CN115208676B - Data encryption method and system based on blockchain technology - Google Patents

Data encryption method and system based on blockchain technology Download PDF

Info

Publication number
CN115208676B
CN115208676B CN202210848868.1A CN202210848868A CN115208676B CN 115208676 B CN115208676 B CN 115208676B CN 202210848868 A CN202210848868 A CN 202210848868A CN 115208676 B CN115208676 B CN 115208676B
Authority
CN
China
Prior art keywords
information
key
formula
public
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210848868.1A
Other languages
Chinese (zh)
Other versions
CN115208676A (en
Inventor
贺江涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chinasoft Aviation Data Technology Zhuhai Hengqin Co ltd
Original Assignee
Chinasoft Aviation Data Technology Zhuhai Hengqin Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chinasoft Aviation Data Technology Zhuhai Hengqin Co ltd filed Critical Chinasoft Aviation Data Technology Zhuhai Hengqin Co ltd
Priority to CN202210848868.1A priority Critical patent/CN115208676B/en
Publication of CN115208676A publication Critical patent/CN115208676A/en
Application granted granted Critical
Publication of CN115208676B publication Critical patent/CN115208676B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Abstract

The application provides a data encryption method and system based on a blockchain technology, and relates to the technical field of blockchain encryption. The method comprises the steps that a preset formula editing box is included, when a user self-defines a formula and then stores the formula, when a node client sends information, a sending result is calculated by taking a time point at the moment as a variable, and the sending result is inserted into a secret key; encrypting the private information, encrypting the public information by using a public key and transmitting the public information; after the node client receives the encrypted information, extracting a digital signature through a public key of the node client of the transmitting end, and decrypting and verifying the digital signature; then decrypting the encrypted information through the private key of the user, and reading the public information; when the user changes the node client to log in, the user inputs the transmission secret key according to the formula and the time point at the moment, and authorizes the execution of the operation on the private information. The method can ensure that the user only needs to memorize the secret key and the formula and complete different password inputs each time, thereby ensuring the security of the secret key.

Description

Data encryption method and system based on blockchain technology
Technical Field
The application relates to the technical field of block chain encryption, in particular to a data encryption method and system based on a block chain technology.
Background
The blockchain is also called as a distributed account book and is an internet database, and is characterized by decentralization, transparent disclosure, and no node can participate in database record, and meanwhile, the data cannot be tampered. The characteristics of the blockchain provide a new solution for data storage and maintenance. The new generation blockchain can realize the exchange and sharing of information on the premise of not needing a third party to trust an authentication mechanism, thereby achieving the trust among people, changing the production relationship and mainly existing in the modes of public chains, alliance chains and private chains.
In the prior art, for the blockchain encryption technology of public chains, asymmetric encryption is mainly adopted, namely, a public key can only check information allowed by a user, and a private key can perform operations such as account transfer and the like; wherein the private key becomes the only credential that the user has to the own account. Since the key is the same as the common login password, but the frequency is not as high as that of the login password, the risk of key theft is gradually increased along with the development of the current computer technology, and particularly, for means for reading the login information in the computer, such as forging the same login window, the user inputs the key. Or a person steals a keyboard input by a user, etc., which causes a loss due to key leakage, a data encryption method and an encryption system based on a blockchain technology are needed.
Disclosure of Invention
The application aims to provide a data encryption method based on a block chain technology, which can ensure that a user only needs to memorize a secret key and a formula and complete different password inputs each time, thereby ensuring the security of the secret key.
Embodiments of the present application are implemented as follows:
in a first aspect, an embodiment of the present application provides a data encryption method based on a blockchain technology, which includes presetting a plurality of node clients connected by a public chain, wherein a private key and a public key are preset in the node clients, and the weight of the public key operation authority is smaller than that of the private key; presetting a formula editing frame, and setting time as a variable; after a user customizes a formula, a node client saves the formula, the node client divides user information in the client into public information and private information, and the formula is attributed to the private information; when any node client transmits information, activating a formula, calculating a transmission result according to the time point serving as a variable at the moment, and inserting the transmission result into a preset position in a private key; obtaining a transmission secret key, and encrypting the private information by using the transmission secret key to obtain a first encryption value; encrypting the public information by using the public key of the node client to obtain a second encryption value, and generating and transmitting the encryption information; after any node client receives the encrypted information, extracting a digital signature through a public key of the node client of the transmitting end, and decrypting and verifying the digital signature; then decrypting the encrypted information through the private key of the user, reading the public information, and synchronously storing the content of the encrypted information; when the user changes the node client to log in, the user prompts to input the secret key, and the user inputs the transmission secret key according to the formula and the time point at the moment, so that the user is authorized to execute the operation on the private information.
In some embodiments of the present application, the private information is encrypted using a transmission key to obtain a first encrypted value; encrypting the public information by using the public key of the node client to obtain a second encrypted value, and generating and transmitting the encrypted information comprises the following steps: carrying out hash encryption on the private information by using the transmission key to obtain a first encryption value; and carrying out hash encryption on the public information by utilizing the public key of the node client to obtain a second encryption value, adding the second encryption value to the first encryption value to obtain encryption information, and transmitting the encryption information.
In some embodiments of the present application, the step of authorizing the private information to be performed includes the steps of: and (3) presetting a time range, calculating a result range according to a formula in the time range, finding an inserted transmission result at a preset position in the transmission secret key, replacing the transmission result with a value in the result range to obtain a plurality of comparison transmission secret keys, comparing the input transmission secret key with the plurality of comparison transmission secret keys by a user, and authorizing to execute the operation on the private information if any transmission secret keys are identical.
In some embodiments of the application, any time within the time frame includes year information, month information, and minute information.
In some embodiments of the present application, the step after the user has customized the formula further comprises:
and popping up a verification prompt box, giving out a plurality of assumption moments, displaying prompt characters, and storing the formula by the node client after the user inputs a result correspondingly calculated according to the formula and the assumption moments.
In some embodiments of the present application, face recognition verification is provided in the node client, and when the user performs the face recognition verification, the client use authority is opened.
In some embodiments of the application, further comprising: the preset monitoring platform is connected with the public chain, is set to be normally open, is used as a node to synchronously acquire all encrypted information, and sends reminding mails to users used on the node clients when the transaction frequency of any node client exceeds a preset threshold.
In a second aspect, an embodiment of the present application provides a data encryption system based on a blockchain technology, which includes a preset module, configured to preset a plurality of node clients connected by a public chain, where a private key and a public key are preset in the node clients, and the weight of the public key operation authority is smaller than that of the private key; the formula self-defining module is used for presetting a formula editing frame and setting time as a variable; after a user customizes a formula, a node client saves the formula, the node client divides user information in the client into public information and private information, and the formula is attributed to the private information; the sending module is used for activating a formula when any node client sends information, calculating a sending result according to the time point serving as a variable at the moment, and inserting the sending result into a preset position in the private key; obtaining a transmission secret key, and encrypting the private information by using the transmission secret key to obtain a first encryption value; encrypting the public information by using the public key of the node client to obtain a second encryption value, and generating and transmitting the encryption information; the receiving module is used for extracting the digital signature through the public key of the node client of the sending end after any node client receives the encrypted information, and decrypting and verifying the digital signature; then decrypting the encrypted information through the private key of the user, reading the public information, and synchronously storing the content of the encrypted information; the exchange client detection module is used for prompting to input a secret key after a user exchanges the node client to log in, and the user inputs the transmission secret key according to a formula and the time point at the moment to authorize the execution of the operation on the private information.
In a third aspect, an embodiment of the present application provides an electronic device comprising at least one processor, at least one memory, and a data bus; wherein: the processor and the memory complete the communication with each other through a data bus; the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform a data encryption method based on blockchain technology.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a data encryption method based on blockchain technology.
Compared with the prior art, the embodiment of the application has at least the following advantages or beneficial effects:
aiming at the problem of preventing the disclosure of the secret key, the principle of the design is to utilize a user-defined formula, take the moment as a variable, calculate a result and insert the result into a preset position of the secret key, so as to realize that the input of the secret key is continuously changed, thereby only revealing the secret key at the moment even if the input secret key is revealed, and the thief cannot operate the account number of the user by utilizing the same secret key after the time. The key is added with a section of cipher irrelevant to the content, but the key is started by dynamically verifying the irrelevant cipher, and the user only needs to memorize the key and the formula, so that the cipher input is different each time, and the security of the key is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a block chain technology based data encryption method in the present application;
FIG. 2 is another flow chart of a block chain technology based data encryption method in accordance with the present application;
FIG. 3 is a flow chart of a block chain technology based data encryption method according to the present application;
FIG. 4 is a schematic diagram of a block chain technology based data encryption system according to the present application;
fig. 5 is a schematic structural diagram of an electronic device according to the present application.
Icon: 1. a preset module; 2. the formula self-defining module; 3. a transmitting module; 4. a receiving module; 5. replacing the client detection module; 6. a processor; 7. a memory; 8. a data bus.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. The components of the embodiments of the present application generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the application, as presented in the figures, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only to distinguish the description, and are not to be construed as indicating or implying relative importance.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the description of the present application, it should also be noted that, unless explicitly specified and limited otherwise, the terms "disposed", "connected" and "connected" are to be construed broadly, and may be, for example, fixedly connected, detachably connected or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present application will be understood in specific cases by those of ordinary skill in the art.
Some embodiments of the present application are described in detail below with reference to the accompanying drawings. The various embodiments and features of the embodiments described below may be combined with one another without conflict.
Example 1
Referring to fig. 1, in order to solve the problem of key leakage, the principle of the present application is to use a user-defined formula, and use the moment as a variable, so as to calculate a result and insert the result into a preset position of a key, so as to realize that the input of the key is continuously changed, thereby only leaking the key at this time even if the input key is leaked, and the thief cannot operate the account of the user by using the same key after the time. The key is added with a section of cipher irrelevant to the content, but the key is started by dynamically verifying the irrelevant cipher, and the user only needs to memorize the key and the formula, so that the cipher input is different each time, and the security of the key is ensured.
S1: presetting a plurality of node clients connected by public chains, wherein a private key and a public key are preset in the node clients, and the weight of public key operation authority is smaller than that of the private key;
rights to public keys this design is primarily for querying transaction information, while private keys are related operations that govern assets within a user account, such as purchases or sales, etc.
S2: presetting a formula editing frame, and setting time as a variable; after a user customizes a formula, a node client saves the formula, the node client divides user information in the client into public information and private information, and the formula is attributed to the private information;
in addition, as the moment of inputting is used as a variable for inputting the formula, on the basis of the moment, any formula can be obtained by induction only by taking multiple inputs of a user, and in principle, the more complex the formula is, the more times the thief needs to obtain the password input by the user, and the higher the security is. However, the blockchain technique is applied to transactions mostly, but the transactions of the virtual property are not frequent for individuals, so that the data collected by the thief cannot be summarized and deduced from the general formula.
S3: when any node client transmits information, activating a formula, calculating a transmission result according to the time point serving as a variable at the moment, and inserting the transmission result into a preset position in a private key; obtaining a transmission secret key, and encrypting the private information by using the transmission secret key to obtain a first encryption value; encrypting the public information by using the public key of the node client to obtain a second encryption value, and generating and transmitting the encryption information;
for example, the user-defined formula is:
y=x 2 +1
where x is the time variable and y is the result. Taking the example of the time of 1992, 9/14, the time may be converted into a binary value or sixteen values, for example, 19920914. The design adopts 16-system conversion for calculation, but is described in direct shorthand for convenience of explanation. From the above formula, y is equal to 396842814595397, the private key is fixed with 64 characters:
"453dfc e06c5f6a5927ca8996d53094f528948ec39ca8ed12fb76ae3a532bbfe" is exemplified; any position can be selected as the position, and the position can be recorded by the client. For example, to the tail, the result is as follows:
"453dfc e06c5f6a5927ca8996d53094f528948ec39ca8ed12fb76ae3a532bbfe396842814595397", thereby realizing dynamic change of the secret key, and then the subsequent encryption is to encrypt the public information and the private information respectively.
S4: after any node client receives the encrypted information, extracting a digital signature through a public key of the node client of the transmitting end, and decrypting and verifying the digital signature; then decrypting the encrypted information through the private key of the user, reading the public information, and synchronously storing the content of the encrypted information;
the blockchain requirement synchronizes all billing information per node, thereby extracting the digital signature with the public key of the node client to read the public information.
S5: when the user changes the node client to log in, the user prompts to input the secret key, and the user inputs the transmission secret key according to the formula and the time point at the moment, so that the user is authorized to execute the operation on the private information.
Finally, only the transmission secret key is required to be input after the port is replaced, which is equivalent to the fact that the main formula for determining the secret key only needs to be written in when registering for the first time, and because of the synchronization of the blockchain technology, the secret key can be safely used only by inputting according to the formula after the client is replaced, namely, the secret key is not required to be stolen, namely, the user remembers the secret key fixing code and the formula, rather than remembers a fixed secret key as in the prior art, and the safety is improved.
Referring to fig. 2, in some embodiments of the present application, the private information is encrypted by using a transmission key to obtain a first encrypted value; encrypting the public information by using the public key of the node client to obtain a second encrypted value, and generating and transmitting the encrypted information comprises the following steps:
s31: carrying out hash encryption on the private information by using the transmission key to obtain a first encryption value; and carrying out hash encryption on the public information by utilizing the public key of the node client to obtain a second encryption value, adding the second encryption value to the first encryption value to obtain encryption information, and transmitting the encryption information.
Wherein the present design employs hashing during encryption, which is essentially a process of converting input data into a random string of fixed length (hash value). The hash, also known as a digital fingerprint, has three features: firstly, the hash value after hashing the input data cannot reversely deduce or identify the original input data; secondly, the length of the input data can be arbitrary, but the length of the hashed hash value is fixed; thirdly, two different input data cannot be generated into the same hash value after being hashed. Wherein the first encrypted value and the second encrypted value are both hash values.
Referring to fig. 3, in some embodiments of the present application, the step of authorizing the private information to be performed includes:
s51: and (3) presetting a time range, calculating a result range according to a formula in the time range, finding an inserted transmission result at a preset position in the transmission secret key, replacing the transmission result with a value in the result range to obtain a plurality of comparison transmission secret keys, comparing the input transmission secret key with the plurality of comparison transmission secret keys by a user, and authorizing to execute the operation on the private information if any transmission secret keys are identical.
The time range is mainly considered, and compared with a more complex calculation formula, the calculation at one moment can not calculate the result in time, so that the time range is set when the result is compared, for example, after the input transmission key is received, the result in the first five minutes of the moment can pass.
In some embodiments of the application, any time within the time frame includes year information, month information, and minute information. Because the key must appear repeatedly within 60 minutes if only minutes are available in the time variable, only minutes and months must appear a key repetition at the same time in 1 year, and after all three are available, no fixed repetition exists basically.
In some embodiments of the present application, the step after the user has customized the formula further comprises: and popping up a verification prompt box, giving out a plurality of assumption moments, displaying prompt characters, and storing the formula by the node client after the user inputs a result correspondingly calculated according to the formula and the assumption moments. The method mainly verifies the formula input by the user to avoid the problem that the secret key cannot be used due to the fact that the formula is input incorrectly.
In some embodiments of the present application, face recognition verification is provided in the node client, and when the user performs the face recognition verification, the client use authority is opened.
In some embodiments of the application, further comprising: the preset monitoring platform is connected with the public chain, is set to be normally open, is used as a node to synchronously acquire all encrypted information, and sends reminding mails to users used on the node clients when the transaction frequency of any node client exceeds a preset threshold. The method aims at improving the use safety of the client.
Example 2
Referring to fig. 4, a data encryption system based on a blockchain technology provided by the application includes a preset module 1, configured to preset a plurality of node clients connected by a public chain, wherein a private key and a public key are preset in the node clients, and the weight of the public key operation authority is smaller than that of the private key; the formula custom module 2 is used for presetting a formula edit box and setting time as a variable; after a user customizes a formula, a node client saves the formula, the node client divides user information in the client into public information and private information, and the formula is attributed to the private information; the sending module 3 is used for activating a formula when any node client sends information, calculating a sending result according to the time point serving as a variable at the moment, and inserting the sending result into a preset position in the private key; obtaining a transmission secret key, and encrypting the private information by using the transmission secret key to obtain a first encryption value; encrypting the public information by using the public key of the node client to obtain a second encryption value, and generating and transmitting the encryption information; the receiving module 4 is used for extracting the digital signature through the public key of the node client of the sending end after any node client receives the encrypted information, and decrypting and verifying the digital signature; then decrypting the encrypted information through the private key of the user, reading the public information, and synchronously storing the content of the encrypted information; the replacement client detection module 5 is configured to prompt the user to input a key after logging in the replacement node client, and the user inputs the transmission key according to the formula and the time point at the time point, thereby authorizing the user to execute the operation on the private information.
Example 3
Referring to fig. 5, an electronic device according to the present application includes at least one processor 6, at least one memory 7, and a data bus 8; wherein: the processor 6 and the memory 7 complete the communication with each other through the data bus 8; the memory 7 stores program instructions executable by the processor 6, which the processor 6 invokes to perform a data encryption method based on blockchain technology.
For example, implementation:
presetting a plurality of node clients connected by public chains, wherein a private key and a public key are preset in the node clients, and the weight of public key operation authority is smaller than that of the private key; presetting a formula editing frame, and setting time as a variable; after a user customizes a formula, a node client saves the formula, the node client divides user information in the client into public information and private information, and the formula is attributed to the private information; when any node client transmits information, activating a formula, calculating a transmission result according to the time point serving as a variable at the moment, and inserting the transmission result into a preset position in a private key; obtaining a transmission secret key, and encrypting the private information by using the transmission secret key to obtain a first encryption value; encrypting the public information by using the public key of the node client to obtain a second encryption value, and generating and transmitting the encryption information; after any node client receives the encrypted information, extracting a digital signature through a public key of the node client of the transmitting end, and decrypting and verifying the digital signature; then decrypting the encrypted information through the private key of the user, reading the public information, and synchronously storing the content of the encrypted information; when the user changes the node client to log in, the user prompts to input the secret key, and the user inputs the transmission secret key according to the formula and the time point at the moment, so that the user is authorized to execute the operation on the private information.
Example 4
The present application provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor 6, implements a data encryption method based on blockchain technology. For example, implementation:
presetting a plurality of node clients connected by public chains, wherein a private key and a public key are preset in the node clients, and the weight of public key operation authority is smaller than that of the private key; presetting a formula editing frame, and setting time as a variable; after a user customizes a formula, a node client saves the formula, the node client divides user information in the client into public information and private information, and the formula is attributed to the private information; when any node client transmits information, activating a formula, calculating a transmission result according to the time point serving as a variable at the moment, and inserting the transmission result into a preset position in a private key; obtaining a transmission secret key, and encrypting the private information by using the transmission secret key to obtain a first encryption value; encrypting the public information by using the public key of the node client to obtain a second encryption value, and generating and transmitting the encryption information; after any node client receives the encrypted information, extracting a digital signature through a public key of the node client of the transmitting end, and decrypting and verifying the digital signature; then decrypting the encrypted information through the private key of the user, reading the public information, and synchronously storing the content of the encrypted information; when the user changes the node client to log in, the user prompts to input the secret key, and the user inputs the transmission secret key according to the formula and the time point at the moment, so that the user is authorized to execute the operation on the private information.
The above description is only of the preferred embodiments of the present application and is not intended to limit the present application, but various modifications and variations can be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.
It will be evident to those skilled in the art that the application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (8)

1. A data encryption method based on a block chain technology is characterized by comprising the following steps of
Presetting a plurality of node clients connected by public chains, wherein a private key and a public key are preset in the node clients, and the weight of the operation authority of the public key is smaller than that of the private key;
presetting a formula editing frame, and setting time as a variable; after a user customizes a formula, the node client saves the formula, the node client divides user information in the client into public information and private information, and the formula is attributed to the private information;
when any node client transmits information, activating the formula, calculating a transmission result according to the time point serving as a variable at the moment, and inserting the transmission result into a preset position in a private key; obtaining a transmission secret key, and encrypting private information by using the transmission secret key to obtain a first encryption value; encrypting the public information by using the public key of the node client to obtain a second encryption value, and generating and transmitting the encryption information;
after any node client receives the encrypted information, extracting a digital signature through a public key of the node client of the sending end, and decrypting and verifying the digital signature; decrypting the encrypted information through a private key of the user, reading the public information, and synchronously storing the content of the encrypted information;
after a user changes a node client to log in, prompting to input a secret key, and authorizing the user to execute the operation on the private information according to the formula and the transmission secret key input at the moment;
wherein:
encrypting the private information by using the transmission secret key to obtain a first encryption value; encrypting the public information by using the public key of the node client to obtain a second encrypted value, and generating and transmitting the encrypted information comprises the following steps:
carrying out hash encryption on the private information by utilizing the transmission secret key to obtain a first encryption value; carrying out hash encryption on the public information by utilizing the public key of the node client to obtain a second encryption value, adding the second encryption value to the first encryption value to obtain encryption information, and transmitting the encryption information;
the user inputs the transmission key according to the formula and the time point at the moment, and the step of authorizing the private information to be executed comprises the following steps:
and (3) a preset time range, calculating a result range according to the formula in the time range, finding the inserted transmission result at the preset position in the transmission secret key, replacing the transmission result with a value in the result range to obtain a plurality of comparison transmission secret keys, comparing the transmission secret key input by a user with the plurality of comparison transmission secret keys, and authorizing to execute the operation on the private information if any transmission secret key is the same.
2. The method for encrypting data based on the blockchain technique as recited in claim 1, wherein any one of the time frames includes year information, month information and minute information.
3. The method for encrypting data based on blockchain technology as in claim 1, wherein the step after the user custom formula further comprises:
and popping up a verification prompt box, giving out a plurality of assumption moments, displaying prompt characters, and storing the formula by the node client after a user inputs a result correspondingly calculated according to the formula and the assumption moments.
4. The data encryption method based on the blockchain technology as in claim 1, wherein the node client is internally provided with face recognition verification, and when the user performs the face verification, the client use authority is opened.
5. The method for encrypting data based on blockchain technology of claim 1, further comprising:
the preset monitoring platform is connected with the public chain, is set to be normally open, is used as a node to synchronously acquire all the encrypted information, and sends reminding mails to users used on the node clients when the transaction frequency of any node client exceeds a preset threshold.
6. A blockchain technology-based data encryption system, comprising:
the system comprises a presetting module, a public key and a public key, wherein the presetting module is used for presetting a plurality of node clients connected by a public chain, a private key and the public key are preset in the node clients, and the weight of the public key operation authority is smaller than that of the private key;
the formula self-defining module is used for presetting a formula editing frame and setting time as a variable; after a user customizes a formula, the node client saves the formula, the node client divides user information in the client into public information and private information, and the formula is attributed to the private information;
the sending module is used for activating the formula when any node client sends information, calculating a sending result according to the time point serving as a variable at the moment, and inserting the sending result into a preset position in a private key; obtaining a transmission secret key, and encrypting private information by using the transmission secret key to obtain a first encryption value; encrypting the public information by using the public key of the node client to obtain a second encryption value, and generating and transmitting the encryption information; specifically, the private information is hashed and encrypted by using the transmission secret key to obtain a first encryption value; carrying out hash encryption on the public information by utilizing the public key of the node client to obtain a second encryption value, adding the second encryption value to the first encryption value to obtain encryption information, and transmitting the encryption information;
the receiving module is used for extracting a digital signature through the public key of the node client of the sending end after any node client receives the encrypted information, and decrypting and verifying the digital signature; decrypting the encrypted information through a private key of the user, reading the public information, and synchronously storing the content of the encrypted information;
the exchange client detection module is used for prompting to input a secret key after a user exchanges the node client to log in, the user inputs the transmission secret key according to the formula and the time point at the moment, the user authorizes to execute the operation on the private information, specifically, a preset time range, a calculation result range is calculated according to the formula in the time range, an inserted sending result is found at the preset position in the transmission secret key, the sending result is replaced by a value in the result range, a plurality of comparison transmission secret keys are obtained, the user compares the transmission secret key according to the input with the plurality of comparison transmission secret keys, and if any transmission secret key is the same, the user authorizes to execute the operation on the private information.
7. An electronic device comprising at least one processor, at least one memory, and a data bus; wherein: the processor and the memory complete communication with each other through the data bus; the memory stores program instructions for execution by the processor, the processor invoking the program instructions to perform the method of any of claims 1-5.
8. A computer readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, implements the method according to any of claims 1-5.
CN202210848868.1A 2022-07-19 2022-07-19 Data encryption method and system based on blockchain technology Active CN115208676B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210848868.1A CN115208676B (en) 2022-07-19 2022-07-19 Data encryption method and system based on blockchain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210848868.1A CN115208676B (en) 2022-07-19 2022-07-19 Data encryption method and system based on blockchain technology

Publications (2)

Publication Number Publication Date
CN115208676A CN115208676A (en) 2022-10-18
CN115208676B true CN115208676B (en) 2023-09-08

Family

ID=83581319

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210848868.1A Active CN115208676B (en) 2022-07-19 2022-07-19 Data encryption method and system based on blockchain technology

Country Status (1)

Country Link
CN (1) CN115208676B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116663041B (en) * 2023-07-28 2023-10-31 青岛农村商业银行股份有限公司 RPA flow robot data intelligent processing method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104202160A (en) * 2014-09-09 2014-12-10 南京联创科技集团股份有限公司 CPU (Central Processing Unit) card online recharge encryption communication method
CN109559122A (en) * 2018-12-07 2019-04-02 北京瑞卓喜投科技发展有限公司 Block chain data transmission method and block chain data transmission system
CN109639406A (en) * 2018-12-24 2019-04-16 国泰君安证券股份有限公司 Efficient trust solution based on block chain and IPFS
CN109905247A (en) * 2019-03-28 2019-06-18 郑州师范学院 Digital signature method, device, equipment and storage medium based on block chain
CN111404950A (en) * 2020-03-23 2020-07-10 腾讯科技(深圳)有限公司 Information sharing method and device based on block chain network and related equipment
CN111949735A (en) * 2020-08-26 2020-11-17 鲁泽军 System and method for realizing data query by applying account book of block chain
CN114401117A (en) * 2021-12-27 2022-04-26 浙江数秦科技有限公司 Account login verification system based on block chain
JP2022091158A (en) * 2021-07-26 2022-06-20 克弥 西沢 Authentication program for dynamic password created on the basis of distribution type ledger

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8555400B2 (en) * 2011-02-04 2013-10-08 Palo Alto Research Center Incorporated Privacy-preserving aggregation of Time-series data
US20210336839A1 (en) * 2017-05-24 2021-10-28 3S International, Llc. Method of scaling reliability of computing network
CN109462472A (en) * 2017-09-06 2019-03-12 阿里巴巴集团控股有限公司 The methods, devices and systems of data encryption and decryption

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104202160A (en) * 2014-09-09 2014-12-10 南京联创科技集团股份有限公司 CPU (Central Processing Unit) card online recharge encryption communication method
CN109559122A (en) * 2018-12-07 2019-04-02 北京瑞卓喜投科技发展有限公司 Block chain data transmission method and block chain data transmission system
CN109639406A (en) * 2018-12-24 2019-04-16 国泰君安证券股份有限公司 Efficient trust solution based on block chain and IPFS
CN109905247A (en) * 2019-03-28 2019-06-18 郑州师范学院 Digital signature method, device, equipment and storage medium based on block chain
CN111404950A (en) * 2020-03-23 2020-07-10 腾讯科技(深圳)有限公司 Information sharing method and device based on block chain network and related equipment
CN111949735A (en) * 2020-08-26 2020-11-17 鲁泽军 System and method for realizing data query by applying account book of block chain
JP2022091158A (en) * 2021-07-26 2022-06-20 克弥 西沢 Authentication program for dynamic password created on the basis of distribution type ledger
CN114401117A (en) * 2021-12-27 2022-04-26 浙江数秦科技有限公司 Account login verification system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链技术在物联网中的身份认证研究;杨惠杰;《中兴通讯技术》;全文 *

Also Published As

Publication number Publication date
CN115208676A (en) 2022-10-18

Similar Documents

Publication Publication Date Title
US11824991B2 (en) Securing transactions with a blockchain network
Chen et al. Mobile device integration of a fingerprint biometric remote authentication scheme
US7895443B2 (en) Secure authentication using hardware token and computer fingerprint
US20080216172A1 (en) Systems, methods, and apparatus for secure transactions in trusted systems
US20060036857A1 (en) User authentication by linking randomly-generated authentication secret with personalized secret
CN101145911B (en) Identity authentication method with privacy protection and password retrieval function
CN102132288A (en) Biometric authentication system and method therefor
CN107359998A (en) A kind of foundation of portable intelligent password management system and operating method
US20140258718A1 (en) Method and system for secure transmission of biometric data
EP2758922A2 (en) Securing transactions against cyberattacks
CN106953732A (en) The key management system and method for chip card
CN106059764B (en) Based on the password and fingerprint tripartite's authentication method for terminating key derivation functions
CN115208676B (en) Data encryption method and system based on blockchain technology
CN110771190A (en) Controlling access to data
CA2981202C (en) Hashed data retrieval method
CN111159774A (en) Decentralized intelligent contract escrow wallet method and system
US11502840B2 (en) Password management system and method
CN111212068B (en) Method for encrypting and decrypting characters by input method
Derksen et al. Backup and Recovery of IRMA Credentials
CN111552940A (en) Data transmission system and method based on security module
Hire et al. Security of user credentials on web portals
Akram et al. A usable and secure two-factor authentication scheme
CN110689351A (en) Financial service verification system and financial service verification method
US20230104633A1 (en) Management system and method for user authentication on password based systems
Bhujade et al. Analysis and implementation of combined approach of RSA and ECC algorithm for enhanced data security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant