CN113922967A - Block chain key management method and device and computer equipment - Google Patents

Block chain key management method and device and computer equipment Download PDF

Info

Publication number
CN113922967A
CN113922967A CN202111178394.6A CN202111178394A CN113922967A CN 113922967 A CN113922967 A CN 113922967A CN 202111178394 A CN202111178394 A CN 202111178394A CN 113922967 A CN113922967 A CN 113922967A
Authority
CN
China
Prior art keywords
file
password
user
keystore
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111178394.6A
Other languages
Chinese (zh)
Inventor
翟红鹰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Puhua Yunchuang Technology Beijing Co ltd
Original Assignee
Puhua Yunchuang Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Puhua Yunchuang Technology Beijing Co ltd filed Critical Puhua Yunchuang Technology Beijing Co ltd
Priority to CN202111178394.6A priority Critical patent/CN113922967A/en
Publication of CN113922967A publication Critical patent/CN113922967A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The embodiment of the invention belongs to the technical field of block chains, and relates to a block chain key management method, a block chain key management device, computer equipment and a storage medium, wherein the block chain key management method comprises the following steps: acquiring a private key file of a user; collecting first multi-dimensional user posture information of a user aiming at the private key file, and generating a first multi-dimensional user posture password according to the first multi-dimensional user posture information according to a first preset rule; performing first encryption on the private key file by using the first multi-dimensional user posture password to obtain a first KeyStore file of the private key file; saving the first KeyStore file locally and hosting the first KeyStore file on an upper platform that provides block chain services. The embodiment of the invention can avoid the problem that the user can not operate the assets because the user loses the KeyStore file, and can ensure the safety of the user KeyStore file to the maximum extent.

Description

Block chain key management method and device and computer equipment
Technical Field
The present invention relates to the field of blockchain, and in particular, to a method and an apparatus for managing a blockchain key, a computer device, and a storage medium.
Background
In the real world, people exchange financial assets through banks, and people know that the premise for transaction is to have a bank account, the bank account is managed by an account number encryption code, and a block chain is managed by an account code, namely, the three elements of the block chain account are as follows: private key, public key, address.
Generally, a computer is in a binary form, data storage is carried out through 0 and 1, the maximum number of the data storage is 2^256, if the data storage is converted into a more intuitive 10-degree system, 115792089237316195423570985008687907853269984665640564039457584007913129639936 is obtained, and the maximum 6-digit number of a bank account can only be 999999. If one wants to calculate the password by exhaustion, that is not always possible. This is why the blockchain account uses the private key, because it is sufficiently secure.
In a blockchain system, when a user needs to leverage an asset at an address, the private key is needed to "sign" for this activity. At the same time, the public key for verifying the signature is informed to all persons, so that the persons can verify the behavior legality, and the user can use the assets. Therefore, for the account on the block chain, it is very important to guarantee the security of the private key of the account. The private key is hexadecimal characters with the length of 64 mosquitoes, which is not beneficial to recording and is easy to remember wrongly, so that the private key of the private key needs to be backed up, if the private key is backed up directly, when a private key file is lost or stolen, the security of assets and data based on the block chain account is directly threatened without any privacy for the block chain account, and therefore, the existing block chain account has the problem of low key security.
Disclosure of Invention
An embodiment of the present invention provides a method and an apparatus for managing a blockchain key, a computer device, and a storage medium, so as to solve the problem of low security of a conventional blockchain account key.
In order to solve the above technical problem, an embodiment of the present invention provides a method for managing a blockchain key, which adopts the following technical solutions:
acquiring a private key file of a user;
collecting first multi-dimensional user posture information of a user aiming at the private key file, and generating a first multi-dimensional user posture password according to the first multi-dimensional user posture information according to a first preset rule;
performing first encryption on the private key file by using the first multi-dimensional user posture password to obtain a first KeyStore file of the private key file;
saving the first KeyStore file locally and hosting the first KeyStore file on an upper platform that provides block chain services.
Further, after the steps of saving the first KeyStore file locally and hosting the first KeyStore file on an upper platform that provides blockchain services, the method further comprises:
when a private key request of a user is received, the first KeyStore file is searched locally;
if the first KeyStore file is searched locally, second multi-dimensional user posture information of the user is collected;
and when the second multi-dimensional user posture information conforms to the first multi-dimensional user posture password, extracting a private key file in the first KeyStore file.
Further, after the step of locally searching the first KeyStore file upon receiving a private key request of a user, the method further includes:
if the first KeyStore file cannot be searched locally, requesting the first KeyStore file from the upper-layer platform;
if the first KeyStore file request from the upper-layer platform is successful, acquiring third multi-dimensional user posture information of the user;
and when the third multi-dimensional user posture information conforms to the first multi-dimensional user posture password, extracting a private key file in the first KeyStore file.
Further, after the step of requesting the first KeyStore file from the upper platform if the first KeyStore file is not searched locally, the method further includes:
and if the request of the first KeyStore file to the upper layer platform is successful, storing the first KeyStore file locally.
Further, after the step of storing the first KeyStore file locally if the request for the first KeyStore file to the upper platform is successful, the method further includes:
judging the reason why the first KeyStore file cannot be searched locally;
according to the reason, when the first multi-dimensional user posture password needs to be modified, extracting the private key file in the first KeyStore file requested by the upper-layer platform;
acquiring fourth multi-dimensional user posture information of the user aiming at the private key file, and generating a second multi-dimensional user posture password by the fourth multi-dimensional user posture information according to a second preset rule;
performing second encryption on the private key file by using the second multi-dimensional user posture password to obtain a second KeyStore file of the private key file;
saving the second KeyStore file locally and replacing the first KeyStore file in the upper platform with the second KeyStore file. .
Further, the step of acquiring the first multidimensional user posture information of the user for the private key file and generating the first multidimensional user posture password according to the first multidimensional user posture information by using a first preset rule includes:
acquiring 1+ N items of user posture information, wherein 1 represents the corresponding primary dimension user posture information, N represents the secondary dimension user posture information corresponding to the secondary password factor, and N is greater than or equal to 1;
when N is equal to 1, extracting a main password factor according to the body state information of the main dimension user, and extracting an auxiliary password factor according to the body state information of the secondary dimension user;
fusing the main password factor and the auxiliary password factor according to a first preset fusion rule to obtain the first multi-dimensional user posture password;
when N is larger than 1, extracting a main password factor according to the body state information of the main dimension user, and extracting an auxiliary password factor according to the body state information of the secondary dimension user;
fusing the auxiliary password factors according to a second preset fusion rule to obtain fused auxiliary password factors;
and fusing the fused auxiliary password factor and the main password factor according to a third preset fusion rule to obtain the first multi-dimensional user posture password.
Further, the step of hosting the first KeyStore file on an upper platform providing a blockchain service includes:
requesting hosting of the first KeyStore file from an upper platform providing blockchain services;
collecting fifth multi-dimensional user posture information hosted by a user aiming at the first KeyStore file when receiving agreement to host;
generating a third multi-dimensional user posture password according to the fifth multi-dimensional user posture information and a third preset rule;
and sending the third multi-dimensional user posture password to the upper layer platform, so that the upper layer platform holding the right hosts the first KeyStore file through the third multi-dimensional user posture password.
In order to solve the above technical problem, an embodiment of the present invention further provides a device for managing a blockchain key, where the following technical solutions are adopted:
the acquisition module is used for acquiring a private key file of a user;
the first acquisition module is used for acquiring first multi-dimensional user posture information of a user aiming at the private key file and generating a first multi-dimensional user posture password according to the first multi-dimensional user posture information according to a first preset rule;
the first encryption module is used for carrying out first encryption on the private key file by using the first multi-dimensional user posture password to obtain a first KeyStore file of the private key file;
and the hosting module is used for storing the first KeyStore file locally and hosting the first KeyStore file on an upper-layer platform for providing block chain services.
In order to solve the above technical problem, an embodiment of the present invention further provides a computer device, including a memory and a processor, where the memory stores computer readable instructions, and the processor implements the steps of the block chain key management method provided by the present invention when executing the computer readable instructions.
In order to solve the above technical problem, an embodiment of the present invention further provides a computer-readable storage medium, where computer-readable instructions are stored on the computer-readable storage medium, and when the computer-readable instructions are executed by a processor, the steps of the method for managing a blockchain key provided by the embodiment of the present invention are implemented.
The embodiment of the invention obtains a private key file of a user; collecting first multi-dimensional user posture information of a user aiming at the private key file, and generating a first multi-dimensional user posture password according to the first multi-dimensional user posture information according to a first preset rule; performing first encryption on the private key file by using the first multi-dimensional user posture password to obtain a first KeyStore file of the private key file; saving the first KeyStore file locally and hosting the first KeyStore file on an upper platform that provides block chain services. The embodiment of the invention mainly has the following beneficial effects: the method comprises the steps of collecting multi-dimensional user posture information of a user aiming at a private key file, generating a multi-dimensional user posture password according to a preset rule by the multi-dimensional user posture information, encrypting the private key file by using the multi-dimensional user posture password to obtain a KeyStore file of the private key file, storing the KeyStore file locally and hosting the KeyStore file on an upper layer platform providing block chain service, so that the trouble that the user cannot operate assets due to the fact that the user loses the KeyStore file is avoided, and meanwhile, the safety of the KeyStore file of the user can be guaranteed to the maximum extent.
Drawings
FIG. 1 is an exemplary system architecture diagram in which the present invention may be applied;
fig. 2 is a flowchart of a method for managing a blockchain key according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a device for managing blockchain keys according to an embodiment of the present invention;
FIG. 4 is a schematic block diagram of one embodiment of a computer device in accordance with the present invention.
The objects, features and advantages of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs; the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention; the terms "comprising" and "having," and any variations thereof, in the description and claims of this invention and the description of the above figures, are intended to cover non-exclusive inclusions. The terms "first," "second," and the like in the description and in the claims, or in the drawings, are used for distinguishing between different objects and not necessarily for describing a particular sequential order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to make the technical solutions of the present invention better understood by those skilled in the art, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. Various communication client applications, such as an editing application, a web browser application, a shopping application, a search application, an instant messaging tool, a mailbox client, social platform software, etc., may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture experts Group Audio Layer III, mpeg compression standard Audio Layer 3), MP4 players (Moving Picture experts Group Audio Layer IV, mpeg compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background server providing support for pages displayed on the terminal devices 101, 102, 103.
It should be noted that the management method of the blockchain key provided by the embodiment of the present invention is generally executed by a server, and accordingly, the management device of the blockchain key is generally disposed in the server.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to fig. 2, a flow diagram of one embodiment of a method for managing blockchain keys is shown, in accordance with the present invention. The management method of the block chain key comprises the following steps:
201. and acquiring a private key file of the user.
In the embodiment of the present invention, the private key file is used to protect privacy and security of a user account, and is specifically used to transmit transaction encryption and decryption, etc. The private key file is crucial to the user, so the blockchain system often requires the user to keep good possession of the private key file.
It should be noted that the management method of the blockchain key is generally set in the server. Of course, the method for managing the blockchain key may also be provided in the terminal device, so that the terminal device can also implement the method for managing the blockchain key in an offline state. In this embodiment, an electronic device (for example, a server shown in fig. 1) on which the method for managing the blockchain key operates may communicate with the terminal through a wired connection or a wireless connection. It should be noted that the wireless connection means may include, but is not limited to, a 3G/4G/5G connection, a WiFi connection, a bluetooth connection, a WiMAX connection, a Zigbee connection, a uwb (ultra wideband) connection, and other wireless connection means now known or developed in the future.
202. The method comprises the steps of collecting first multi-dimensional user posture information of a user aiming at a private key file, and generating a first multi-dimensional user posture password according to the first multi-dimensional user posture information and a first preset rule.
In the embodiment of the present invention, the first multi-dimensional user posture information may be face information, body movement, and the like. Specifically, the first multidimensional user posture information is generated into a first multidimensional user posture password according to a first preset rule; the first-dimension user posture password can be a feature password extracted from information such as a front side face, a facial expression action, a gesture action and the like in face recognition. The first multi-dimensional user posture information comprises main-dimensional user posture information and secondary-dimensional user posture information.
In the embodiment of the present invention, the first preset rule may be that the system firstly performs living body analysis on the input face information, including but not limited to blinking, and firstly performs analysis and extraction on the acquired face feature data to generate a stable and unique first multi-dimensional user posture password.
203. Performing first encryption on the private key file by using a first multi-dimensional user posture password to obtain a first KeyStore file of the private key file;
in the embodiment of the present invention, the first dimension user configuration password performs first encryption on the private key file to obtain a first KeyStore file of the private key file; the first KeyStore file stores the private key as a JSON file in an encrypted manner, which is the encrypted private key.
In an embodiment of the present invention, the KeyStore file is a file format (JSON) for storing a private key in a blockchain wallet. It uses user-defined password encryption to provide a degree of protection depending on the strength of the password used by the user to encrypt the wallet, which is extremely insecure if a password like 123456 is used.
204. The first KeyStore file is saved locally and hosted on an upper platform that provides blockchain services.
In the embodiment of the invention, the upper-layer platform of the blockchain service can help to quickly construct a more stable and safe production-level blockchain environment.
Further, the above method for managing a blockchain key further includes the following steps: when a private key request of a user is received, searching the first KeyStore file locally; if the first KeyStore file is searched locally, second multi-dimensional user posture information of the user is collected; and when the second multi-dimensional user posture information accords with the first multi-dimensional user posture password, extracting a private key file in the first KeyStore file.
In the embodiment of the present invention, the second multi-dimensional user posture information may be face information, body movement, and the like. The second multi-dimensional user posture information may be in accordance with the first multi-dimensional user posture information. Specifically, the second multi-dimensional user posture information is generated into a corresponding multi-dimensional user posture password according to a first preset rule, the multi-dimensional user posture password is compared with the first multi-dimensional user posture password, and if the comparison is passed, the second multi-dimensional user posture information conforms to the first multi-dimensional user posture password, and the verification is passed.
Specifically, when the first KeyStore file is searched locally, and the second multi-dimensional user configuration information matches the first multi-dimensional user configuration password, the private key file in the first KeyStore file may be extracted.
Further, after the step of locally searching the first KeyStore file when the request of the private key of the user is received, the method for managing the blockchain key further includes: requesting the first KeyStore file from the upper platform if the first KeyStore file cannot be searched locally; if the request of the first KeyStore file to the upper-layer platform is successful, acquiring third multi-dimensional user posture information of the user; and when the third multi-dimensional user posture information accords with the first multi-dimensional user posture password, extracting a private key file in the first KeyStore file.
In an embodiment of the present invention, the third multi-dimensional user posture information may be face information, body movement, and the like based on the first multi-dimensional user posture information, and the third multi-dimensional user posture information may be the same as the first multi-dimensional user posture information. Specifically, the third multi-dimensional user posture information is generated into a corresponding multi-dimensional user posture password according to a first preset rule, the multi-dimensional user posture password is compared with the first multi-dimensional user posture password, and if the comparison is passed, the third multi-dimensional user posture information conforms to the first multi-dimensional user posture password, and the verification is passed.
It should be noted that the second multi-dimensional user posture information is collected by a local terminal device, and the third multi-dimensional user posture information is collected by an upper platform.
Specifically, if the first KeyStore file is not searched locally, the first KeyStore file is requested from the upper platform successfully, and the third multi-dimensional user posture information conforms to the first multi-dimensional user posture password, the private key in the first KeyStore file is extracted, so that the first KeyStore file can be backed up, and the security of the first KeyStore file is improved through the first multi-dimensional user posture password.
Further, after the step of requesting the upper platform for the first KeyStore file if the first KeyStore file is not searched locally, the block chain key management method further includes: and if the request of the first KeyStore file to the upper-layer platform is successful, storing the first KeyStore file locally.
Further, after the step of storing the first KeyStore file locally if the request for the first KeyStore file to the upper platform is successful, the method for managing a block chain key further includes: judging the reason why the first KeyStore file cannot be searched locally; extracting the private key file in the first KeyStore file requested by the upper platform when the first multi-dimensional user body state password needs to be modified according to the reason; collecting fourth multi-dimensional user posture information of the user aiming at the private key file, and generating a second multi-dimensional user posture password according to the fourth multi-dimensional user posture information according to a second preset rule; performing second encryption on the private key file by using the second multi-dimensional user posture password to obtain a second KeyStore file of the private key file; saving the second KeyStore file locally and replacing the first KeyStore file in the upper platform with the second KeyStore file.
In the embodiment of the present invention, the fourth multi-dimensional user posture information may be face information, body movement, and the like. The second preset rule may be that living body analysis is performed on the input face information, including but not limited to blinking, and the acquired face feature data is analyzed and extracted to generate a stable and unique second multi-dimensional user posture password.
In a possible embodiment, whether the second multi-dimensional user posture password is the same as the first multi-dimensional user posture password is checked, and if so, the user is prompted to re-acquire the fourth multi-dimensional user posture information to generate a second multi-dimensional user posture password different from the first multi-dimensional user posture password.
Further, the step of acquiring the first multidimensional user posture information of the user for the private key file and generating the first multidimensional user posture password according to the first multidimensional user posture information by using a first preset rule includes: acquiring 1+ N items of user posture information, wherein 1 represents the corresponding primary dimension user posture information, N represents the secondary dimension user posture information corresponding to the secondary password factor, and N is greater than or equal to 1; when N is equal to 1, extracting a main password factor according to the body state information of the main dimension user, and extracting an auxiliary password factor according to the body state information of the secondary dimension user; fusing the main password factor and the auxiliary password factor according to a first preset fusion rule to obtain the first multi-dimensional user posture password; when N is larger than 1, extracting a main password factor according to the body state information of the main dimension user, and extracting an auxiliary password factor according to the body state information of the secondary dimension user; fusing the auxiliary password factors according to a second preset fusion rule to obtain fused auxiliary password factors; and fusing the fused auxiliary password factor and the main password factor according to a third preset fusion rule to obtain the first multi-dimensional user posture password.
Specifically, selectable items are provided at a service system client based on a block chain, a user can select whether to back up own KeyStore files to a service platform, and when the user selects to back up, the user can select an encryption private key mode, wherein the selection mode is as follows: 1+ N, wherein 1 is face recognition and is a necessary option; n includes gesture password, speech recognition, SMS identifying code, and the user can make the selection according to actual conditions, selects an item at least, and the more selectable item that the user selected, factor of safety just also is higher. In the stage of generating the KeyStore by the encryption private key, the system firstly performs living body analysis on the input face information, including but not limited to blinking, firstly analyzes and extracts the collected face feature data to generate a stable and displaced main password factor, and for different values of N, the system is divided into: when N is equal to 1, extracting the password in the selectable item to obtain an auxiliary password factor, and fusing the main password factor and the auxiliary password factor through a specific algorithm to obtain a first multi-dimensional user posture password, wherein the first multi-dimensional user posture password is a main encryption factor obtained after the user multi-dimensional posture password is encrypted. When N is larger than 1, extracting a main password factor according to the body state information of the main-dimension user, extracting an auxiliary password factor according to the body state information of the auxiliary-dimension user, and fusing the main password factor through a third preset fusion rule to obtain the first multi-dimension user body state password. The two algorithms for password fusion can adopt the same or different algorithms, and the specific service can be chosen or chosen according to the balance relation between the service safety and the service efficiency. Thus, a KeyStore is formed by using the private key encrypted by the multi-dimensional posture password, one copy is locally stored at the user client side, and the other copy is hosted to the platform server. The platform cannot acquire the multidimensional posture password of the user, so the hosted KeyStore file is safe. And the body state password is used as an encryption factor, so that various problems that the traditional password is forgotten or leaked and the like can be avoided.
In the embodiment of the invention, in the process of actually using the service of the block chain system, the situation of equipment replacement login (old user login) or new App downloading is difficult to avoid, at this time, a KeyStore locally stored by a user does not exist, and if the KeyStore file originally backed up by the user is lost, the user can not use the previous address for transaction and the asset can not be operated in the traditional situation.
Further, the step of hosting the first KeyStore file on an upper platform providing a blockchain service includes: requesting hosting of the first KeyStore file to an upper platform providing a blockchain service; collecting fifth multi-dimensional user posture information hosted by a user aiming at the first KeyStore file when receiving agreement to host; generating a third multi-dimensional user posture password according to the fifth multi-dimensional user posture information according to a third preset rule; and sending the third multi-dimensional user posture password to the upper layer platform, so that the upper layer platform holding the right hosts the first KeyStore file through the third multi-dimensional user posture password.
In an embodiment of the present invention, the third preset rule may be a living body analysis performed on the input face information, including but not limited to blinking, and the acquired face feature data is analyzed and extracted to generate a stable and unique third multi-dimensional user posture password.
Based on the invention, supposing that the user selects to host the KeyStore to the upper-layer platform before, at this time, the user needs to input the previously selected multi-dimensional posture password in the 1+ N mode to the verification system of the upper-layer platform, the verification system judges whether the sixth multi-dimensional user posture information input by the user is in accordance with the third multi-dimensional user posture password, for example, the input face recognition image and the selected other multi-dimensional posture passwords (note: if the verification is successful, the multi-dimensional posture password at this time is completely in accordance with the third multi-dimensional posture password selected by the encryption process) are subjected to feature extraction, the feature extraction process is in accordance with the process of extracting the encryption factor from the KeyStore file in the encryption process of the upper-layer platform, then the password consistency is judged, if the encrypted and decrypted multi-dimensional posture passwords belong to the same person, the verification is passed, the platform provides the first KeyStore file of the user as required, and then, decrypting the KeyStore file by using the third multi-dimensional user posture information to obtain a private key, and then performing normal chain transaction. If the sixth multi-dimensional user posture information conforms to the third multi-dimensional user posture password, the user can extract a corresponding first KeyStore file from the upper-layer platform. And if the first KeyStore file is extracted to the local, judging whether the second multi-dimensional user posture information and the first multi-dimensional user posture password are in accordance, and if so, extracting the key file in the first KeyStore file. And if the first KeyStore file is extracted to the upper-layer platform, judging whether the third multi-dimensional user posture information and the first multi-dimensional user posture password are in accordance, and if so, extracting the key file in the first KeyStore file.
In the embodiment of the invention, a private key file of a user is obtained; collecting first multi-dimensional user posture information of a user aiming at the private key file, and generating a first multi-dimensional user posture password according to the first multi-dimensional user posture information according to a first preset rule; performing first encryption on the private key file by using the first multi-dimensional user posture password to obtain a first KeyStore file of the private key file; saving the first KeyStore file locally and hosting the first KeyStore file on an upper platform that provides block chain services. The embodiment of the invention mainly has the following beneficial effects: the method comprises the steps of collecting multi-dimensional user posture information of a user aiming at a private key file, generating a multi-dimensional user posture password according to a preset rule by the multi-dimensional user posture information, encrypting the private key file by using the multi-dimensional user posture password to obtain a KeyStore file of the private key file, storing the KeyStore file locally and hosting the KeyStore file on an upper layer platform providing block chain service, so that the trouble that the user cannot operate assets due to the fact that the user loses the KeyStore file is avoided, and meanwhile, the safety of the KeyStore file of the user can be guaranteed to the maximum extent.
With further reference to fig. 3, as an implementation of the method shown in fig. 2, the present invention provides an embodiment of a device for managing a blockchain key, where the embodiment of the device corresponds to the embodiment of the method shown in fig. 2, and the device may be applied to various electronic devices.
As shown in fig. 3, the device for managing blockchain keys according to this embodiment includes:
an obtaining module 301, configured to obtain a private key file of a user;
a first collecting module 302, configured to collect first multidimensional user posture information of a user for the private key file, and generate a first multidimensional user posture password according to a first preset rule from the first multidimensional user posture information;
a first encryption module 303, configured to perform first encryption on the private key file by using the first multi-dimensional user configuration password to obtain a first KeyStore file of the private key file;
a hosting module 304, configured to save the first KeyStore file locally and host the first KeyStore file on an upper platform that provides a blockchain service.
Further, the apparatus further comprises:
the search module is used for searching the first KeyStore file locally when a private key request of a user is received;
the second acquisition module is used for acquiring second multi-dimensional user posture information of the user if the first KeyStore file is searched locally;
and the first extraction module is used for extracting a private key file in the first KeyStore file when the second multi-dimensional user posture information accords with the first multi-dimensional user posture password.
Further, after the searching module, the apparatus further comprises:
a first request module, configured to request the upper platform for the first KeyStore file if the first KeyStore file is not searched locally;
the third acquisition module is used for acquiring third multi-dimensional user posture information of the user if the first KeyStore file request from the upper layer platform is successful;
and the second extraction module is used for extracting the private key file in the first KeyStore file when the third multi-dimensional user posture information accords with the first multi-dimensional user posture password.
Further, after the step of requesting the module, the apparatus further comprises:
and the second request module is used for storing the first KeyStore file in a local place if the request for the first KeyStore file from the upper layer platform is successful.
Further, after the step of the second requesting module, the apparatus further comprises:
the first judgment module is used for judging the reason why the first KeyStore file cannot be searched locally;
a third extraction module, configured to, when it is determined that the first multidimensional user body-state password needs to be modified according to the reason, extract the private key file in the first KeyStore file requested by the upper platform;
the fourth acquisition module is used for acquiring fourth multi-dimensional user posture information of the user aiming at the private key file and generating a second multi-dimensional user posture password according to the fourth multi-dimensional user posture information according to a second preset rule;
the second encryption module is used for carrying out second encryption on the private key file by using the second multi-dimensional user posture password to obtain a second KeyStore file of the private key file;
a replacement module to save the second KeyStore file locally and replace the first KeyStore file in the upper platform with the second KeyStore file. .
Further, the first multi-dimensional user posture information includes primary-dimensional user posture information and secondary-dimensional user posture information, and the first acquiring module 302 includes:
the acquisition unit is used for acquiring 1+ N items of user posture information, wherein 1 represents the corresponding main dimension user posture information, N represents the secondary dimension user posture information corresponding to the secondary password factor, and N is greater than or equal to 1;
the first extraction unit is used for extracting a main password factor according to the main dimension user posture information and extracting an auxiliary password factor according to the secondary dimension user posture information when N is equal to 1;
the first fusion unit is used for fusing the main password factor and the auxiliary password factor according to a first preset fusion rule to obtain the first multi-dimensional user posture password;
the second extraction unit is used for extracting a main password factor according to the main dimension user posture information and extracting an auxiliary password factor according to the secondary dimension user posture information when N is larger than 1;
the second fusion unit is used for fusing the auxiliary password factors according to a second preset fusion rule to obtain fused auxiliary password factors;
and the third fusion unit is used for fusing the fusion auxiliary password factor and the main password factor according to a third preset fusion rule to obtain the first multi-dimensional user posture password.
Further, the step of hosting module 304 includes:
a requesting unit for requesting hosting of the first KeyStore file to an upper platform providing a blockchain service;
the acquisition unit is used for acquiring the posture information of a fifth multi-dimensional user hosted by the user aiming at the first KeyStore file when receiving the hosting agreement;
the generating unit is used for generating a third multi-dimensional user posture password according to the fifth multi-dimensional user posture information and a third preset rule;
and the hosting unit is used for sending the third multi-dimensional user posture password to the upper-layer platform so that the upper-layer platform holding the right hosts the first KeyStore file through the third multi-dimensional user posture password.
In the embodiment of the invention, a private key file of a user is obtained; collecting first multi-dimensional user posture information of a user aiming at the private key file, and generating a first multi-dimensional user posture password according to the first multi-dimensional user posture information according to a first preset rule; performing first encryption on the private key file by using the first multi-dimensional user posture password to obtain a first KeyStore file of the private key file; saving the first KeyStore file locally and hosting the first KeyStore file on an upper platform that provides block chain services. The embodiment of the invention mainly has the following beneficial effects: the method comprises the steps of collecting multi-dimensional user posture information of a user aiming at a private key file, generating a multi-dimensional user posture password according to a preset rule by the multi-dimensional user posture information, encrypting the private key file by using the multi-dimensional user posture password to obtain a KeyStore file of the private key file, storing the KeyStore file locally and hosting the KeyStore file on an upper layer platform providing block chain service, so that the trouble that the user cannot operate assets due to the fact that the user loses the KeyStore file is avoided, and meanwhile, the safety of the KeyStore file of the user can be guaranteed to the maximum extent.
In order to solve the above technical problem, an embodiment of the present invention further provides a computer device. Referring to fig. 4, fig. 4 is a block diagram of a basic structure of a computer device according to the present embodiment.
The computer device 4 comprises a memory 41, a processor 42, a network interface 43 communicatively connected to each other via a system bus. It is noted that only computer device 4 having components 41-43 is shown, but it is understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead. As will be understood by those skilled in the art, the computer device is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The computer device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing devices. The computer equipment can carry out man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch panel or voice control equipment and the like.
The memory 41 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the memory 41 may be an internal storage unit of the computer device 4, such as a hard disk or a memory of the computer device 4. In other embodiments, the memory 41 may also be an external storage device of the computer device 4, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the computer device 4. Of course, the memory 41 may also include both internal and external storage devices of the computer device 4. In this embodiment, the memory 41 is generally used for storing an operating system installed in the computer device 4 and various types of application software, such as computer readable instructions of a management method of a blockchain key. Further, the memory 41 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 42 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 42 is typically used to control the overall operation of the computer device 4. In this embodiment, the processor 42 is configured to execute computer readable instructions stored in the memory 41 or process data, for example, execute computer readable instructions of the management method of the blockchain key.
The network interface 43 may comprise a wireless network interface or a wired network interface, and the network interface 43 is generally used for establishing communication connection between the computer device 4 and other electronic devices.
The computer device provided in this embodiment may perform the steps of the above method for managing a blockchain key. The steps of the management method of the blockchain key herein may be steps in the management method of the blockchain key in the various embodiments described above.
In the embodiment of the invention, a private key file of a user is obtained; collecting first multi-dimensional user posture information of a user aiming at the private key file, and generating a first multi-dimensional user posture password according to the first multi-dimensional user posture information according to a first preset rule; performing first encryption on the private key file by using the first multi-dimensional user posture password to obtain a first KeyStore file of the private key file; saving the first KeyStore file locally and hosting the first KeyStore file on an upper platform that provides block chain services. The embodiment of the invention mainly has the following beneficial effects: the method comprises the steps of collecting multi-dimensional user posture information of a user aiming at a private key file, generating a multi-dimensional user posture password according to a preset rule by the multi-dimensional user posture information, encrypting the private key file by using the multi-dimensional user posture password to obtain a KeyStore file of the private key file, storing the KeyStore file locally and hosting the KeyStore file on an upper layer platform providing block chain service, so that the trouble that the user cannot operate assets due to the fact that the user loses the KeyStore file is avoided, and meanwhile, the safety of the KeyStore file of the user can be guaranteed to the maximum extent.
The present invention also provides another embodiment, which is to provide a computer readable storage medium storing computer readable instructions, which are executable by at least one processor to cause the at least one processor to execute the steps of the block chain key management method as described above.
In the embodiment of the invention, a private key file of a user is obtained; collecting first multi-dimensional user posture information of a user aiming at the private key file, and generating a first multi-dimensional user posture password according to the first multi-dimensional user posture information according to a first preset rule; performing first encryption on the private key file by using the first multi-dimensional user posture password to obtain a first KeyStore file of the private key file; saving the first KeyStore file locally and hosting the first KeyStore file on an upper platform that provides block chain services. The embodiment of the invention mainly has the following beneficial effects: the method comprises the steps of collecting multi-dimensional user posture information of a user aiming at a private key file, generating a multi-dimensional user posture password according to a preset rule by the multi-dimensional user posture information, encrypting the private key file by using the multi-dimensional user posture password to obtain a KeyStore file of the private key file, storing the KeyStore file locally and hosting the KeyStore file on an upper layer platform providing block chain service, so that the trouble that the user cannot operate assets due to the fact that the user loses the KeyStore file is avoided, and meanwhile, the safety of the KeyStore file of the user can be guaranteed to the maximum extent.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
It is to be understood that the above-described embodiments are merely illustrative of some, but not restrictive, of the broad invention, and that the appended drawings illustrate preferred embodiments of the invention without limiting its scope. This invention may be embodied in many different forms and, on the contrary, these embodiments are provided so that this disclosure will be thorough and complete. Although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that various changes in the embodiments and modifications can be made, and equivalents may be substituted for elements thereof. All equivalent structures made by using the contents of the specification and the attached drawings of the invention can be directly or indirectly applied to other related technical fields, and are also within the protection scope of the patent of the invention.

Claims (10)

1. A method for managing blockchain keys, comprising the steps of:
acquiring a private key file of a user;
collecting first multi-dimensional user posture information of a user aiming at the private key file, and generating a first multi-dimensional user posture password according to the first multi-dimensional user posture information according to a first preset rule;
performing first encryption on the private key file by using the first multi-dimensional user posture password to obtain a first KeyStore file of the private key file;
saving the first KeyStore file locally and hosting the first KeyStore file on an upper platform that provides block chain services.
2. The method for managing blockchain keys of claim 1, wherein after said steps of saving said first KeyStore file locally and hosting said first KeyStore file on an upper platform providing blockchain services, said method further comprises:
when a private key request of a user is received, the first KeyStore file is searched locally;
if the first KeyStore file is searched locally, second multi-dimensional user posture information of the user is collected;
and when the second multi-dimensional user posture information conforms to the first multi-dimensional user posture password, extracting a private key file in the first KeyStore file.
3. The method for managing blockchain keys according to claim 2, wherein after the step of locally searching the first KeyStore file upon the reception of a private key request of a user, the method further comprises:
if the first KeyStore file cannot be searched locally, requesting the first KeyStore file from the upper-layer platform;
if the first KeyStore file request from the upper-layer platform is successful, acquiring third multi-dimensional user posture information of the user;
and when the third multi-dimensional user posture information conforms to the first multi-dimensional user posture password, extracting a private key file in the first KeyStore file.
4. The method for managing a blockchain key according to claim 3, wherein after the step of requesting the first KeyStore file from the upper platform if the first KeyStore file is not searched locally, the method further comprises:
and if the request of the first KeyStore file to the upper layer platform is successful, storing the first KeyStore file locally.
5. The method for managing block chain keys according to claim 4, wherein after the step of saving the first KeyStore file locally if the request for the first KeyStore file to the upper platform is successful, the method further comprises:
judging the reason why the first KeyStore file cannot be searched locally;
according to the reason, when the first multi-dimensional user posture password needs to be modified, extracting the private key file in the first KeyStore file requested by the upper-layer platform;
acquiring fourth multi-dimensional user posture information of the user aiming at the private key file, and generating a second multi-dimensional user posture password by the fourth multi-dimensional user posture information according to a second preset rule;
performing second encryption on the private key file by using the second multi-dimensional user posture password to obtain a second KeyStore file of the private key file;
saving the second KeyStore file locally and replacing the first KeyStore file in the upper platform with the second KeyStore file.
6. The method for managing a blockchain key according to claim 1, wherein the first multidimensional user configuration information includes primary dimension user configuration information and secondary dimension user configuration information, and the step of collecting the first multidimensional user configuration information of the user for the private key file and generating the first multidimensional user configuration password from the first multidimensional user configuration information according to a first preset rule includes:
acquiring 1+ N items of user posture information, wherein 1 represents the corresponding primary dimension user posture information, N represents the secondary dimension user posture information corresponding to the secondary password factor, and N is greater than or equal to 1;
when N is equal to 1, extracting a main password factor according to the body state information of the main dimension user, and extracting an auxiliary password factor according to the body state information of the secondary dimension user;
fusing the main password factor and the auxiliary password factor according to a first preset fusion rule to obtain the first multi-dimensional user posture password;
when N is larger than 1, extracting a main password factor according to the body state information of the main dimension user, and extracting an auxiliary password factor according to the body state information of the secondary dimension user;
fusing the auxiliary password factors according to a second preset fusion rule to obtain fused auxiliary password factors;
and fusing the fused auxiliary password factor and the main password factor according to a third preset fusion rule to obtain the first multi-dimensional user posture password.
7. The method for managing blockchain keys according to claim 1, wherein said step of hosting the first KeyStore file in an upper platform providing blockchain services includes:
requesting hosting of the first KeyStore file from an upper platform providing blockchain services;
collecting fifth multi-dimensional user posture information hosted by a user aiming at the first KeyStore file when receiving agreement to host;
generating a third multi-dimensional user posture password according to the fifth multi-dimensional user posture information and a third preset rule;
and sending the third multi-dimensional user posture password to the upper layer platform, so that the upper layer platform holding the right hosts the first KeyStore file through the third multi-dimensional user posture password.
8. An apparatus for managing blockchain keys, comprising:
the acquisition module is used for acquiring a private key file of a user;
the first acquisition module is used for acquiring first multi-dimensional user posture information of a user aiming at the private key file and generating a first multi-dimensional user posture password according to the first multi-dimensional user posture information according to a first preset rule;
the first encryption module is used for carrying out first encryption on the private key file by using the first multi-dimensional user posture password to obtain a first KeyStore file of the private key file;
and the hosting module is used for storing the first KeyStore file locally and hosting the first KeyStore file on an upper-layer platform for providing block chain services.
9. A computer device comprising a memory having stored therein computer readable instructions, and a processor which when executed implements the steps of the method for managing blockchain keys of any one of claims 1 to 7.
10. A computer-readable storage medium, having computer-readable instructions stored thereon, which, when executed by a processor, implement the steps of the method for managing blockchain keys according to any one of claims 1 to 7.
CN202111178394.6A 2021-10-10 2021-10-10 Block chain key management method and device and computer equipment Pending CN113922967A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111178394.6A CN113922967A (en) 2021-10-10 2021-10-10 Block chain key management method and device and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111178394.6A CN113922967A (en) 2021-10-10 2021-10-10 Block chain key management method and device and computer equipment

Publications (1)

Publication Number Publication Date
CN113922967A true CN113922967A (en) 2022-01-11

Family

ID=79238632

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111178394.6A Pending CN113922967A (en) 2021-10-10 2021-10-10 Block chain key management method and device and computer equipment

Country Status (1)

Country Link
CN (1) CN113922967A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111082923A (en) * 2019-11-21 2020-04-28 山东爱城市网信息技术有限公司 Private key encryption and decryption trusteeship method, device and medium based on block chain
CN111431713A (en) * 2020-03-27 2020-07-17 财付通支付科技有限公司 Private key storage method and device and related equipment
US10790976B1 (en) * 2018-08-01 2020-09-29 Bloomio Ag System and method of blockchain wallet recovery
CN113051341A (en) * 2019-12-27 2021-06-29 浙江金融资产交易中心股份有限公司 User data storage system and method based on multiple block chains

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10790976B1 (en) * 2018-08-01 2020-09-29 Bloomio Ag System and method of blockchain wallet recovery
CN111082923A (en) * 2019-11-21 2020-04-28 山东爱城市网信息技术有限公司 Private key encryption and decryption trusteeship method, device and medium based on block chain
CN113051341A (en) * 2019-12-27 2021-06-29 浙江金融资产交易中心股份有限公司 User data storage system and method based on multiple block chains
CN111431713A (en) * 2020-03-27 2020-07-17 财付通支付科技有限公司 Private key storage method and device and related equipment

Similar Documents

Publication Publication Date Title
CN103023875B (en) A kind of account management system and method
CN111835511A (en) Data security transmission method and device, computer equipment and storage medium
CN107004080A (en) Environment sensing security token
JP2015528947A (en) Method and system for secure communication of personal information
CN108989346A (en) The effective identity trustship agility of third party based on account concealment authenticates access module
CN101808077B (en) Information security input processing system and method and smart card
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN104346550A (en) Information processing method and electronic equipment
US20180365399A1 (en) Secure authentication of a user of a device during a session with a connected server
CN106487758B (en) data security signature method, service terminal and private key backup server
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN101212301B (en) Authentication device and method
CN103369456A (en) Mobile phone antitheft system and method thereof
CN114996675A (en) Data query method and device, computer equipment and storage medium
CN111445231A (en) Method and device for realizing MOTOpay and electronic equipment
CN104935550A (en) Intelligent electronic commerce user management system technique and operating method thereof
WO2016086708A1 (en) Payment verification method, apparatus and system
US20120272060A1 (en) Electronic file delivering system, relevant mobile communication device, and relevant computer program product
CN114625756A (en) Data query method and device and server
CN113922967A (en) Block chain key management method and device and computer equipment
CN106161365B (en) Data processing method and device and terminal
CN111882425B (en) Service data processing method, device and server
CN114168552A (en) Space sharing method and device based on block chain technology and computer equipment
CN113297557A (en) Account data authorization method, device, equipment and computer readable storage medium
US10320764B2 (en) Magnetic strip modification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination