CN113452521B - Block chain state password adaptation method, state password adapter, system and device - Google Patents

Block chain state password adaptation method, state password adapter, system and device Download PDF

Info

Publication number
CN113452521B
CN113452521B CN202110719359.4A CN202110719359A CN113452521B CN 113452521 B CN113452521 B CN 113452521B CN 202110719359 A CN202110719359 A CN 202110719359A CN 113452521 B CN113452521 B CN 113452521B
Authority
CN
China
Prior art keywords
block chain
password
adapter
cryptographic
national
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110719359.4A
Other languages
Chinese (zh)
Other versions
CN113452521A (en
Inventor
黄步添
方航
苑振霞
刘成永
罗春凤
何钦铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yunxiang Network Technology Co Ltd
Original Assignee
Hangzhou Yunxiang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yunxiang Network Technology Co Ltd filed Critical Hangzhou Yunxiang Network Technology Co Ltd
Priority to CN202110719359.4A priority Critical patent/CN113452521B/en
Publication of CN113452521A publication Critical patent/CN113452521A/en
Application granted granted Critical
Publication of CN113452521B publication Critical patent/CN113452521B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a block chain state secret adaptation method, a state secret adapter and a storage medium, wherein the method comprises the following steps: responding to a block chain cryptographic service module initialization request; the method comprises the steps that a national password adapter component prepares for initialization service, a configuration file of a block chain password service module is started, and the national password adapter component is initialized through a national password adapter plug-in according to the configuration content of the configuration file; the initialized national cipher adapter component adapts various bottom-layer national cipher algorithms according to different configurations, and provides a defined cipher interface end for nodes in the blockchain network so as to support blockchain service ends in various cipher algorithm adaptation encryption machines. Based on the national password adaptation method, the pluggable national password bank can be realized, and the purpose of using different national password banks is realized.

Description

Block chain state password adaptation method, state password adapter, system and device
Technical Field
The invention belongs to the technical field of block chain passwords, and particularly relates to a block chain state password adaptation method, a state password adapter, a system and a device.
Background
Currently, each mainstream block chain company tries to apply the country code to the block chain, mainly focusing on: (1) Using SM3 to replace SHA-256 and the like as a default cryptographic hash algorithm; (2) Using SM2 to replace an elliptic curve signature algorithm as an asymmetric encryption algorithm; (3) The RSA, elliptic curve algorithm certificates, etc. are replaced with SM2 certificates. Protocols for upper layers, such as SSL, involve less and hardware facilities associated with blockchains, such as hardware wallets, are rarely designed using national cryptographic standards. In addition, because the cryptographic algorithm has no specific standard, it is difficult to apply the cryptographic algorithm in the block chain to cryptographic, i.e. it is impossible to get through various cryptographic algorithms to adapt the cryptographic algorithm.
There are many encryption machines or encryption algorithms on the market, the specific implementation details of each encryption machine or encryption algorithm are slightly different, if adaptation is performed for different encryption algorithms each time, a large amount of changes need to be performed on codes, which is not favorable for research and development efficiency and system stability.
Therefore, a block chain state secret adaptation method and a state secret adapter are needed, and flexible and configurable adaptation of different encryption algorithms is realized.
Disclosure of Invention
Based on the background and the problems in the prior art, the invention plans to design a block chain state cipher adaptation method, a state cipher adapter, a system, a storage medium and a device, can realize flexible configuration of adaptation of different encryption algorithms, realizes adaptation of different encryption algorithms without largely changing codes, and is beneficial to research and development efficiency and system stability.
To achieve these objects and other advantages in accordance with the purpose of the invention, a block chain cipher adaptation method is provided, which comprises the steps of:
responding to a block chain crypto service module (BCCSP module) initialization request;
a national password adapter (GMADAPTor) component prepares an initialization service, starts a configuration file of the block chain password service module, and initializes the national password adapter component through a national password adapter plug-in with the configuration content of the configuration file;
the initialized national cipher adapter component adapts various bottom-layer national cipher algorithms according to different configurations, and provides a defined cipher interface end for nodes in a block chain network, namely Peer nodes or Orderer nodes so as to support block chain service ends in various cipher algorithm adaptation encryptors.
Further, the specific implementation step of initializing the cryptographic adapter component includes:
acquiring an initialization request of a block chain server, and starting a configuration file by a block chain password service module based on a state password adapter component;
the national password adapter component carries out initialization operation according to the configuration content of the block chain password service module;
and setting up the option of the national password adapter component to support different national password plug-ins, and configuring the corresponding standard interface to adapt to the software and hardware encryption of the accessed encryption machine manufacturer.
Further, the specific implementation steps of the cryptographic adapter component for supporting the blockchain server include:
acquiring a proposal request, and carrying out endorsement transaction on the proposal request by a user node (namely a Peer node), wherein the user node is positioned in a block chain server and carries out simulation execution by calling a chain code;
receiving a simulation execution result, and signing the result by the cryptographic adapter component and sending the result to the block chain server; the signature is crossed with a national secret algorithm and a hardware equipment encryption algorithm through the national secret adapter component to carry out signature or one or two of signed verifications;
and the block chain server sends the endorsement result to a sequencing verification node (namely an Orderer node) for verification, sequencing and block cutting, sends the result to the user node, and verifies and disqualifies the user node.
Further, the defined cipher interface end includes an asymmetric encryption algorithm SM2 interface end, a Hash function SM3 interface end, and a symmetric encryption algorithm SM4 interface end, where the asymmetric encryption algorithm SM2 interface end includes a key generation (GenerateKey) interface, a signature (Sign) interface, a verification (Verify) interface, an encryption (Encrypt) interface, and a decryption (Decrypt) interface, the Hash function SM3 interface end includes a Hash calculation (Hash) interface, and the symmetric encryption algorithm SM4 interface end includes an encryption (Encrypt) interface and a decryption (Decrypt) interface.
On the other hand, the invention provides a block chain cryptographic adapter, which comprises the following components:
gum adapter (GMADAPTOR) plug-in: the system comprises a password adapter component, a configuration file and a password module, wherein the password adapter component is used for initializing the password adapter component according to the configuration content of the configuration file;
the cryptographic adapter component: the system comprises a block chain network, a Peer node and an Orderer node, wherein the block chain network is used for providing a defined password interface end for the nodes in the block chain network, namely the Peer node or the Orderer node;
defining a cryptographic interface side: the block chain server side is used for supporting various cryptographic algorithms to adapt to the encryptor.
In a third aspect, the present invention provides a block chain state-secret adaptive system, which specifically comprises:
block chain cryptographic service module (BCCSP module): providing a configuration file and configuration contents for initializing a cryptographic adapter;
national password adapter (GMAdaptor): initializing a configuration file for starting the block chain password service module; the system comprises a block chain network, a Peer node and an Orderer node, wherein the block chain network is used for providing a defined password interface end for the nodes in the block chain network, namely the Peer node or the Orderer node;
block chain server: the system is used for providing various cryptographic algorithm services after the cryptographic adapter is adapted;
an encryption machine: and the system is used for responding to the blockchain server and providing various cryptographic algorithms.
In a fourth aspect, the invention proposes a computer-readable storage medium storing a computer program which, when executed by a processor, implements the method and steps of any of the above.
In a fifth aspect, the present invention provides a cryptographic adaptation apparatus, comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor can implement the method and steps of any one of the above items when executing the computer program.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The invention has at least the following beneficial effects: the invention provides a national cipher adaptation method and a national cipher adapter capable of adapting to various encryption algorithms, which can adapt to various underlying national cipher algorithms through initialized national cipher adapter (GMADAPTor) components according to different configurations to realize flexible configuration of different encryption algorithm adaptations, realize adaptation to different encryption algorithms under the condition of not greatly changing codes, and are favorable for research and development efficiency and system stability.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required to be used in the description of the embodiments are briefly introduced below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, without making creative efforts, other drawings may be obtained according to the drawings, and the concrete implementation flows obviously possible in the drawings are taken as further concrete embodiments of the present invention and fall into the protection scope of the present invention.
FIG. 1 is an initialization process of the GMADAPTOR of the present invention;
FIG. 2 is a flowchart illustrating an application of the GMADAPTOR after a client initiates a transaction at a blockchain server;
FIG. 3 is a diagram of the structure of the cryptographic interface end defined by GMADAPTOR.
Detailed Description
In order to clearly illustrate the present invention and make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention are clearly and completely described below in conjunction with the drawings in the embodiments of the present invention, so that those skilled in the art can implement the technical solutions by referring to the description text. The technology of the present invention will be described in detail below with reference to the accompanying drawings in conjunction with specific embodiments.
The national cryptographic algorithm is a set of data encryption processing series algorithm independently developed and innovated in China. The SM1-SM4 respectively realize the algorithm functions of symmetry, asymmetry, abstract and the like, and are particularly suitable for being applied to relevant fields of embedded Internet of things and the like to complete the functions of identity authentication, data encryption and decryption and the like.
The pluggable state secret library is realized by designing a state secret interface (GM interface), namely a state secret adapter (GMADAPTor) realizes the purpose of using different state secret libraries, the state secret plug-in the BCCSP is realized by utilizing the GM interface, and the state secret plug-in and an upper module of a alliance chain do not need to be modified when a bottom-layer state secret library is replaced.
Example 1:
the invention provides a block chain state secret adaptation method, which comprises the following concrete implementation steps:
step1: responding to a block chain crypto service module (BCCSP module) initialization request;
step2: the GMADAPTOR component prepares an initialization service, starts a configuration file of the block chain password service module (BCCSP module), and initializes the GMADAPTOR component with the configuration content of the configuration file through a GMADAPTOR plug-in, as shown in FIG. 1; wherein,
the specific implementation steps of initializing the GMADAPTOR component comprise:
s21: acquiring an initialization request of a block chain server, and starting a configuration file by a BCCSP module based on a GMADAPTOR component;
s22: the GMADAPTor component carries out initialization operation according to the configuration content of the BCCSP module;
s23: and setting GMADAPTor component options to support different national ciphers, and configuring the corresponding standard interface to adapt to the software and hardware encryption of the accessed encryptor manufacturer.
Step3: as shown in fig. 2, the initialized GMAdaptor component adapts to multiple underlying national cryptographic algorithms, such as SM2, SM3, or SM4, and provides a defined cryptographic interface end for a node in a block chain network, that is, a Peer node or an order node, to support a block chain service end in various cryptographic algorithm adaptation encryptors, so as to provide various cryptographic services for clients, where the encryptors use a Peer encryptor to implement hardware encryption and a trusted encryptor to implement software encryption. The defined cipher interface end includes an asymmetric encryption algorithm SM2 interface end, a Hash function SM3 interface end, and a symmetric encryption algorithm SM4 interface end, as shown in fig. 3, where the asymmetric encryption algorithm SM2 interface end includes a key generation (GenerateKey) interface, a signature (Sign) interface, a verification (Verify) interface, an encryption (Encrypt) interface, and a decryption (Decrypt) interface, the Hash function SM3 interface end includes a Hash calculation (Hash) interface, and the symmetric encryption algorithm SM4 interface end includes an encryption (Encrypt) interface and a decryption (Decrypt) interface.
In the above scheme, the specific implementation steps of the GMAdaptor component supporting the block chain service end include:
s31: acquiring a proposal request, and carrying out endorsement transaction on the proposal request by a user node, namely a Peer node, wherein the Peer node is positioned in a block chain service end and carries out simulation execution by calling a chain code;
s32: receiving a simulation execution result, and carrying out signature on the result by a GMADAPTor component and sending the result to a block chain service end; wherein the signature is cross signed with a cryptographic algorithm and a hardware device encryption algorithm through the cryptographic adapter (GMADAPTor) component or is verified after the signature.
S33: and the block chain server sends the endorsement result to a sequencing verification node, namely an Orderer node, performs verification, sequencing and block cutting, sends the result to the Peer node, and verifies and dislists the Peer node.
Example 2:
a block chain cryptographic adapter, comprising:
gum adapter (GMADAPTOR) plug-in: the system comprises a configuration file, a password adapter (GMADAPTOR) component and a password module, wherein the configuration file is used for configuring a password adapter (GMADAPTOR) component according to configuration content of a configuration file;
a cryptographic adapter assembly: the system is used for adapting a plurality of underlying national cryptographic algorithms according to different configurations, such as SM2, SM3 or SM4, and providing a defined cryptographic interface end for nodes (Peer nodes or Orderer nodes) in a blockchain network;
defining a password interface end: the block chain server side is used for supporting various cryptographic algorithm adaptation encryption machines (hardware implementation is realized through a same encryption machine, software implementation is realized through a communication security encryption machine or other implementations can also be adopted).
The number of modules and the processing scale described herein are intended to simplify the description of the invention. Applications, modifications and variations of the cryptographic adapter and its implementation of the present invention will be apparent to those skilled in the art.
Example 3:
a block chain state secret adapting system containing a block chain state secret adapter specifically comprises the following components:
block chain crypto service module (BCCSP module): providing configuration files and configuration contents for initializing the cryptographic adapter;
national password adapter (GMAdaptor): the configuration file used for starting the BCCSP module is initialized; the system is used for adapting a plurality of underlying national cryptographic algorithms according to different configurations, such as SM2, SM3 or SM4, and providing a defined cryptographic interface end for nodes (Peer nodes or Orderer nodes) in a blockchain network;
block chain server: the system is used for providing various cryptographic algorithm services after the cryptographic adapter is adapted.
Wherein, the composition of the national password adapter (GMADAPTOR) includes:
GMADAPTor plug-in: the GMADAPTor component is positioned in the BCCSP module and used for initializing the GMADAPTor component according to the configuration content of the configuration file;
GMADAPTor component: the system is used for adapting a plurality of underlying national cryptographic algorithms according to different configurations, such as SM2, SM3 or SM4, and providing a defined cryptographic interface end for nodes (Peer nodes or Orderer nodes) in a blockchain network;
defining a password interface end: the block chain server side is used for supporting various cryptographic algorithm adaptation encryption machines (such as a hardware implementation through a peer-to-peer encryption machine and a software implementation through a trust encryption machine).
The number of modules and the processing scale described herein are intended to simplify the description of the invention. Applications, modifications and variations of the cryptographic adapter and its implementation, the blockchain system including the cryptographic adapter and its implementation of the present invention will be apparent to those skilled in the art.
Example 4:
a computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method steps of any one of the above. For the storage medium embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for the relevant points, refer to the partial description of the method embodiment.
Example 5:
a cryptographic adaptation apparatus comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing any of the method steps described above when executing the computer program
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are all described in a progressive manner, and each embodiment focuses on differences from other embodiments, and portions that are the same and similar between the embodiments may be referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The embodiments described above are presented to enable a person having ordinary skill in the art to make and use the invention. It will be readily apparent to those skilled in the art that various modifications to the above-described embodiments may be made, and the generic principles defined herein may be applied to other embodiments without the use of inventive faculty. Therefore, the present invention is not limited to the above embodiments, and those skilled in the art should make improvements and modifications to the present invention based on the disclosure of the present invention within the protection scope of the present invention.

Claims (7)

1. A block chain state secret adaptation method is characterized by comprising the following concrete implementation steps:
responding to a block chain cryptographic service module initialization request;
the method comprises the steps that a national password adapter component prepares for initialization service, a configuration file of a block chain password service module is started, and the national password adapter component is initialized through a national password adapter plug-in according to the configuration content of the configuration file;
the specific implementation steps of initializing the cryptographic adapter component comprise:
acquiring an initialization request of a block chain server, and starting a configuration file by a block chain password service module based on a state password adapter component;
the national password adapter component carries out initialization operation according to the configuration content of the block chain password service module;
setting up national password adapter component options to support different national password plug-ins, and configuring corresponding standard interfaces to adapt to the encryption of the software and hardware of the accessed encryption machine manufacturer;
the specific implementation steps of the cryptographic adapter assembly for supporting the block chain server side include:
acquiring a proposal request, and carrying out endorsement transaction on the proposal request by a user node, wherein the user node is positioned in a block chain server and carries out simulation execution by calling a chain code;
receiving a simulation execution result, and signing the result by the national password adapter component and sending the result to the block chain server;
the block chain server sends the endorsement result to a sequencing verification node for verification, sequencing and block cutting, and sends the result to the user node, and the user node performs verification and destage;
the initialized state cipher adapter component adapts various bottom state cipher algorithms according to different configurations, and provides a defined cipher interface end for nodes in the block chain network so as to support block chain service ends in various cipher algorithm adaptation encryption machines.
2. The blockchain cryptographic adaptation method of claim 1, wherein the signature is one or both of signed or signed verification across a cryptographic algorithm, a hardware device cryptographic algorithm, and the cryptographic adapter component.
3. The block chain state cipher adaptation method according to claim 1, wherein the defined cipher interface end includes an asymmetric encryption algorithm SM2 interface end, a hash function SM3 interface end, and a symmetric encryption algorithm SM4 interface end, wherein the asymmetric encryption algorithm SM2 interface end includes a key generation interface, a signature verification interface, an encryption interface, and a decryption interface, the hash function SM3 interface end includes a hash calculation interface, and the symmetric encryption algorithm SM4 interface end includes an encryption interface and a decryption interface.
4. A blockchain cipher adapter for implementing the blockchain cipher adaptation method of claim 1, comprising:
and (3) a national password adapter plug-in: the system comprises a password adapter component, a configuration file and a password module, wherein the password adapter component is used for initializing the password adapter component according to the configuration content of the configuration file;
the cryptographic adapter component: the system is used for adapting various bottom-layer national cryptographic algorithms according to different configurations and providing a defined password interface end for nodes in a block chain network;
defining a password interface end: the block chain server side is used for supporting various cryptographic algorithms to adapt to the encryptor.
5. A blockchain state cipher adapter system based on the blockchain state cipher adapter of claim 4, comprising:
block chain cryptographic service module: providing a configuration file and configuration contents for initializing a cryptographic adapter;
the national password adapter: initializing a configuration file for starting the block chain password service module; the system is used for adapting various bottom-layer national cryptographic algorithms according to different configurations and providing a defined password interface end for nodes in a block chain network;
block chain server: the system is used for providing various cryptographic algorithm services after the cryptographic adapter is adapted;
an encryption machine: and the system is used for responding to the blockchain server and providing various cryptographic algorithms.
6. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method steps of one of claims 1 to 3.
7. A cryptographic adaptation apparatus comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method steps according to any of claims 1 to 3 when executing the computer program.
CN202110719359.4A 2021-06-28 2021-06-28 Block chain state password adaptation method, state password adapter, system and device Active CN113452521B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110719359.4A CN113452521B (en) 2021-06-28 2021-06-28 Block chain state password adaptation method, state password adapter, system and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110719359.4A CN113452521B (en) 2021-06-28 2021-06-28 Block chain state password adaptation method, state password adapter, system and device

Publications (2)

Publication Number Publication Date
CN113452521A CN113452521A (en) 2021-09-28
CN113452521B true CN113452521B (en) 2022-11-04

Family

ID=77813243

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110719359.4A Active CN113452521B (en) 2021-06-28 2021-06-28 Block chain state password adaptation method, state password adapter, system and device

Country Status (1)

Country Link
CN (1) CN113452521B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114021205A (en) * 2021-11-26 2022-02-08 杭州云象网络技术有限公司 Block chain checking method, storage medium and device for achieving block chain tamper resistance
CN115549928B (en) * 2022-11-30 2023-06-13 山东区块链研究院 Signature verification method, system, storage medium and equipment in block chain system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108965468A (en) * 2018-08-16 2018-12-07 北京京东尚科信息技术有限公司 Block chain network service platform and its chain code installation method, storage medium
CN109118214A (en) * 2017-06-26 2019-01-01 华为技术有限公司 The method and apparatus for running intelligent contract
CN112883015A (en) * 2021-04-23 2021-06-01 北京中科金财科技股份有限公司 Block chain data management method, device and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110048855B (en) * 2019-04-23 2022-03-15 东软集团股份有限公司 Introduction method and calling method of cryptographic algorithm, device, equipment and Fabric platform
US11398899B2 (en) * 2019-05-28 2022-07-26 Shanghai Zhaoxin Semiconductor Co., Ltd. Data processing device and data processing method
CN110992030A (en) * 2019-12-03 2020-04-10 银清科技有限公司 Transaction method and system based on super account book fabric
CN111026461B (en) * 2019-12-06 2022-04-22 联想(北京)有限公司 Data processing method and device for block chain system and electronic equipment
CN112737779B (en) * 2020-12-30 2023-04-21 深圳市宝能投资集团有限公司 Cryptographic machine service method, device, cryptographic machine and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109118214A (en) * 2017-06-26 2019-01-01 华为技术有限公司 The method and apparatus for running intelligent contract
CN108965468A (en) * 2018-08-16 2018-12-07 北京京东尚科信息技术有限公司 Block chain network service platform and its chain code installation method, storage medium
CN112883015A (en) * 2021-04-23 2021-06-01 北京中科金财科技股份有限公司 Block chain data management method, device and storage medium

Also Published As

Publication number Publication date
CN113452521A (en) 2021-09-28

Similar Documents

Publication Publication Date Title
TWI760149B (en) Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
CN107404461B (en) Data secure transmission method, client and server method, device and system
US11563567B2 (en) Secure shared key establishment for peer to peer communications
CN108241517B (en) Software upgrading method, client and electronic equipment
CN105812141B (en) It is a kind of to can verify that intersection operation method and system towards outsourcing encryption data
CN110247757B (en) Block chain processing method, device and system based on cryptographic algorithm
EP2792100B1 (en) Method and device for secure communications over a network using a hardware security engine
US11716206B2 (en) Certificate based security using post quantum cryptography
CN106790090A (en) Communication means, apparatus and system based on SSL
CN113452521B (en) Block chain state password adaptation method, state password adapter, system and device
JP2023531241A (en) TLS Integration of Post-Quantum Cryptography Algorithms
US11616643B2 (en) System and method of management of a shared cryptographic account
US20190044922A1 (en) Symmetric key identity systems and methods
CN110351297B (en) Verification method and device applied to block chain
US11632246B2 (en) Hybrid key derivation to secure data
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN111314066B (en) Block chain-based data transfer method, terminal and computer-readable storage medium
CN113572604A (en) Method, device and system for sending secret key and electronic equipment
JP2022545809A (en) Secure environment for cryptographic key generation
CN110581829A (en) Communication method and device
CN113014387B (en) Method for improving multidimensional encryption interface based on hardware encryption machine and encryption device
CN114765543B (en) Encryption communication method and system of quantum cryptography network expansion equipment
CN111859314A (en) SM2 encryption method, system, terminal and storage medium based on encryption software
CN112580061A (en) Calling method of quantum encryption and decryption application interface and related equipment
CN114765542B (en) Quantum cipher network encryption communication method based on quantum key card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant