string of characters stored on a hard disk of a computer, a string of characters stored on paper, and other strings of characters such as a mobile phone number and an email, the first key generating element generates a first private key by using an irreversible encryption algorithm, and the first public key is generated by using an encryption algorithm based on the first private key. The user only needs to remember the used character string and algorithm type, the user does not need to record or store the private key, and the same private key can still be generated temporarily when the private key is needed to be used for signature verification.
Similarly, the second key generating element is human biometric information of the user's individual, such as a finger print, toe print, retina, voice print, iris and other facial features, and the second key generating element generates a second private key using an irreversible encryption algorithm and generates a second public key using an encryption algorithm based on the second private key. The third key generation element is human body biological characteristic information of one or more other people specified by the user, an irreversible encryption algorithm is used for the third key generation element to generate a third private key, and an encryption algorithm is used for generating a third public key based on the third private key. The fourth key generation element is specific data information held by an organization entrusted by the user, such as public security, notarization, judicial law and arbitration organization entrusted by the user, the organization can be used as a final specific data information holder, the specific data information held by the organization comprises basic information such as organization digital certificate, user name, user company name, time and place information, and an irreversible encryption algorithm is used for the fourth key generation element to generate a fourth private key, and an encryption algorithm is used for the fourth private key to generate a fourth public key. The user, others or entrusted organization only needs to remember the used key generation elements and algorithm types, does not need to record or store the private key, and can still temporarily generate the same private key when needing to use the private key for signature verification. This avoids security problems associated with recording complex keys. For the generated private key and public key, the validity period of the private key and public key may also be set, and when the validity period is exceeded, the user is prompted to regenerate the private key and public key, for example, the validity period of the private key and public key is set to three months, and when the validity period exceeds three months, the private key and public key are invalid, and the user needs to regenerate the private key and public key and set the corresponding validity period.
Further, the generated public key is stored in an information storage area of a key block chain block, and a signature verification method for accessing the key block chain is set, which specifically includes the following setting examples in this embodiment: the user sets that the operation of the key block chain can be completed only by using two private keys at the same time, and under the normal condition, the first private key and the second private key are used; when an unexpected situation occurs, such as death or memory loss of the user, the second private key and the third private key are used; when the personal biological characteristics of the user cannot be used, the third private key and the fourth private key are used. Meanwhile, the method considers that the individual biological characteristics slightly change along with the age change or are injured sometimes to cause possible information errors, and a different private key is possibly generated by using the same algorithm. To prevent this, it is necessary to ensure or enhance the stability of the underlying data; such as logging biometric information or resetting periodically (e.g., three months); or in the biological characteristics, only the iris with the highest stability is collected to be used as basic data; or, in the most extreme case, the use of biometric information in the key combination is not considered. In other setting examples, it may be specified to use the original private key of the target block chain as the signature verification method for accessing the key block chain, or to use any private key or a combination of multiple private keys as the signature verification method for accessing the key block chain, and at the same time, it may also set the validity period for using the signature verification method.
When a user accesses a target block chain for the first time, the system prompts the user to back up an original private key of the target block chain; after the user backs up the original private key to the information storage area of the appointed key block chain block, the system prompts the user to set the private key and the public key which have different importance for accessing the key block chain and are used in different occasions, and then the public key, the original private key of the target block chain, the signature verification mode accessed by the key block chain and the valid period of the private key and the public key are set and stored in the information storage area of the key block chain block. When a plurality of users backup and store respective keys, the blocks of the key block chain comprise information storage areas of the plurality of users. The key blockchain includes a keychain signature verification processing module to perform signature verification using the settings for accessing the keychain.
When the signature passes the verification, the user obtains the authority of the original private key for accessing the target block chain to access the target block chain through the VPN channel; further, the VPN channel connection is established to access the target block chain.
In addition, the invention also provides a block chain signature verification device.
Referring to fig. 3, it is a schematic diagram of an internal structure of a block chain signature verification apparatus according to an embodiment of the present invention, where the block chain signature verification apparatus at least includes a memory module 11, a processor module 12, a communication bus 13, and a network interface 14. Preferably, the block chain signature verification apparatus includes one or more cloud computing devices or computer devices existing on a computer network.
The memory module 11 includes at least one type of readable storage medium, and the readable storage medium includes a flash memory, a hard disk, a multimedia card, a card-type memory module (e.g., an SD or DX memory module, etc.), a magnetic memory module, a magnetic disk, an optical disk, and the like. The memory module 11 may be an internal storage unit of the blockchain signature verification apparatus in some embodiments, for example, a hard disk of the blockchain signature verification apparatus. The memory module 11 may also be an external storage device of the blockchain signature verification apparatus in other embodiments, such as a plug-in hard disk provided on the blockchain signature verification apparatus, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Further, the memory module 11 may also include both an internal storage unit of the block chain signature verification apparatus and an external storage device, and preferably, the memory module 11 may also be a network storage apparatus or a cloud storage apparatus existing in a computer network. The memory module 11 can be used not only to store application software installed in the blockchain signature verification device and various types of data, such as codes of the blockchain signature verification program, but also to temporarily store data that has been output or is to be output.
The processor module 12 may be, in some embodiments, a Central Processing Unit (CPU), a controller, a microcontroller, a microprocessor module or other data processing chip, or any other computing device for executing program code stored in the memory module 11 or processing data, the executed program code may be for executing a block chain signature verification program or the like.
The communication bus 13 is any communication means for realizing connection communication between these components.
The network interface 14 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), and is typically used to establish a communication link between the blockchain signature verification device and other electronic devices.
Alternatively, in some embodiments, the Display may be an L ED Display, a liquid crystal Display, a touch-sensitive liquid crystal Display, an O L ED (Organic light-Emitting Diode) touch-sensitive device, or the like, wherein the Display may also be referred to as a Display screen or Display unit as appropriate for displaying information processed in the blockchain signature verification apparatus and for displaying a visualized user interface.
While fig. 3 shows only a blockchain signature verification apparatus having components 11-14 and a blockchain signature verification program, those skilled in the art will appreciate that the structure shown in fig. 3 does not constitute a limitation of blockchain signature verification apparatus, and may include fewer or more components than shown, or combine certain components, or different arrangements of components, or be one or more computer devices or cloud computing devices in a computer network.
In the embodiment of the block chain signature verification apparatus shown in fig. 3, the memory module 11 stores a block chain signature verification procedure; the processor module 12 implements the following steps when executing the block chain signature verification program stored in the memory module 11:
step S10: generating a plurality of private keys by using an encryption algorithm according to the plurality of key generation elements, and respectively generating corresponding public keys for each private key by using the encryption algorithm;
step S20: storing the public key in an information storage area of a key block chain block;
step S30: setting a signature verification mode for the key block chain access, wherein the signature verification mode for the key block chain access comprises the number of the private keys and the combination of the private keys;
step S40: performing signature verification on the key block chain according to the setting;
step S50: judging whether the signature verification passes, if so, executing the step S60, otherwise, rejecting and ending;
step S60: obtaining the authority of an original private key for accessing the target block chain to access the target block chain through a VPN channel;
step S70: and establishing the VPN channel connection to access the target block chain.
Referring to fig. 4, a schematic diagram of program modules of a blockchain signature verification procedure in an embodiment of the blockchain signature verification apparatus of the present invention is shown, in this embodiment, the blockchain signature verification procedure may be divided into a calculation module 10, a storage module 20, a setting module 30, a verification module 40, and a signature module 50, which exemplarily:
the computing module 10 is used for executing a computing task of generating a private key and a public key by an encryption algorithm;
a storage module 20, configured to perform a storage task for a secret key, a private key, a public key, and settings of a user;
a setting module 30, configured to perform setting tasks of the private key and the public key and signature verification;
a verification module 40 for performing a verification task of a private key accessed to the information storage area;
and a signature module 50 for performing a task of signature using a private key.
The functions or operation steps of the above-mentioned program modules, such as the calculating module 10, the storing module 20, the setting module 30, the verifying module 40 and the signing module 50, which are implemented when executed are substantially the same as those of the above-mentioned embodiments, and are not described herein again.
Furthermore, an embodiment of the present invention further provides a storage medium, where the storage medium is a computer-readable storage medium, and the storage medium stores thereon a block chain signature verification program, where the block chain signature verification program is executable by one or more processor modules to implement the following operations:
step S10: generating a plurality of private keys by using an encryption algorithm according to the plurality of key generation elements, and respectively generating corresponding public keys for each private key by using the encryption algorithm;
step S20: storing the public key in an information storage area of a key block chain block;
step S30: setting a signature verification mode for the key block chain access, wherein the signature verification mode for the key block chain access comprises the number of the private keys and the combination of the private keys;
step S40: performing signature verification on the key block chain according to the setting;
step S50: judging whether the signature verification passes, if so, executing the step S60, otherwise, rejecting and ending;
step S60: obtaining the authority of an original private key for accessing the target block chain to access the target block chain through a VPN channel;
step S70: and establishing the VPN channel connection to access the target block chain.
The storage medium of the present invention is substantially the same as the above embodiments of the block chain signature verification method and apparatus, and will not be described in detail herein.
Compared with the prior art, the block chain signature verification method, the block chain signature verification device and the storage medium provided by the invention have the advantages that the plurality of private keys and the public keys are generated by using the plurality of different key generation elements, the plurality of private keys and the combination thereof are used for signature verification of the key block chain, the access right to the target block chain is further obtained, the safety protection on the target block chain is increased, and the safety and the reliability of the block chain are improved.
It should be noted that the above-mentioned numbers of the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the above embodiment method can be implemented by software plus a necessary general computer network hardware platform. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) as described above, and includes several instructions for enabling a terminal device (such as a drone, a mobile phone, a computer, a server, or a network device) of a computer network to execute the method according to the embodiments of the present invention.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A method for verifying a blockchain signature, the method comprising:
step S10: generating a plurality of private keys by using an encryption algorithm according to the plurality of key generation elements, and respectively generating corresponding public keys for each private key by using the encryption algorithm;
step S20: storing the public key in an information storage area of a key block chain block;
step S30: setting a signature verification mode for the key block chain access, wherein the signature verification mode for the key block chain access comprises the number of the private keys and the combination of the private keys;
step S40: performing signature verification on the key block chain according to the setting;
step S50: judging whether the signature verification passes, if so, executing the step S60, otherwise, rejecting and ending;
step S60: obtaining the authority of an original private key for accessing the target block chain to access the target block chain through a VPN channel;
step S70: and establishing the VPN channel connection to access the target block chain.
2. The blockchain signature verification method according to claim 1, wherein the key generation element includes any one or more of a string of characters without a fixed length limit stored on a physical medium, biometric information of a user's individual, biometric information of one or more other persons specified by the user, and specific data information held by an organization to which the user has committed.
3. The method of claim 1, wherein the encryption algorithm is an irreversible encryption algorithm.
4. The blockchain signature verification method of claim 1, further comprising setting a validity period of the private key and the public key, and prompting a user to regenerate the private key and the public key when the validity period is exceeded.
5. The method of claim 1, wherein the blocks of the key blockchain include information storage areas for a plurality of users.
6. The method of any one of claims 1, 4 and 5, wherein the information storage area of the key blockchain block stores the public key, an original private key of a target blockchain, a setting of a signature verification mode accessed by the key blockchain, and a validity period setting of the private key and the public key.
7. The method of claim 1, wherein the key blockchain includes a key chain signature verification processing module.
8. The blockchain signature verification method of claim 7, wherein the keychain signature verification processing module is configured to perform signature verification according to the setting for accessing the keychain.
9. A blockchain signature verification device, comprising a memory module and a processor module, wherein the memory module stores thereon a blockchain signature verification program operable on the processor module, and wherein the blockchain signature verification program, when executed by the processor module, implements the steps of the blockchain signature verification method according to any one of claims 1 to 8.
10. A storage medium, characterized in that the storage medium is a computer-readable storage medium having stored thereon a block chain signature verification program executable by one or more processor modules to implement the steps of the block chain signature verification method as claimed in any one of claims 1 to 8.
CN202010221268.3A 2020-03-26 2020-03-26 Block chain signature verification method and device and storage medium Active CN111447070B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010221268.3A CN111447070B (en) 2020-03-26 2020-03-26 Block chain signature verification method and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010221268.3A CN111447070B (en) 2020-03-26 2020-03-26 Block chain signature verification method and device and storage medium

Publications (2)

Publication Number Publication Date
CN111447070A true CN111447070A (en) 2020-07-24
CN111447070B CN111447070B (en) 2023-04-07

Family

ID=71650716

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010221268.3A Active CN111447070B (en) 2020-03-26 2020-03-26 Block chain signature verification method and device and storage medium

Country Status (1)

Country Link
CN (1) CN111447070B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111988147A (en) * 2020-08-20 2020-11-24 上海万向区块链股份公司 Combined signature and signature verification method, system and storage medium
CN112613889A (en) * 2020-12-25 2021-04-06 上海万向区块链股份公司 Privacy protection method and system for enterprise DID identity system
CN114221791A (en) * 2021-11-19 2022-03-22 建信金融科技有限责任公司 Data processing method, device, equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540669A (en) * 2008-03-20 2009-09-23 深圳市奥联科技有限公司 Method for distributing keys and protecting information for wireless mobile communication network
CN107566117A (en) * 2017-07-14 2018-01-09 浙商银行股份有限公司 A kind of block chain key management system and method
CN108235806A (en) * 2017-12-28 2018-06-29 深圳达闼科技控股有限公司 Method, device and system for safely accessing block chain, storage medium and electronic equipment
US20190036692A1 (en) * 2016-07-29 2019-01-31 Trusted Key Solutions Inc. System and method for generating a recovery key and managing credentials using a smart blockchain contract
CN109617699A (en) * 2019-01-16 2019-04-12 北京沃东天骏信息技术有限公司 A kind of key generation method, block chain network service platform and storage medium
CN109862006A (en) * 2019-01-29 2019-06-07 济南浪潮高新科技投资发展有限公司 A kind of block catenary system cut-in method, apparatus and system
CN110048851A (en) * 2019-03-26 2019-07-23 阿里巴巴集团控股有限公司 The method and device of multilayer linkable ring signature is generated and verified in block chain
CN110601853A (en) * 2019-09-17 2019-12-20 腾讯科技(深圳)有限公司 Block chain private key generation method and equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540669A (en) * 2008-03-20 2009-09-23 深圳市奥联科技有限公司 Method for distributing keys and protecting information for wireless mobile communication network
US20190036692A1 (en) * 2016-07-29 2019-01-31 Trusted Key Solutions Inc. System and method for generating a recovery key and managing credentials using a smart blockchain contract
CN107566117A (en) * 2017-07-14 2018-01-09 浙商银行股份有限公司 A kind of block chain key management system and method
CN108235806A (en) * 2017-12-28 2018-06-29 深圳达闼科技控股有限公司 Method, device and system for safely accessing block chain, storage medium and electronic equipment
CN109617699A (en) * 2019-01-16 2019-04-12 北京沃东天骏信息技术有限公司 A kind of key generation method, block chain network service platform and storage medium
CN109862006A (en) * 2019-01-29 2019-06-07 济南浪潮高新科技投资发展有限公司 A kind of block catenary system cut-in method, apparatus and system
CN110048851A (en) * 2019-03-26 2019-07-23 阿里巴巴集团控股有限公司 The method and device of multilayer linkable ring signature is generated and verified in block chain
CN110601853A (en) * 2019-09-17 2019-12-20 腾讯科技(深圳)有限公司 Block chain private key generation method and equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
周健;孙丽艳;: "区块链钱包保护协议研究" *
张昊迪;刘国荣;汪来富;王帅;: "基于区块链技术的跨域身份认证机制研究" *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111988147A (en) * 2020-08-20 2020-11-24 上海万向区块链股份公司 Combined signature and signature verification method, system and storage medium
CN112613889A (en) * 2020-12-25 2021-04-06 上海万向区块链股份公司 Privacy protection method and system for enterprise DID identity system
CN112613889B (en) * 2020-12-25 2023-05-05 上海万向区块链股份公司 Privacy protection method and system for DID identity system of enterprise
CN114221791A (en) * 2021-11-19 2022-03-22 建信金融科技有限责任公司 Data processing method, device, equipment and storage medium
CN114221791B (en) * 2021-11-19 2023-06-23 建信金融科技有限责任公司 Data processing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN111447070B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN111447070B (en) Block chain signature verification method and device and storage medium
EP3440823B1 (en) Method and system for managing personal information within independent computer systems and digital networks
US7461399B2 (en) PIN recovery in a smart card
US11003760B2 (en) User account recovery techniques using secret sharing scheme with trusted referee
US8620882B2 (en) Tokenization of multiple-field records
WO2020042713A1 (en) Document authentication method, device, equipment and readable medium
JP6524899B2 (en) Secret data matching device, secret data matching program, and secret data matching method
CN112560067A (en) Access method, device and equipment based on token authority verification and storage medium
US20210026942A1 (en) Securing electronic documents with fingerprint/biometric data
CN108171486A (en) It is a kind of that there is the terminal of E-seal
CN108171029A (en) Intelligent and safe chip
CN102289613A (en) Liquid crystal universal serial bus (USB) Key equipment capable of identifying fingerprint
CN108776887A (en) A kind of method, apparatus, equipment and the readable medium of operation electronic signature
Nath et al. Issues and challenges in two factor authentication algorithms
CN105590044A (en) Information authentication method and apparatus
JP5986653B2 (en) Biometric authentication platform system, biometric authentication information management apparatus, biometric authentication information management method, and biometric authentication information management program
CN116561737A (en) Password validity detection method based on user behavior base line and related equipment thereof
WO2023172352A1 (en) Systems and methods for monitoring decentralized data storage
CN111464294B (en) Block chain data extraction method, device and storage medium
TW202312058A (en) Decentralized zero-trust identity verification-authentication system and method
CN111882425B (en) Service data processing method, device and server
US20120234923A1 (en) Method and/or device for managing authentication data
CN102457484A (en) Method for checking user information by combining user name/password authentication and check code
US11973872B2 (en) Data security solution using randomized 3-axis data shapes and tokenized data element placement of encrypted and non-encrypted data
US20220337415A1 (en) Data Security Solution Using Randomized 3-Axis Data Shapes and Tokenized Data Element Placement of Encrypted and Non-Encrypted Data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant