CN111464294B - Block chain data extraction method, device and storage medium - Google Patents

Block chain data extraction method, device and storage medium Download PDF

Info

Publication number
CN111464294B
CN111464294B CN202010221266.4A CN202010221266A CN111464294B CN 111464294 B CN111464294 B CN 111464294B CN 202010221266 A CN202010221266 A CN 202010221266A CN 111464294 B CN111464294 B CN 111464294B
Authority
CN
China
Prior art keywords
blockchain
key
private key
target
data extraction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010221266.4A
Other languages
Chinese (zh)
Other versions
CN111464294A (en
Inventor
蒋忠强
欧光峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiang Ruicheng
Original Assignee
Shenzhen Chuangke Blockchain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Chuangke Blockchain Technology Co ltd filed Critical Shenzhen Chuangke Blockchain Technology Co ltd
Priority to CN202010221266.4A priority Critical patent/CN111464294B/en
Publication of CN111464294A publication Critical patent/CN111464294A/en
Application granted granted Critical
Publication of CN111464294B publication Critical patent/CN111464294B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a block chain data extraction method, which comprises the following steps: judging whether the original private key of the target blockchain to be accessed is backed up in the key blockchain; completing backup operation of an original private key of the target blockchain and access setting of the key blockchain; accessing the key blockchain according to the access setting of the key blockchain; obtaining the authority of calling operation on the original private key of the target blockchain in the key blockchain, and simultaneously obtaining the authority of establishing VPN channel connection for accessing the target blockchain; establishing a VPN channel connection accessing the target blockchain and calling the original private key to access the target blockchain. According to the technical scheme provided by the invention, the safety protection of target blockchain data extraction is realized, so that the blockchain data can be safely extracted under the condition that a secret key is lost or stolen, and the safety and reliability of the blockchain are improved.

Description

Block chain data extraction method, device and storage medium
Technical Field
The present invention relates to the field of blockchain data extraction technologies, and in particular, to a blockchain data extraction method, device and storage medium.
Background
In the existing blockchain technology, a user holds a secret key to realize access to the blockchain owned by the user, and in some cases, such as long-term loss/missing of the user, memory loss due to illness or accident, sudden death or in other unexpected cases, the secret key of the user is always lost and cannot be retrieved; or the secret key is stolen by a thief or the secret key is handed out under duress, the thief or the duress can use the secret key to access the blockchain at any time, and loss is caused to the user. In existing blockchain technology, a user cannot immediately modify a key even if the user knows that the key is stolen, but can only transfer valuable encrypted information to another account as soon as possible, and this process usually requires considerable expense, and others may rob to transfer the valuable encrypted information in front of the user. Therefore, a safe and reliable method is needed to be found, the problems that the key of the blockchain user is lost and stolen under the condition are solved, the extraction of the blockchain data is ensured, and the safe, stable and reliable use and operation of the blockchain are further ensured.
Disclosure of Invention
The invention provides a method, a device and a storage medium for extracting blockchain data, which realize the safety protection of the blockchain data extraction, so that the blockchain can safely extract the blockchain data under the condition that a secret key is lost or stolen, and the safety and the reliability of the blockchain are improved.
The invention provides a block chain data extraction method, which comprises the following steps:
step S10: judging whether the original private key of the target blockchain to be accessed is backed up in the key blockchain; when the backup is not completed, step S20 is performed; otherwise, executing step S30;
step S20: completing backup operation of an original private key of the target blockchain and access setting of the key blockchain;
step S30: accessing the key blockchain according to the access setting of the key blockchain;
step S40: obtaining the authority of calling operation on the original private key of the target blockchain in the key blockchain, and simultaneously obtaining the authority of establishing VPN channel connection for accessing the target blockchain;
step S50: establishing a VPN channel connection accessing the target blockchain and calling the original private key to access the target blockchain.
Further, the step S20 includes:
step S210: reminding a user to carry out original private key backup of the target block chain;
step S220: judging whether the user agrees with the backup, executing step S230 when the user agrees, otherwise, ending;
step S230: the user is prompted to generate a private key using an encryption algorithm using a key generation element to access the key blockchain, and a public key is generated using an encryption algorithm based on the private key.
Further, the key generation element includes any one or combination of a human body biometric feature, specific character information preset by a user, and specific data information of a third party authority.
Further, the step S20 further includes:
step S240: setting validity periods of the private key and the public key and an access mode of the key blockchain, wherein the access mode comprises the private key or the combination of the private keys;
step S250: storing the public key, the original private key of the target blockchain, the validity periods of the private key and the public key and the access mode to an information storage area of the key blockchain block.
Further, the original private key of the target blockchain in the information storage area of the key blockchain block can not be deleted, changed and read out, the original private key of the target blockchain can only be called, and signature verification is performed on the target blockchain through a VPN channel.
Further, the step S30 further includes:
step S310: judging whether the validity period is expired, executing step S320 when the validity period is expired, otherwise executing step S20;
step S320: receiving a private key or a combination of private keys provided by a user;
step S330, signature verification of the access of the key blockchain is performed on the private key or the combination of private keys;
step S340: and judging whether the signature verification is passed or not, if so, executing the step S40, and if not, ending.
Further, when the original private key of the target blockchain is finished backing up in the key blockchain, blocking and prohibiting access to the target blockchain using the private key of the target blockchain.
Further, the key blockchain is a newly constructed key blockchain of the blockchain data extraction method, the key blockchain is used for storing an original private key of a target blockchain, and a user invokes the original private key of the target blockchain according to a preset mode.
In order to achieve the above object, the present invention further provides a blockchain data extraction device, where the blockchain data extraction device includes a memory module and a processor module, and the memory module stores a blockchain data extraction program that can run on the processor module, and the blockchain data extraction program implements the steps of the blockchain data extraction method when executed by the processor module.
In addition, in order to achieve the above object, the present invention further provides a storage medium, which is a computer readable storage medium, and the storage medium stores a blockchain data extraction program thereon, where the blockchain data extraction program is executable by one or more processor modules to implement the steps of the blockchain data extraction method.
According to the blockchain data extraction method, the device and the storage medium, the original private key of the accessed target blockchain and the access control of the key blockchain are backed up, so that the safety protection of the extraction of the target blockchain data is realized, the blockchain data can be safely extracted under the condition that the key is lost or stolen, and the safety and the reliability of the blockchain are improved.
Drawings
FIG. 1 is a flowchart illustrating a block chain data extraction method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of step S20 in fig. 1;
FIG. 3 is a flowchart illustrating step S30 in FIG. 1;
FIG. 4 is a schematic diagram illustrating an internal structure of a block chain data extraction device according to an embodiment of the present invention;
FIG. 5 is a block chain data extraction program module of a block chain data extraction device according to an embodiment of the invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the prior art, when a user accesses a target blockchain, the user needs to provide an original private key of the target blockchain, and the original private key of the target blockchain is compared with an original public key stored in the target blockchain to verify, so that the user obtains the access to the target blockchain after verification. The invention provides a blockchain extraction method, which is to backup an original private key of a target blockchain to an information storage area of a key blockchain block and realize access and data extraction of the target blockchain through access control of the key blockchain, specifically referring to fig. 1, fig. 1 is a flow diagram of a blockchain data extraction method provided by an embodiment of the invention, and the method comprises the following steps:
step S10: judging whether the original private key of the target blockchain to be accessed is backed up in the key blockchain; when the backup is not completed, step S20 is performed; otherwise, executing step S30;
step S20: completing backup operation of an original private key of the target blockchain and access setting of the key blockchain;
step S30: accessing the key blockchain according to the access setting of the key blockchain;
step S40: obtaining the authority of calling operation on the original private key of the target blockchain in the key blockchain, and simultaneously obtaining the authority of establishing VPN channel connection for accessing the target blockchain;
step S50: establishing a VPN channel connection accessing the target blockchain and calling the original private key to access the target blockchain.
Referring to fig. 2, the step S20 includes:
step S210: reminding a user of carrying out original private key backup of the target blockchain.
Step S220: and judging whether the user agrees with the backup, executing step S230 when the user agrees, and ending the process if not.
Step S230: prompting a user to generate a private key accessing the key blockchain by using a key generation element by using an encryption algorithm, and generating a public key by using the encryption algorithm based on the private key; the key generation element comprises any one or combination of human body biological characteristics, specific character information preset by a user and specific data information of a third party mechanism. In particular, in an embodiment, the human body biometric means a human body biometric of a user's own individual, such as a fingerprint, a toe mark, a facial feature, as a key generation element, or specific character information preset by the user is used as a key generation element. Alternatively, the user may designate a third party, such as a family or friend, with the human body biometric of the third party as the key generation element; it is also possible to delegate a third party organization, such as a notarization agency, a public security, a judicial department, to use specific data information as key generating elements, such as digital certificates of the notarization agency, public security, names, addresses, contact information, etc. specified by the judicial department as specific data information as specified key generating elements.
Specifically, in an embodiment, the key generating element includes a first key generating element, a second key generating element, a third key generating element and a fourth key generating element, where the first key generating element is a string of characters stored on a physical medium, for example, a string of characters stored on a U disc, a string of characters stored on a hard disc of a computer, a string of characters stored on a paper, and a string of other characters such as a mobile phone number and an electronic mailbox, a first private key is generated on the first key generating element by using an irreversible encryption algorithm, and a first public key is generated on the basis of the first private key by using an encryption algorithm. The user only needs to remember the used character string and algorithm type, the user does not need to record or save the private key, and the same private key can still be temporarily generated when the user needs to use the private key for signature verification.
Likewise, the second key generating element is biometric information of the user's individual, such as a fingerprint, toe, retina, voiceprint, iris, and other facial features, and a second private key is generated using an irreversible encryption algorithm for the second key generating element, and a second public key is generated using an encryption algorithm based on the second private key. The third key generation element generates a third private key for the biometric information of one or more other people specified by the user by using an irreversible encryption algorithm, and generates a third public key by using an encryption algorithm based on the third private key. The fourth key generation element is specific data information held by an organization entrusted by a user, such as public security, notarization, judicial and arbitration organization entrusted by the user, the organization can be used as a final specific data information holder, the specific data information held by the organization comprises basic information such as an organization digital certificate, a company name, time and place information and the like, the fourth key generation element is used for generating a fourth private key by using an irreversible encryption algorithm, and the encryption algorithm is used for generating a fourth public key based on the fourth private key. The user, other people or entrusted organization only needs to remember the used key generation element and algorithm type, does not need to record or store the private key, and can still temporarily generate the same private key when the private key is needed to be used for signature verification. This avoids security problems associated with recording complex keys.
Step S240: setting validity periods of the private key and the public key and an access mode of the key blockchain, wherein the access mode comprises the private key or the combination of the private keys. In an embodiment, the validity period of the private key and the public key is set to be three months, and when the validity period exceeds three months, the private key and the public key are invalid, and the private key and the public key are required to be regenerated by a user, so that the use safety of the private key can be ensured.
Step S250: storing the public key, the original private key of the target blockchain, the validity periods of the private key and the public key and the access mode to an information storage area of the key blockchain block. The original private key of the target blockchain in the information storage area of the key blockchain block can not be deleted, changed and read out, the original private key of the target blockchain can only be called, and signature verification is carried out on the target blockchain through a VPN channel. The key blockchain is a newly constructed key blockchain of the blockchain data extraction method, the key blockchain is used for storing an original private key of a target blockchain, and a user invokes the original private key of the target blockchain according to a preset mode.
When the original private key of the target blockchain is completely backed up in the key blockchain, blocking and prohibiting access to the target blockchain using the private key of the target blockchain. Specifically, after the original private key of the target blockchain is stolen, the target blockchain still cannot be accessed by a stealer by using the original private key, so that the safety and the reliability of the blockchain are improved.
Referring to fig. 3, the step S30 further includes:
step S310: judging whether the validity period is expired, executing step S320 when the validity period is expired, otherwise executing step S20;
step S320: receiving a private key or a combination of private keys provided by a user;
step S330, signature verification of the access of the key blockchain is performed on the private key or the combination of private keys;
step S340: and judging whether the signature verification is passed or not, if so, executing the step S40, and if not, ending.
Specifically, setting an access mode to the key blockchain, wherein the access mode comprises a private key or a combination of private keys used; specifically, the following settings are exemplified in the present embodiment: the user sets an access mode of the key block chain to use two private keys, and under normal conditions, a first private key and a second private key are used; when an unexpected situation occurs, such as death or memory loss of the user, the second private key and the third private key are used; the third private key and the fourth private key are used when the user's personal biometric is unavailable. While taking into account that the individual's biometric characteristics change slightly with age or that injury sometimes leads to possible information errors, it is possible to generate a different private key, although with the same algorithm. To prevent this, it is necessary to secure or enhance the stability of the underlying data; such as periodic (e.g., three months) re-entry of biometric information or resetting; or in biological characteristics, only the iris with highest stability is collected to complete basic data; or in the most extreme case, the use of biometric information in the key combination is not considered. In other embodiments, it may be provided that access to the key blockchain is achieved using only the first private key, or that access to the key blockchain is achieved using a combination of a plurality of private keys.
In particular, in some extreme cases, such as where keys are lost, stolen, the use of different private keys or settings of private key combinations ensures that the data extraction to the blockchain can be securely implemented. In particular, in an embodiment, after a disaster, a user becomes a plant person, since he prepares in advance, the original private key of a target blockchain is backed up in the key blockchain, the biological characteristics of a certain family are taken as key generation elements to generate a fifth private key, and a notarization mechanism is entrusted with the fifth private key, the notarization mechanism uses specific data information to generate a sixth private key, and when the accident occurs, the combination of the fifth private key and the sixth private key is taken as an access mode of the key blockchain, and the authority of calling operation on the original private key of the target blockchain in the key blockchain is obtained through completing access of the key blockchain, and the authority of establishing VPN channel connection for accessing the target blockchain is obtained; further, establishing a VPN channel connection accessing the target blockchain and calling the original private key to access the target blockchain, so as to successfully realize extraction of blockchain data. In another embodiment, the original private key of the target blockchain of the user is stolen, even if the original private key of the target blockchain is obtained by a stealer, the stealer cannot access the target blockchain by using the stolen original private key or obtain the VPN channel authority and the access authority of the target blockchain, and cannot extract the data of the target blockchain, so that the protection purpose of preventing the original private key of the blockchain from being stolen is achieved, and the safety and the reliability of the blockchain are improved.
In addition, the invention also provides a block chain data extraction device.
Referring to fig. 4, an internal structure diagram of a blockchain signature verification device according to an embodiment of the invention is shown, where the blockchain signature verification device at least includes a memory module 11, a processor module 12, a communication bus 13, and a network interface 14. Preferably, the blockchain signature verification apparatus includes a set of one or more cloud computing devices or computer devices present on a computer network.
The memory module 11 includes at least one type of readable storage medium, including flash memory, a hard disk, a multimedia card, a card-type memory module (e.g., SD or DX memory module, etc.), a magnetic memory module, a magnetic disk, an optical disk, etc. The memory module 11 may in some embodiments be an internal memory unit of a blockchain signature verification device, such as a hard disk of the blockchain signature verification device. The memory module 11 may also be an external storage device of the blockchain signature verification device in other embodiments, such as a plug-in hard disk, smart Media Card (SMC), secure Digital (SD) Card, flash memory Card (Flash Card) or the like. Further, the memory module 11 may also include both an internal memory unit and an external memory device of the blockchain signature verification device, and preferably, the memory module 11 may also be a network storage device or a cloud storage device existing in a computer network. The memory module 11 may be used not only for storing application software installed in the blockchain signature verification device and various types of data, such as codes of blockchain signature verification programs, but also for temporarily storing data that has been output or is to be output.
The processor module 12 may in some embodiments be a central processor module (Central Processing Unit, CPU), a controller, microcontroller, microprocessor module or other data processing chip, or any other computing device for executing program code stored in the memory module 11, or processing data, such as executing a blockchain signature verification program, or the like.
The communication bus 13 is any communication means for enabling connected communication between these components.
The network interface 14 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), and is typically used to establish a communication connection between the blockchain signature verification device and other electronic devices.
Optionally, the blockchain data extraction device may further comprise a user interface, which may comprise a Display (Display), an input unit such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch, or the like. The display may also be referred to as a display screen or display unit, as appropriate, for displaying information processed in the blockchain data extraction device and for displaying a visual user interface.
Fig. 4 illustrates only a blockchain signature verification device having components 11-14 and a blockchain signature verification procedure, and those skilled in the art will appreciate that the structure illustrated in fig. 4 is not limiting of the blockchain signature verification device and may include fewer or more components than illustrated, or may combine certain components, or may be a different arrangement of components, or may be a set of one or more computer devices or cloud computing devices in a computer network.
In the embodiment of the blockchain data extraction device shown in fig. 4, the memory module 11 stores a blockchain data extraction program; the processor module 12 performs the following steps when executing the blockchain data extraction program stored in the memory module 11:
step S10: judging whether the original private key of the target blockchain to be accessed is backed up in the key blockchain; when the backup is not completed, step S20 is performed; otherwise, executing step S30;
step S20: completing backup operation of an original private key of the target blockchain and access setting of the key blockchain;
step S30: accessing the key blockchain according to the access setting of the key blockchain;
step S40: obtaining the authority of calling operation on the original private key of the target blockchain in the key blockchain, and simultaneously obtaining the authority of establishing VPN channel connection for accessing the target blockchain;
step S50: establishing a VPN channel connection accessing the target blockchain and calling the original private key to access the target blockchain.
Referring to fig. 5, a program module diagram of a blockchain data extraction procedure in an embodiment of the blockchain data extraction device of the present invention is shown, where the blockchain data extraction procedure may be divided into a backup module 10, a storage module 20, a calculation module 30, a setting module 40 and a verification module 50, and the exemplary steps are as follows:
the backup module 10 is used for executing the reminding and backup tasks of the backup of the user key;
a storage module 20 for performing storage tasks for the user's keys, private keys, public keys and settings;
a calculation module 30 for performing a calculation task of generating a private key and a public key by an encryption algorithm;
a setting module 40, configured to perform a task of setting the private key and the public key;
the verification module 50 is configured to perform a task of comparing the private key with the public key.
The functions or operation steps implemented when the program modules such as the backup module 10, the storage module 20, the calculation module 30, the setting module 40, and the verification module 50 are executed are substantially the same as those of the foregoing embodiments, and will not be described herein.
In addition, an embodiment of the present invention further provides a storage medium, where the storage medium is a computer readable storage medium, and the storage medium stores a blockchain data extraction program, where the blockchain data extraction program may be executed by one or more processor modules to implement the following operations:
step S10: judging whether the original private key of the target blockchain to be accessed is backed up in the key blockchain; when the backup is not completed, step S20 is performed; otherwise, executing step S30;
step S20: completing backup operation of an original private key of the target blockchain and access setting of the key blockchain;
step S30: accessing the key blockchain according to the access setting of the key blockchain;
step S40: obtaining the authority of calling operation on the original private key of the target blockchain in the key blockchain, and simultaneously obtaining the authority of establishing VPN channel connection for accessing the target blockchain;
step S50: establishing a VPN channel connection accessing the target blockchain and calling the original private key to access the target blockchain.
The storage medium embodiments of the present invention are substantially the same as the above-described blockchain data extraction method and apparatus embodiments, and are not described here in detail.
Compared with the prior art, the method, the device and the storage medium for extracting the blockchain data realize the safety protection of the blockchain data extraction through the backup of the secret key of the user and the setting of the public key of the private key, so that the blockchain data can be safely extracted under the condition that the secret key is lost or stolen, and the safety and the reliability of the blockchain are improved.
It should be noted that, the foregoing reference numerals of the embodiments of the present invention are merely for describing the embodiments, and do not represent the advantages and disadvantages of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of other like elements in a process, apparatus, article or method that comprises the element.
From the description of the embodiments above, it will be apparent to those skilled in the art that the above-described example methods may be implemented by means of software plus a necessary general purpose computer network hardware platform. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium as described above (e.g. ROM/RAM, magnetic disk, optical disk), comprising several instructions for causing a terminal device (which may be a drone, a mobile phone, a computer, a server, or a network device, etc.) of a computer network to perform the method according to the embodiments of the present invention.
Note that the above is only a preferred embodiment of the present invention and the technical principle applied. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, while the invention has been described in connection with the above embodiments, the invention is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit or scope of the invention, which is set forth in the following claims.

Claims (8)

1. A method of extracting blockchain data, the method comprising:
step S10: judging whether the original private key of the target blockchain to be accessed is backed up in the key blockchain; when the backup is not completed, step S20 is performed; otherwise, executing step S30;
step S20: completing backup operation of an original private key of the target blockchain and access setting of the key blockchain; specifically, step S210: reminding a user to carry out original private key backup of the target block chain; step S220: judging whether the user agrees with the backup, executing step S230 when the user agrees, otherwise, ending; step S230: prompting a user to generate a private key accessing the key blockchain by using a key generation element by using an encryption algorithm, and generating a public key by using the encryption algorithm based on the private key; step S240: setting validity periods of the private key and the public key and an access mode of the key blockchain, wherein the access mode comprises the private key or the combination of the private keys; step S250: storing the public key, the original private key of the target blockchain, the validity periods of the private key and the public key and the access mode to an information storage area of the key blockchain block;
step S30: accessing the key blockchain according to the access setting of the key blockchain;
step S40: obtaining the authority of calling operation on the original private key of the target blockchain in the key blockchain, and simultaneously obtaining the authority of establishing VPN channel connection for accessing the target blockchain;
step S50: establishing a VPN channel connection accessing the target blockchain and calling the original private key to access the target blockchain.
2. The method of claim 1, wherein the key generation element includes any one or combination of a human body biometric feature, specific character information preset by a user, and specific data information of a third party authority.
3. The blockchain data extraction method of claim 1, wherein an original private key of the target blockchain in the information storage area of the key blockchain block is not deletable, altered, and readable, the original private key of the target blockchain is only callable, and signature verification is performed on the target blockchain through a VPN tunnel.
4. The blockchain data extraction method of claim 1, wherein the step S30 further includes:
step S310: judging whether the validity period is expired, executing step S320 when the validity period is expired, otherwise executing step S20;
step S320: receiving a private key or a combination of private keys provided by a user;
step S330, signature verification of the access of the key blockchain is performed on the private key or the combination of private keys;
step S340: and judging whether the signature verification is passed or not, if so, executing the step S40, and if not, ending.
5. The blockchain data extraction method of claim 1, wherein access to the target blockchain using the private key of the target blockchain is blocked and prohibited when the original private key of the target blockchain is finished backing up in the keyblockchain.
6. The blockchain data extraction method of claim 1, wherein the keyblockchain is a newly constructed keyblockchain of the blockchain data extraction method, the keyblockchain is used for storing an original private key of a target blockchain, and a user invokes the original private key of the target blockchain according to a preset mode.
7. A blockchain data extraction device, characterized in that it comprises a memory module and a processor module, the memory module having stored thereon a blockchain data extraction program executable on the processor module, the blockchain data extraction program when executed by the processor module implementing the steps of the blockchain data extraction method according to any of claims 1 to 6.
8. A storage medium, characterized in that the storage medium is a computer readable storage medium, on which a blockchain data extraction program is stored, the blockchain data extraction program being executable by one or more processor modules to implement the steps of the blockchain data extraction method according to any of claims 1 to 6.
CN202010221266.4A 2020-03-26 2020-03-26 Block chain data extraction method, device and storage medium Active CN111464294B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010221266.4A CN111464294B (en) 2020-03-26 2020-03-26 Block chain data extraction method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010221266.4A CN111464294B (en) 2020-03-26 2020-03-26 Block chain data extraction method, device and storage medium

Publications (2)

Publication Number Publication Date
CN111464294A CN111464294A (en) 2020-07-28
CN111464294B true CN111464294B (en) 2023-07-07

Family

ID=71683274

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010221266.4A Active CN111464294B (en) 2020-03-26 2020-03-26 Block chain data extraction method, device and storage medium

Country Status (1)

Country Link
CN (1) CN111464294B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110086612A (en) * 2019-04-26 2019-08-02 山大地纬软件股份有限公司 A kind of public and private key backup of block chain and lose method for retrieving and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110086612A (en) * 2019-04-26 2019-08-02 山大地纬软件股份有限公司 A kind of public and private key backup of block chain and lose method for retrieving and system

Also Published As

Publication number Publication date
CN111464294A (en) 2020-07-28

Similar Documents

Publication Publication Date Title
US20210286870A1 (en) Step-Up Authentication
CN105279449B (en) Data access control method, system and mobile equipment based on context
KR101705472B1 (en) Pluggable authentication mechanism for mobile device applications
CN110795501A (en) Method, device, equipment and system for creating verifiable statement based on block chain
US9104888B2 (en) Secure data storage
Mayron Biometric authentication on mobile devices
US20080010453A1 (en) Method and apparatus for one time password access to portable credential entry and memory storage devices
EP2278525A2 (en) Authorization method providing hints to the parts forming the authorization code
CN111447070B (en) Block chain signature verification method and device and storage medium
US20200193420A1 (en) Data management systems and methods
KR20140042905A (en) Identity authentication and management device and method thereof
Schlöglhofer et al. Secure and usable authentication on mobile devices
CN113472774B (en) Account login-free method, system, device and computer readable storage medium
US20130305324A1 (en) Incremental Password Barriers to Prevent Malevolent Intrusions
CN109801071B (en) Password resetting method and device
JP6946031B2 (en) IC card and IC card control method
CN110402440B (en) Segmented key authentication system
CN107862192B (en) Login interface unlocking method and device, computer equipment and storage medium
CN111464294B (en) Block chain data extraction method, device and storage medium
JP2001117661A (en) Portable information terminal equipment and program recording medium for the same
US20180150621A1 (en) Provision of at least one password
US11973872B2 (en) Data security solution using randomized 3-axis data shapes and tokenized data element placement of encrypted and non-encrypted data
JP3935712B2 (en) Client device, PIN lock release device, and PIN lock release method
CN111538781B (en) Block chain cross-chain key secure access method, device and storage medium
JP2021002084A (en) Authentication system, authentication method, and authentication program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Jiang Ruicheng

Inventor before: Jiang Zhongqiang

Inventor before: Ou Guangfeng

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230904

Address after: 804, Xihaiwan Garden Single Apartment, No. 84 Nanshang Road, Nanshan District, Shenzhen, Guangdong Province, 518000

Patentee after: Jiang Ruicheng

Address before: 518000 unit F, 3rd floor, building r3-b, Virtual University Park, Keyuan Avenue, Yuehai street, Nanshan District, Shenzhen, Guangdong

Patentee before: Shenzhen Chuangke blockchain Technology Co.,Ltd.