CN112465635A - Block chain public encryption algorithm processing method, block chain wallet and storage medium - Google Patents
Block chain public encryption algorithm processing method, block chain wallet and storage medium Download PDFInfo
- Publication number
- CN112465635A CN112465635A CN201910848829.XA CN201910848829A CN112465635A CN 112465635 A CN112465635 A CN 112465635A CN 201910848829 A CN201910848829 A CN 201910848829A CN 112465635 A CN112465635 A CN 112465635A
- Authority
- CN
- China
- Prior art keywords
- encryption algorithm
- user
- public key
- wallet
- key encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Economics (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Data Mining & Analysis (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention provides a processing method of a public encryption algorithm of a block chain, a block chain wallet and a storage medium. The main working flow of the invention is as follows: calling out a wallet when a transaction occurs, and searching a public key encryption algorithm available in the whole network by the wallet; the wallet displays an available public key encryption algorithm identifier to a user so that the user can select the public key encryption algorithm identifier according to the actual requirement of the user; after the user finishes the selection, the public key encryption algorithm selected by the user and the address index of the public key encryption algorithm are confirmed according to the identification; after the confirmation is finished, realizing one-to-one correspondence, and then generating a private key by using a selected public key encryption algorithm; according to the generated user private key, assisting the user to complete the signature operation of the transaction data; finally, verification is carried out, the characteristics of the block chain are deeply combined, the public key encryption algorithm can be changed, the butt joint with the public key algorithms in other scenes can be completed, and the compatibility is improved.
Description
Technical Field
The invention relates to a processing method of a public encryption algorithm of a block chain, a block chain wallet and a storage medium, and belongs to the technical field of block chains.
Background
The block chain technology is a decentralized distributed internet database, and is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. In a block chain, in order to ensure that data cannot be tampered in the whole system and ensure the identities of both parties of a transaction are true and reliable, and the like, signature authentication needs to be performed on transaction data. Most of the block chain signatures use a public key encryption algorithm to generate a public key and further generate a private key.
The block chain technology is a decentralized distributed internet database, and is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like.
At present, most block chains adopt a public key encryption algorithm to generate a public key and a private key, the public key is used for encrypting a transaction to obtain a transaction ciphertext, and the private key is used for decrypting the transaction ciphertext to perform signature verification on the transaction when the transaction is performed. However, most of the existing block chains only support a public key encryption algorithm (such as the SECP256K1 algorithm), and once the encryption algorithm is determined, the encryption algorithm cannot be changed unless the change is made through incompatible upgrade, that is, the operation of changing the encryption algorithm cannot be performed without affecting the user experience.
Because the block chain cannot change the public key encryption algorithm, if a safer and more efficient encryption algorithm occurs, the existing block chain cannot perform seamless upgrade operation. Moreover, the public key encryption algorithm required by some existing industries or scenes is not consistent with the encryption algorithm used by the blockchain, and related processing such as signature of transaction data by using an effective public key and a valid private key cannot be performed, so that the blockchain is difficult to be combined with the public key and the private key, and the advantages of the blockchain in the industries and scenes are difficult to be exerted. Therefore, the problem that the transaction data is signed by using only a single fixed public key encryption algorithm in the block chain and the public key encryption algorithm cannot be changed is a problem to be solved urgently.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, an object of the present invention is to provide a method for processing a blockchain public encryption algorithm, a blockchain wallet, and a storage medium, which are used to solve the problem in the prior art that if a safer and more efficient encryption algorithm is found, the existing blockchain cannot be seamlessly upgraded because the blockchain cannot change the public key encryption algorithm. And the public key encryption algorithm required by some existing industries or scenes is not consistent with the encryption algorithm used by the blockchain, and related processing such as signature of transaction data can not be performed by using an effective public key and a private key, so that the blockchain is difficult to be combined with the public key and the private key, and the advantages of the blockchain in the industries and scenes are difficult to be exerted.
The invention provides a block chain public encryption algorithm processing method which comprises the following steps:
calling out a wallet when a transaction occurs, and carrying out whole-network retrieval;
the wallet provides the user with a choice;
generating a private key;
completing the signature operation;
and performing uplink verification.
A blockchain wallet comprising:
an algorithm storage module: for storing a public key encryption algorithm;
a transaction data generation module: the system is used for confirming the public key encryption algorithm selected by the user and the address index thereof according to the identification, realizing one-to-one correspondence after the confirmation is finished, and then generating a private key by using the selected public key encryption algorithm;
a signature module: according to the generated user private key, assisting the user to complete the signature operation of the transaction data;
an uploading module: interacting with a blockchain network.
A storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of a blockchain wallet as described above.
An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the steps of a blockchain wallet as described above being implemented when the processor executes the program.
As described above, the blockchain public encryption algorithm processing method, the blockchain wallet and the storage medium of the present invention have the following advantages:
the invention deeply combines the characteristics of the block chain, builds a new design of a block chain public encryption algorithm processing mechanism, achieves the maximum protection and freedom degree for maintaining the benefit of a legal user and the overall fundamental benefit of the block chain, enables the public key encryption algorithm to be capable of carrying out modification operation, can complete the butt joint with the public key algorithm in other scenes, and improves the compatibility, thereby further promoting the legal and healthy development of the block chain technology.
Drawings
Fig. 1 is a schematic diagram illustrating a working flow of a blockchain public encryption algorithm processing method, a blockchain wallet, and a storage medium according to the present invention.
FIG. 2 is a block chain public encryption algorithm processing method, a block chain wallet and a storage medium according to the present invention.
Fig. 3 is a schematic diagram showing the relationship among the public encryption algorithm processing method for the blockchain, the blockchain wallet, and the user wallet blockchain of the storage medium according to the present invention.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
Referring to fig. 1, the present invention provides a processing method of public encryption algorithm of block chain, comprising the following steps:
calling out a wallet when a transaction occurs, and carrying out whole-network retrieval;
the wallet provides the user with a choice;
generating a private key;
completing the signature operation;
and performing uplink verification.
The specific method for carrying out the whole network retrieval comprises the following steps: when a transaction occurs, a wallet is called up, which first retrieves the public key encryption algorithm available over the network.
The specific steps of the wallet for providing selection for the user are as follows: the wallet displays the available public key encryption algorithm identification to the user, so that the user can select according to the actual requirement of the user.
The specific steps for generating the private key are as follows:
after the user finishes the selection, the public key encryption algorithm selected by the user and the address index of the public key encryption algorithm are confirmed according to the identification;
after the confirmation is finished, the one-to-one correspondence is realized, and then the selected public key encryption algorithm is used for generating the private key.
The uplink verification method specifically comprises the following steps: and performing uplink operation on the signed transaction data and the address index of the public key algorithm selected by the user to finish verification.
Referring to fig. 2 and 3, the present invention provides a blockchain wallet comprising:
an algorithm storage module: for storing a public key encryption algorithm;
a transaction data generation module: the system is used for confirming the public key encryption algorithm selected by the user and the address index thereof according to the identification, realizing one-to-one correspondence after the confirmation is finished, and then generating a private key by using the selected public key encryption algorithm;
a signature module: according to the generated user private key, assisting the user to complete the signature operation of the transaction data;
an uploading module: interacting with a blockchain network.
In conclusion, the characteristics of the block chain are deeply combined, a new design of a block chain public encryption algorithm processing mechanism is built, the maximum protection and freedom degree are achieved for maintaining the benefit of a legal user and the overall fundamental benefit of the block chain, the public key encryption algorithm can be modified, the butt joint with the public key algorithm in other scenes can be completed, the compatibility is improved, and the legal and healthy development of the block chain technology is further promoted. Therefore, the invention effectively overcomes various defects in the prior art and has high industrial utilization value.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.
Claims (8)
1. A processing method of public encryption algorithm of block chain is characterized in that the processing method of public encryption algorithm of block chain comprises the following steps:
calling out a wallet when a transaction occurs, and carrying out whole-network retrieval;
the wallet provides the user with a choice;
generating a private key;
completing the signature operation;
and performing uplink verification.
2. The method of claim 1, wherein the method comprises: the specific method for carrying out the whole network retrieval comprises the following steps: when a transaction occurs, a wallet is called up, which first retrieves the public key encryption algorithm available over the network.
3. The method of claim 1, wherein the method comprises: the specific steps of the wallet for providing selection for the user are as follows: the wallet displays the available public key encryption algorithm identification to the user, so that the user can select according to the actual requirement of the user.
4. The method of claim 3, wherein the method further comprises: the specific steps for generating the private key are as follows:
after the user finishes the selection, the public key encryption algorithm selected by the user and the address index of the public key encryption algorithm are confirmed according to the identification;
after the confirmation is finished, the one-to-one correspondence is realized, and then the selected public key encryption algorithm is used for generating the private key.
5. The method of claim 4, wherein the method further comprises: the uplink verification method specifically comprises the following steps: and performing uplink operation on the signed transaction data and the address index of the public key algorithm selected by the user to finish verification.
6. A blockchain wallet, the blockchain wallet comprising:
an algorithm storage module: for storing a public key encryption algorithm;
a transaction data generation module: the system is used for confirming the public key encryption algorithm selected by the user and the address index thereof according to the identification, realizing one-to-one correspondence after the confirmation is finished, and then generating a private key by using the selected public key encryption algorithm;
a signature module: according to the generated user private key, assisting the user to complete the signature operation of the transaction data;
an uploading module: interacting with a blockchain network.
7. A storage medium on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of claims 1-5.
8. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein: the processor, when executing the program, implements the steps of the method of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910848829.XA CN112465635A (en) | 2019-09-09 | 2019-09-09 | Block chain public encryption algorithm processing method, block chain wallet and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910848829.XA CN112465635A (en) | 2019-09-09 | 2019-09-09 | Block chain public encryption algorithm processing method, block chain wallet and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112465635A true CN112465635A (en) | 2021-03-09 |
Family
ID=74807360
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910848829.XA Pending CN112465635A (en) | 2019-09-09 | 2019-09-09 | Block chain public encryption algorithm processing method, block chain wallet and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112465635A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102215111A (en) * | 2011-07-06 | 2011-10-12 | 北京中兴通数码科技有限公司 | Method for combining identity-based cryptography and conventional public key cryptography |
CN107094077A (en) * | 2017-04-21 | 2017-08-25 | 杭州秘猿科技有限公司 | A kind of license chain Accounting system for not limiting signature algorithm |
CN107147652A (en) * | 2017-05-18 | 2017-09-08 | 电子科技大学 | A kind of safety fusion authentication method of the polymorphic identity of user based on block chain |
US20190018947A1 (en) * | 2017-07-14 | 2019-01-17 | Alibaba Group Holding Limited | Login information data processing |
CN109816383A (en) * | 2019-02-22 | 2019-05-28 | 杭州秘猿科技有限公司 | A kind of block chain endorsement method, block chain wallet and block chain |
CN109981297A (en) * | 2019-04-11 | 2019-07-05 | 百度在线网络技术(北京)有限公司 | Block chain processing method, device, equipment and storage medium |
-
2019
- 2019-09-09 CN CN201910848829.XA patent/CN112465635A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102215111A (en) * | 2011-07-06 | 2011-10-12 | 北京中兴通数码科技有限公司 | Method for combining identity-based cryptography and conventional public key cryptography |
CN107094077A (en) * | 2017-04-21 | 2017-08-25 | 杭州秘猿科技有限公司 | A kind of license chain Accounting system for not limiting signature algorithm |
CN107147652A (en) * | 2017-05-18 | 2017-09-08 | 电子科技大学 | A kind of safety fusion authentication method of the polymorphic identity of user based on block chain |
US20190018947A1 (en) * | 2017-07-14 | 2019-01-17 | Alibaba Group Holding Limited | Login information data processing |
CN109816383A (en) * | 2019-02-22 | 2019-05-28 | 杭州秘猿科技有限公司 | A kind of block chain endorsement method, block chain wallet and block chain |
CN109981297A (en) * | 2019-04-11 | 2019-07-05 | 百度在线网络技术(北京)有限公司 | Block chain processing method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109345386A (en) | Transaction common recognition processing method and processing device, electronic equipment based on block chain | |
CN101241527B (en) | System and method for ordinary authentication | |
CN110689349B (en) | Transaction hash value storage and searching method and device in blockchain | |
CN101571900B (en) | Software copyright protection method, device and system | |
CN110061840A (en) | Data ciphering method, device, computer equipment and storage medium | |
CN107612683B (en) | Encryption and decryption method, device, system, equipment and storage medium | |
CN102915263A (en) | Data backup method, system and equipment | |
CN108876605A (en) | Digital asset method of commerce and device | |
CN103906039A (en) | Method and device for preventing leakage of mobile phone numbers | |
CN109246130A (en) | Data ciphering method, device, computer equipment and storage medium | |
CN111178840A (en) | Service processing method, device, system, electronic equipment and storage medium | |
CN104011698A (en) | Access to supplemental data based on identifier derived from corresponding primary application data | |
CN112989356A (en) | Blank security chip burning method and system, blank security chip and storage medium | |
CN112685091A (en) | Service request processing method, device, equipment and medium based on big data | |
CN109257176A (en) | Decruption key segmentation and decryption method, device and medium based on SM2 algorithm | |
CN111669434B (en) | Method, system, device and equipment for establishing communication group | |
CN109271564A (en) | Declaration form querying method and equipment | |
JP2009237930A (en) | Application transfer system, and application transfer method and program | |
JP2006211051A (en) | Mobile communication apparatus, backup apparatus, backup method, and backup program | |
CN102622251A (en) | Method and server for managing navigation software upgrading | |
CN111866864B (en) | Method, device and storage medium for realizing encrypted storage and safe use management of cloud platform certificate based on wireless AP | |
CN110232570B (en) | Information supervision method and device | |
CN102215131B (en) | Management method and device of functional License | |
CN105786641B (en) | A kind of method, equipment and the smart card of Backup and Restore application of IC cards data | |
CN112465635A (en) | Block chain public encryption algorithm processing method, block chain wallet and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210309 |
|
RJ01 | Rejection of invention patent application after publication |