WO2020173274A1 - 一种存储、调用区块链账户私钥的方法及装置 - Google Patents

一种存储、调用区块链账户私钥的方法及装置 Download PDF

Info

Publication number
WO2020173274A1
WO2020173274A1 PCT/CN2020/073740 CN2020073740W WO2020173274A1 WO 2020173274 A1 WO2020173274 A1 WO 2020173274A1 CN 2020073740 W CN2020073740 W CN 2020073740W WO 2020173274 A1 WO2020173274 A1 WO 2020173274A1
Authority
WO
WIPO (PCT)
Prior art keywords
private key
user
account
private
key
Prior art date
Application number
PCT/CN2020/073740
Other languages
English (en)
French (fr)
Inventor
李艳鹏
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Priority to SG11202104312UA priority Critical patent/SG11202104312UA/en
Priority to EP20763626.7A priority patent/EP3852042A4/en
Publication of WO2020173274A1 publication Critical patent/WO2020173274A1/zh
Priority to US17/244,801 priority patent/US11251961B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/326Payment applications installed on the mobile devices
    • G06Q20/3263Payment applications installed on the mobile devices characterised by activation or deactivation of payment capabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/363Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Definitions

  • the embodiments of this specification relate to the field of information technology, and in particular, to a method and device for storing a private key of a blockchain account. Background technique
  • users In the service mode based on the blockchain network, users generally need to register a blockchain account (or user account) in the blockchain network, and need to keep the account private key of the registered blockchain account.
  • the account private key of the blockchain account is mainly used to sign transactions initiated by the blockchain account.
  • a method for storing a private key of a blockchain account including:
  • a private key management program installed on the user's user equipment obtains a private key set; the private key set includes at least one account private key of the blockchain account registered by the user;
  • [08] Use the encryption key to encrypt the private key set, and store the encrypted private key set.
  • a method for invoking an account private key stored based on the method of the first aspect including:
  • the private key management program obtains the decryption key provided by the user
  • a private key management program is installed on the user's user equipment.
  • the private key management program is responsible for encrypted storage of the user's blockchain account private key.
  • Private key to user's blockchain account The encryption key used to perform the encryption is specified by the user.
  • a user wants to use his own blockchain account private key, he needs to provide the decryption key corresponding to the encryption key to the private key management program, so that the private key management program can provide the decrypted account private key to the user. use.
  • [15] The user does not need to memorize the storage location of his account private key on the disk, and it will not find his account private key. Since the account private key is stored by the private key management program, when the user needs to use the account private key, he can directly request the private key management program.
  • the private key management program will use the encryption key specified by the user to encrypt the account private key. If anyone other than the user cannot provide the decryption key corresponding to the encryption key to the private key management program, they cannot call the user's account private key.
  • FIG. 1 is a schematic flowchart of a method for storing a private key of a blockchain account according to an embodiment of this specification
  • FIG. 2 is a schematic flowchart of a method for invoking a blockchain account private key provided by an embodiment of this specification
  • FIG. 3 is a schematic structural diagram of a device for storing a private key of a blockchain account according to an embodiment of this description
  • FIG. 4 is a schematic structural diagram of a device for invoking a blockchain account private key provided by an embodiment of this specification
  • FIG. 5 is a schematic structural diagram of a computer device used to configure the device in the embodiment of this specification. detailed description
  • a private key management program is introduced, and the private key management program is installed on the user's user equipment.
  • the user provides the account private key that needs to be stored to the private key manager for safekeeping, and at the same time assigns an encryption key to the private key manager.
  • the private key manager uses the encryption key to encrypt the account private key and stores it in the disk of the user device.
  • the encrypted stored account private key needs to be decrypted only by the decryption key known to the user.
  • the private key manager can retrieve the account private key from the storage location of the account private key at any time at the user’s request The private key of the account will not be found.
  • FIG. 1 is a schematic flowchart of a method for storing a private key of a blockchain account according to an embodiment of this specification, including the following steps:
  • S100 The private key management program installed on the user's user device obtains the private key collection.
  • the private key manager is a program responsible for keeping the private key of the blockchain account registered by the user (hereinafter referred to as the account private key).
  • the number of user account private keys can be more than one.
  • the private key management program needs to keep the private key set containing at least one account private key entered by the user.
  • the set of private keys further includes at least one account private key provided to the user by another user; for each other user, the account private key provided to the user by the other user is registered by the other user The account private key of the blockchain account.
  • the user also needs to input an encryption key to the private key management program, which is used for encryption of the private key of the account.
  • the encryption key is generally a symmetric encryption key, but may also be an asymmetric encryption key.
  • S104 Use the encryption key to encrypt the private key set, and store the encrypted private key set Together.
  • FIG. 2 is a schematic flowchart of a method for invoking a blockchain account private key provided by an embodiment of this specification, including the following steps:
  • S200 The private key management program obtains the decryption key provided by the user.
  • the decryption key has a corresponding relationship with the encryption key described above. That is, the decryption key is used to decrypt the data encrypted by the encryption key.
  • the private key management program may also obtain the identification information provided by the user, and then establish and store the association relationship between the identification information and the private key set .
  • the identification information is information used to identify the user's identity, such as the user's mobile phone number, ID number, and so on.
  • the identity recognition information may specifically be biometric information of the user, such as fingerprint information, face information, and so on.
  • the key management program may store the encrypted private key set after obtaining the identification information provided by the user. That is to say, if the user refuses to provide his identity information to the key management program (that is, refuses to perform real-name authentication), then the key manager refuses to store the private key set provided by the user.
  • the key management program can obtain the identity information provided by the user before using the decryption key to decrypt the encrypted private key set; It is determined whether the identification information provided by the user matches the identification information associated with the private key set. In other words, before the key management program decrypts the stored private key set, it needs to confirm that the person who currently requests to obtain the private key set is the owner of the private key set.
  • the key management program uses the decryption key to decrypt the encrypted private key set; if If the identity information provided by the user does not match the identity information associated with the private key set, the key management program refuses to use the decryption key to decrypt the encrypted private key set.
  • FIG. 3 is a schematic structural diagram of a device for storing a private key of a blockchain account according to an embodiment of the present description.
  • the device is installed on a user's user equipment, and the device includes:
  • the first obtaining module 301 obtains a set of private keys; the set of private keys includes at least one account private key of the blockchain account registered by the user;
  • the second obtaining module 302 obtains the encryption key provided by the user
  • the encryption storage module 303 uses the encryption key to encrypt the private key set, and stores the encrypted private key set.
  • the private key set also includes at least one account private key provided to the user by another user; for each other user, the account private key provided to the user by the other user is a block registered by the other user The account private key of the chain account.
  • the method further includes:
  • the third obtaining module 304 obtains the identity information provided by the user; establishes and stores the association relationship between the identity information and the private key set.
  • the encrypted storage module 303 stores the encrypted private key set after obtaining the identification information provided by the user.
  • FIG. 4 is a schematic structural diagram of a device for invoking a private key of a blockchain account provided by an embodiment of the present specification.
  • the device is installed on a user's user equipment, and the device includes:
  • the obtaining module 401 which obtains the decryption key provided by the user;
  • a decryption module 402 which uses the decryption key to decrypt the encrypted private key set
  • the return module 403 returns the decrypted private key set to the user.
  • the device further includes: an identity verification module 404, before using the decryption key to decrypt the encrypted private key set, obtain the identity information provided by the user; and determine the identity information provided by the user Whether the identification information matches the identification information associated with the private key set;
  • the decryption module 402 if the identity verification module 404 determines that the identity information provided by the user matches the identity information associated with the private key set, then use the decryption key to encrypt the The private key set Decrypt together;
  • the identity verification module 404 determines that the identity information provided by the user does not match the identity information associated with the set of private keys, refuse to use the decryption key to encrypt the private key The collection is decrypted.
  • the embodiment of this specification also provides a computer device, which at least includes a memory, a processor, and a computer program stored in the memory and running on the processor, where the processor implements FIG. 1 or Figure 2 shows the function of the method.
  • FIG. 5 shows a more specific hardware structure diagram of a computing device provided by an embodiment of this specification.
  • the device may include: a processor 1410, a memory 1420, an input/output interface 1430, a communication interface 1440, and a bus 1450.
  • the processor 1410, the memory 1420, the input/output interface 1430, and the communication interface 1440 realize the communication connection between each other in the device through the bus 1450.
  • the processor 1410 may be implemented by a general CPU (Central Processing Unit, central processing unit), a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits. To execute related programs to realize the technical solutions provided in the embodiments of this specification.
  • a general CPU Central Processing Unit, central processing unit
  • a microprocessor central processing unit
  • ASIC Application Specific Integrated Circuit
  • the memory 1420 can be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory), static storage device, dynamic storage device, etc.
  • the memory 1420 can store an operating system and other application programs. When the technical solutions provided in the embodiments of this specification are implemented through software or firmware, related program codes are stored in the memory 1420, and are invoked and executed by the processor 1410.
  • the input/output interface 1430 is used to connect input/output modules to realize information input and output.
  • the input/output/module can be configured in the device as a component (not shown in the figure), or it can be connected to the device to provide corresponding functions.
  • the input device may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and an output device may include a display, a speaker, a vibrator, an indicator light, and so on.
  • the communication interface 1440 is used to connect a communication module (not shown in the figure) to realize the communication interaction between this device and other devices.
  • the communication module can realize communication through wired means (such as USB, network cable, etc.), or through wireless means (such as mobile network, WIFI, Bluetooth, etc.).
  • the bus 1450 includes a path to transmit information between various components of the device (for example, the processor 1410, the memory 1420, the input/output interface 1430, and the communication interface 1440).
  • the above device only shows the processor 1410, the memory 1420, and the input/output interface 1430, a communication interface 1440, and a bus 1450.
  • the device may also include other components necessary for normal operation.
  • the above-mentioned device may also include only the components necessary to implement the solutions of the embodiments of this specification, and not necessarily include all the components shown in the figures.
  • the embodiment of this specification also provides a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, the function of the method shown in Fig. 1 or Fig. 2 is realized.
  • Computer-readable media includes permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
  • the information can be computer readable instructions, data structures, program modules, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
  • a typical implementation device is a computer.
  • the specific form of the computer can be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email receiving and sending device, and a game control A console, a tablet computer, a wearable device, or a combination of any of these devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

一种存储、调用区块链账户私钥的方法及装置。在用户的用户设备上安装私钥管理程序。所述私钥管理程序负责对用户的区块链账户私钥进行加密存储。对用户的区块链账户私钥进行加密所使用的加密密钥是用户指定的。当用户想要使用自己的区块链账户私钥时,需要向私钥管理程序提供所述加密密钥对应的解密密钥,私钥管理程序才能够将解密后的账户私钥提供给用户进行使用。

Description

一种存储、 调用区块链账户私钥的方法及装置 技术领域
[01] 本说明书实施例涉及信息技术领域, 尤其涉及一种存储区块链账户私钥的方法及 装置。 背景技术
[02] 在基于区块链网络的服务模式下, 用户一般需要在区块链网络中注册区块链账户 (或称用户账户) , 并需要保管自己注册的区块链账户的账户私钥。 区块链账户的账户 私钥主要用于对区块链账户发起的交易进行签名。
[03] 实践中, 用户一般是在自己的本地磁盘中存储自己的区块链账户的账户私钥, 需 要使用时,再从本地磁盘中获取账户私钥。然而,这种存储账户私钥的方式可靠性较低。 发明内容
[04] 为了解决用户自行保管区块链账户私钥所存在的可靠性较低的问题, 本说明书实 施例提供一种存储、 调用区块链账户私钥的方法及装置, 技术方案如下:
[05] 根据本说明书实施例的第 1方面, 提供一种存储区块链账户私钥的方法, 包括:
[06] 安装于用户的用户设备上的私钥管理程序获取私钥集合; 所述私钥集合包括所述 用户注册的区块链账户的至少一个账户私钥;
[07] 获取所述用户提供的加密密钥;
[08] 使用所述加密密钥对所述私钥集合进行加密, 并存储加密后的所述私钥集合。
[09] 根据本说明书实施例的第 2方面, 提供一种调用基于第 1方面的方法存储的账户 私钥的方法, 包括:
[10] 私钥管理程序获取所述用户提供的解密密钥;
[11] 使用所述解密密钥对加密后的所述私钥集合进行解密;
[12] 将解密后的所述私钥集合返回给所述用户。
[13] 本说明书实施例所提供的技术方案, 在用户的用户设备上安装私钥管理程序。 所 述私钥管理程序负责对用户的区块链账户私钥进行加密存储。对用户的区块链账户私钥 进行力口密所使用的加密密钥是用户指定的。 当用户想要使用自己的区块链账户私钥时, 需要向私钥管理程序提供所述加密密钥对应的解密密钥,私钥管理程序才能够将解密后 的账户私钥提供给用户进行使用。
[14] 通过本说明书实施例, 可以实现如下技术效果:
[15] 1、 用户不需要记忆自己的账户私钥在磁盘中的存储位置, 不会出现找不到自己的 账户私钥的情况。 由于账户私钥是私钥管理程序负责存储的, 用户当需要使用账户私钥 时, 直接向私钥管理程序请求即可。
[16] 2、 私钥管理程序会使用用户指定的加密密钥对账户私钥进行加密。 除用户以外的 其他人如果无法向私钥管理程序提供所述加密密钥对应的解密密钥,就无法调用用户的 账户私钥。
[17] 应当理解的是, 以上的一般描述和后文的细节描述仅是示例性和解释性的, 并不 能限制本说明书实施例。
[18] 此外, 本说明书实施例中的任一实施例并不需要达到上述的全部效果。 附图说明
[19] 为了更清楚地说明本说明书实施例中的技术方案, 下面将对实施例描述中所需要 使用的附图作筒单地介绍, 显而易见地, 下面描述中的附图仅仅是本说明书实施例中记 载的一些实施例,对于本领域普通技术人员来讲,还可以根据这些附图获得其他的附图。
[20] 图 1是本说明书实施例提供的一种存储区块链账户私钥的方法的流程示意图;
[21] 图 2是本说明书实施例提供的一种调用区块链账户私钥的方法的流程示意图;
[22] 图 3是本说明实施例提供的一种存储区块链账户私钥的装置的结构示意图;
[23] 图 4是本说明书实施例提供的一种调用区块链账户私钥的装置的结构示意图;
[24] 图 5是用于配置本说明书实施例装置的一种计算机设备的结构示意图。 具体实施方式
[25] 在现有的技术条件下, 用户一般自行保管自己的区块链账户密钥。 这种保管方式 对用户的要求较高, 需要用户牢记自己的账户密钥在本地磁盘中存储位置。 此外, 如果 用户以外的其他人获知了用户的账户密钥在磁盘中的存储位置,则有可能盗用用户的账 户密钥。
[26] 为此, 在本说明书实施例中, 引入私钥管理程序, 将私钥管理程序安装到用户的 用户设备上。 用户将需要存储的账户私钥提供给私钥管理器负责保管, 同时指定一个加 密密钥给私钥管理器。 私钥管理器是用所述加密密钥对账户私钥进行加密后, 存储到用 户设备的磁盘中。 一方面, 加密存储的账户私钥需要一般仅限用户所知的解密密钥进行 解密才能使用, 另一方面, 私钥管理器可以随时应用户的请求从账户私钥的存储位置调 出账户私钥, 不会出现找不到账户私钥的情况。
[27] 为了使本领域技术人员更好地理解本说明书实施例中的技术方案, 下面将结合本 说明书实施例中的附图, 对本说明书实施例中的技术方案进行详细地描述, 显然, 所描 述的实施例仅仅是本说明书的一部分实施例, 而不是全部的实施例。 基于本说明书中的 实施例, 本领域普通技术人员所获得的所有其他实施例, 都应当属于保护的范围。
[28] 以下结合附图, 详细说明本说明书各实施例提供的技术方案。
[29] 图 1 是本说明书实施例提供的一种存储区块链账户私钥的方法的流程示意图, 包 括如下步骤:
[30] S100: 安装于用户的用户设备上的私钥管理程序获取私钥集合。
[31] 在本说明书实施例中,所述私钥管理器是负责对用户注册的区块链账户的私钥(后 文筒称为账户私钥) 进行保管的程序。
[32] 当用户想要保管自己的账户私钥时, 可以打开所述私钥管理程序, 将自己的账户 私钥输入到所述私钥管理程序。
[33] 需要说明的是, 用户的账户私钥的数量可以不止一个。 也就是说, 私钥管理程序 需要对用户输入的包含至少一个账户私钥的私钥集合进行保管。
[34] 进一步地, 所述私钥集合还包括至少一个其他用户提供给所述用户的账户私钥; 针对每个其他用户, 该其他用户提供给所述用户的账户私钥是该其他用户注册的区块链 账户的账户私钥。
[35] S102: 获取所述用户提供的加密密钥。
[36] 在本说明书实施例中, 用户还需要向私钥管理程序输入加密密钥, 用于所述自己 的账户私钥进行加密。 所述加密密钥一般是对称加密密钥, 也可以是非对称加密密钥。
[37] S104: 使用所述加密密钥对所述私钥集合进行加密, 并存储加密后的所述私钥集 合。
[38] 由于所述私钥集合是以加密形式存储于用户设备中的, 因此, 哪怕所述用户设备 由所述用户以外的他人控制, 所述私钥集合的明文也难以泄露。
[39] 图 2 是本说明书实施例提供的一种调用区块链账户私钥的方法的流程示意图, 包 括如下步骤:
[40] S200: 私钥管理程序获取所述用户提供的解密密钥。
[41] S202: 使用所述解密密钥对加密后的所述私钥集合进行解密。
[42] S204: 将解密后的所述私钥集合返回给所述用户。
[43] 需要说明的是, 所述解密密钥与前文所述的加密密钥具有对应关系。 也就是说, 所述解密密钥用于对经过加密密钥加密后的数据进行解密。
[44] 此外, 在图 1 所示的方法中, 私钥管理程序还可以获取所述用户提供的身份识别 信息, 然后建立并存储所述身份识别信息与所述私钥集合之间的关联关系。 其中, 所述 身份识别信息是用于识别用户的身份的信息,如用户的手机号、身份证号等。进一步地, 所述身份识别信息具体可以是用户的生物识别信息, 如指纹信息、 人脸信息等。
[45] 具体地, 在图 1 所示的方法中, 密钥管理程序可以在获取到所述用户提供的身份 识别信息之后, 再存储加密后的所述私钥集合。 也就是说, 如果所述用户拒绝向密钥管 理程序提供自己的身份识别信息 (即拒绝进行实名认证) , 那么密钥管理器就拒绝存储 所述用户提供的私钥集合。
[46] 相应地, 在图 2 所示的方法中, 密钥管理程序在使用所述解密密钥对加密后的所 述私钥集合进行解密之前, 可以获取所述用户提供的身份识别信息; 判断所述用户提供 的身份识别信息与所述私钥集合所关联的身份识别信息是否匹配。 也就是说, 密钥管理 程序在对存储的私钥集合进行解密之前, 需要先确认当前请求获取私钥集合的人是所述 私钥集合的拥有者本人。
[47] 若所述用户提供的身份识别信息与所述私钥集合所关联的身份识别信息匹配, 则 密钥管理程序使用所述解密密钥对加密后的所述私钥集合进行解密; 若所述用户提供的 身份识别信息与所述私钥集合所关联的身份识别信息不匹配, 则密钥管理程序拒绝使用 所述解密密钥对加密后的所述私钥集合进行解密。
[48] 由于只有用户本人才能够调用密钥管理程序所保管的账户私钥, 因此, 哪怕上述 的加密密钥被他人破解, 或者上述的加密密钥对应的解密密钥被他人获取, 也不会危及 用户的账户密钥的安全。
[49] 图 3 是本说明实施例提供的一种存储区块链账户私钥的装置的结构示意图, 所述 装置安装于用户的用户设备上, 所述装置包括:
[50] 第一获取模块 301, 获取私钥集合; 所述私钥集合包括所述用户注册的区块链账户 的至少一个账户私钥;
[51] 第二获取模块 302, 获取所述用户提供的加密密钥;
[52] 加密存储模块 303 , 使用所述加密密钥对所述私钥集合进行加密, 并存储加密后的 所述私钥集合。
[53] 所述私钥集合还包括至少一个其他用户提供给所述用户的账户私钥; 针对每个其 他用户,该其他用户提供给所述用户的账户私钥是该其他用户注册的区块链账户的账户 私钥。
[54] 所述方法还包括:
[55] 第三获取模块 304, 获取所述用户提供的身份识别信息; 建立并存储所述身份识别 信息与所述私钥集合之间的关联关系。
[56] 所述加密存储模块 303, 在获取到所述用户提供的身份识别信息之后, 存储加密后 的所述私钥集合。
[57] 图 4是本说明书实施例提供的一种调用区块链账户私钥的装置的结构示意图, 所 述装置安装于用户的用户设备上, 所述装置包括:
[58] 获取模块 401, 获取所述用户提供的解密密钥;
[59] 解密模块 402, 使用所述解密密钥对加密后的所述私钥集合进行解密;
[60] 返回模块 403, 将解密后的所述私钥集合返回给所述用户。
[61] 所述装置还包括: 身份验证模块 404, 在使用所述解密密钥对加密后的所述私钥集 合进行解密之前, 获取所述用户提供的身份识别信息; 判断所述用户提供的身份识别信 息与所述私钥集合所关联的身份识别信息是否匹配;
[62] 所述解密模块 402,若所述身份验证模块 404确定所述用户提供的身份识别信息与 所述私钥集合所关联的身份识别信息匹配,则使用所述解密密钥对加密后的所述私钥集 合进行解密;
[63] 若所述身份验证模块 404确定所述用户提供的身份识别信息与所述私钥集合所关 联的身份识别信息不匹配, 则拒绝使用所述解密密钥对加密后的所述私钥集合进行解密。
[64] 本说明书实施例还提供一种计算机设备, 其至少包括存储器、 处理器及存储在存 储器上并可在处理器上运行的计算机程序, 其中, 处理器执行所述程序时实现图 1或图 2所示方法的功能。
[65] 图 5 示出了本说明书实施例所提供的一种更为具体的计算设备硬件结构示意图, 该设备可以包括: 处理器 1410、 存储器 1420、 输入 /输出接口 1430、 通信接口 1440和 总线 1450。 其中处理器 1410、 存储器 1420、 输入 /输出接口 1430和通信接口 1440通过 总线 1450实现彼此之间在设备内部的通信连接。
[66] 处理器 1410可以采用通用的 CPU( Central Processing Unit, 中央处理器) 、 微处 理器、 应用专用集成电路( Application Specific Integrated Circuit, ASIC) 、 或者一个或 多个集成电路等方式实现, 用于执行相关程序, 以实现本说明书实施例所提供的技术方 案。
[67] 存储器 1420可以采用 ROM( Read Only Memory, 只读存储器)、 RAM( Random Access Memory, 随机存取存储器) 、 静态存储设备, 动态存储设备等形式实现。 存储 器 1420可以存储操作系统和其他应用程序, 在通过软件或者固件来实现本说明书实施 例所提供的技术方案时, 相关的程序代码保存在存储器 1420中, 并由处理器 1410来调 用执行。
[68] 输入 /输出接口 1430用于连接输入 /输出模块, 以实现信息输入及输出。 输入输出 / 模块可以作为组件配置在设备中 (图中未示出) , 也可以外接于设备以提供相应功能。 其中输入设备可以包括键盘、 鼠标、 触摸屏、 麦克风、 各类传感器等, 输出设备可以包 括显示器、 扬声器、 振动器、 指示灯等。
[69] 通信接口 1440用于连接通信模块(图中未示出) , 以实现本设备与其他设备的通 信交互。 其中通信模块可以通过有线方式(例如 USB、 网线等)实现通信, 也可以通过 无线方式(例如移动网络、 WIFI、 蓝牙等) 实现通信。
[70] 总线 1450包括一通路, 在设备的各个组件(例如处理器 1410、 存储器 1420、 输 入 /输出接口 1430和通信接口 1440)之间传输信息。
[71] 需要说明的是, 尽管上述设备仅示出了处理器 1410、 存储器 1420、 输入 /输出接口 1430、 通信接口 1440以及总线 1450, 但是在具体实施过程中, 该设备还可以包括实现 正常运行所必需的其他组件。 此外, 本领域的技术人员可以理解的是, 上述设备中也可 以仅包含实现本说明书实施例方案所必需的组件, 而不必包含图中所示的全部组件。
[72] 本说明书实施例还提供一种计算机可读存储介质, 其上存储有计算机程序, 该程 序被处理器执行时实现图 1或图 2所示方法的功能。
[73] 计算机可读介质包括永久性和非永久性、 可移动和非可移动媒体可以由任何方法 或技术来实现信息存储。 信息可以是计算机可读指令、 数据结构、 程序的模块或其他数 据。 计算机的存储介质的例子包括, 但不限于相变内存(PRAM) 、 静态随机存取存储 器( SRAM)、 动态随机存取存储器( DRAM)、其他类型的随机存取存储器( RAM) , 只读存储器 (ROM) 、 电可擦除可编程只读存储器 (EEPROM) 、 快闪记忆体或其他 内存技术、 只读光盘只读存储器(CD-ROM)、 数字多功能光盘(DVD)或其他光学存 储、 磁盒式磁带, 磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质, 可用于 存储可以被计算设备访问的信息。 按照本文中的界定, 计算机可读介质不包括暂存电脑 可读媒体( transitory media) , 如调制的数据信号和载波。
[74] 通过以上的实施方式的描述可知, 本领域的技术人员可以清楚地了解到本说明书 实施例可借助软件加必需的通用硬件平台的方式来实现。 基于这样的理解, 本说明书实 施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现 出来, 该计算机软件产品可以存储在存储介质中, 如 ROM/RAM、 磁碟、 光盘等, 包括 若千指令用以使得一台计算机设备(可以是个人计算机, 服务器, 或者网络设备等)执 行本说明书实施例各个实施例或者实施例的某些部分所述的方法。
[75] 上述实施例阐明的系统、 方法、模块或单元, 具体可以由计算机芯片或实体实现, 或者由具有某种功能的产品来实现。 一种典型的实现设备为计算机, 计算机的具体形式 可以是个人计算机、 膝上型计算机、 蜂窝电话、 相机电话、 智能电话、 个人数字助理、 媒体播放器、 导航设备、 电子邮件收发设备、 游戏控制台、 平板计算机、 可穿戴设备或 者这些设备中的任意几种设备的组合。
[76] 本说明书中的各个实施例均采用递进的方式描述, 各个实施例之间相同相似的部 分互相参见即可, 每个实施例重点说明的都是与其他实施例的不同之处。 尤其, 对于方 法和设备实施例而言, 由于其基本相似于方法实施例, 所以描述得比较筒单, 相关之处 参见方法实施例的部分说明即可。 以上所描述的方法实施例仅仅是示意性的, 其中所述 作为分离部件说明的模块可以是或者也可以不是物理上分开的,在实施本说明书实施例 方案时可以把各模块的功能在同一个或多个软件和 /或硬件中实现。也可以根据实际的需 要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不 付出创造性劳动的情况下, 即可以理解并实施。
[77] 以上所述仅是本说明书实施例的具体实施方式, 应当指出, 对于本技术领域的普 通技术人员来说,在不脱离本说明书实施例原理的前提下,还可以做出若千改进和润饰, 这些改进和润饰也应视为本说明书实施例的保护范围。

Claims

权利要求书
1、 一种存储区块链账户私钥的方法, 包括:
安装于用户的用户设备上的私钥管理程序获取私钥集合; 所述私钥集合包括所述用 户注册的区块链账户的至少一个账户私钥;
获取所述用户提供的加密密钥;
使用所述加密密钥对所述私钥集合进行加密, 并存储加密后的所述私钥集合。
2、 如权利要求 1 所述的方法, 所述私钥集合还包括至少一个其他用户提供给所述 用户的账户私钥; 针对每个其他用户, 该其他用户提供给所述用户的账户私钥是该其他 用户注册的区块链账户的账户私钥。
3、 如权利要求 1所述的方法, 所述方法还包括:
获取所述用户提供的身份识别信息;
建立并存储所述身份识别信息与所述私钥集合之间的关联关系。
4、 如权利要求 3所述的方法, 存储力 P密后的所述私钥集合, 具体包括: 在获取到所述用户提供的身份识别信息之后, 存储力 P密后的所述私钥集合。
5、 一种调用基于权利要求 1~4任一项所述的方法存储账户私钥的方法, 包括: 私钥管理程序获取所述用户提供的解密密钥;
使用所述解密密钥对加密后的所述私钥集合进行解密;
将解密后的所述私钥集合返回给所述用户。
6、 如权利要求 5 所述的方法, 在使用所述解密密钥对加密后的所述私钥集合进行 解密之前, 所述方法还包括:
获取所述用户提供的身份识别信息;
判断所述用户提供的身份识别信息与所述私钥集合所关联的身份识别信息是否匹 配;
使用所述解密密钥对加密后的所述私钥集合进行解密, 具体包括:
若所述用户提供的身份识别信息与所述私钥集合所关联的身份识别信息匹配, 则使 用所述解密密钥对加密后的所述私钥集合进行解密;
若所述用户提供的身份识别信息与所述私钥集合所关联的身份识别信息不匹配, 则 拒绝使用所述解密密钥对加密后的所述私钥集合进行解密。
7、 一种存储区块链账户私钥的装置, 所述装置安装于用户的用户设备上, 所述装 置包括:
第一获取模块, 获取私钥集合; 所述私钥集合包括所述用户注册的区块链账户的至 少一个账户私钥;
第二获取模块, 获取所述用户提供的加密密钥;
加密存储模块, 使用所述力 P密密钥对所述私钥集合进行力 P密, 并存储力 P密后的所述 私钥集合。
8、 如权利要求 7所述的装置, 所述私钥集合还包括至少一个其他用户提供给所述 用户的账户私钥; 针对每个其他用户, 该其他用户提供给所述用户的账户私钥是该其他 用户注册的区块链账户的账户私钥。
9、 如权利要求 7所述的装置, 所述装置还包括:
第三获取模块, 获取所述用户提供的身份识别信息; 建立并存储所述身份识别信息 与所述私钥集合之间的关联关系。
10、 如权利要求 9所述的装置, 所述力 P密存储模块, 在获取到所述用户提供的身份 识别信息之后, 存储力 P密后的所述私钥集合。
11、 一种调用基于权利要求 7~10任一项所述的装置的存储账户私钥的装置, 所述 装置安装于用户的用户设备上, 所述装置包括:
获取模块, 获取所述用户提供的解密密钥;
解密模块, 使用所述解密密钥对加密后的所述私钥集合进行解密;
返回模块, 将解密后的所述私钥集合返回给所述用户。
12、 如权利要求 11所述的装置, 所述装置还包括: 身份验证模块, 在使用所述解 密密钥对加密后的所述私钥集合进行解密之前, 获取所述用户提供的身份识别信息; 判 断所述用户提供的身份识别信息与所述私钥集合所关联的身份识别信息是否匹配; 所述解密模块,若所述身份验证模块确定所述用户提供的身份识别信息与所述私钥 集合所关联的身份识别信息匹配, 则使用所述解密密钥对加密后的所述私钥集合进行解 密;
若所述身份验证模块确定所述用户提供的身份识别信息与所述私钥集合所关联的 身份识别信息不匹配, 则拒绝使用所述解密密钥对加密后的所述私钥集合进行解密。
13、 一种计算机设备, 包括存储器、 处理器及存储在存储器上并可在处理器上运行 的计算机程序, 其中, 所述处理器执行所述程序时实现如权利要求 1~6任一项所述的方 法。
PCT/CN2020/073740 2019-02-27 2020-01-22 一种存储、调用区块链账户私钥的方法及装置 WO2020173274A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
SG11202104312UA SG11202104312UA (en) 2019-02-27 2020-01-22 Methods and apparatuses for storing or invoking blockchain account private keys
EP20763626.7A EP3852042A4 (en) 2019-02-27 2020-01-22 PROCESS AND APPARATUS FOR MEMORY AND INVOCATION OF A BLOCK CHAIN ACCOUNT PRIVATE KEY
US17/244,801 US11251961B2 (en) 2019-02-27 2021-04-29 Methods and apparatuses for storing or invoking blockchain account private keys

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910144356.5A CN110020857A (zh) 2019-02-27 2019-02-27 一种存储、调用区块链账户私钥的方法及装置
CN201910144356.5 2019-02-27

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/244,801 Continuation US11251961B2 (en) 2019-02-27 2021-04-29 Methods and apparatuses for storing or invoking blockchain account private keys

Publications (1)

Publication Number Publication Date
WO2020173274A1 true WO2020173274A1 (zh) 2020-09-03

Family

ID=67189108

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/073740 WO2020173274A1 (zh) 2019-02-27 2020-01-22 一种存储、调用区块链账户私钥的方法及装置

Country Status (6)

Country Link
US (1) US11251961B2 (zh)
EP (1) EP3852042A4 (zh)
CN (1) CN110020857A (zh)
SG (1) SG11202104312UA (zh)
TW (1) TWI707571B (zh)
WO (1) WO2020173274A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110020857A (zh) 2019-02-27 2019-07-16 阿里巴巴集团控股有限公司 一种存储、调用区块链账户私钥的方法及装置
SG11202009924RA (en) 2019-11-29 2020-11-27 Alipay Hangzhou Inf Tech Co Ltd Methods and devices for cryptographic key management based on blockchain system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010034834A1 (en) * 2000-02-29 2001-10-25 Shinako Matsuyama Public-key-encryption data-communication system and data-communication-system forming method
CN106548345A (zh) * 2016-12-07 2017-03-29 北京信任度科技有限公司 基于密钥分割实现区块链私钥保护的方法及系统
CN109379189A (zh) * 2018-12-17 2019-02-22 江苏恒宝智能系统技术有限公司 区块链账户密钥备份及恢复方法、装置、终端及系统
CN110020857A (zh) * 2019-02-27 2019-07-16 阿里巴巴集团控股有限公司 一种存储、调用区块链账户私钥的方法及装置

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9762590B2 (en) * 2014-04-17 2017-09-12 Duo Security, Inc. System and method for an integrity focused authentication service
GB2538052B (en) * 2015-04-27 2019-07-03 Gurulogic Microsystems Oy Encoder, decoder, encryption system, encryption key wallet and method
KR101661930B1 (ko) * 2015-08-03 2016-10-05 주식회사 코인플러그 블록체인을 기반으로 하는 공인인증서 발급시스템
TWI644556B (zh) * 2017-05-18 2018-12-11 富邦金融控股股份有限公司 具隱密性的kyc資料共享系統及其方法
CN109150535A (zh) * 2017-06-19 2019-01-04 中国移动通信集团公司 一种身份认证方法、设备、计算机可读存储介质及装置
CN107528688B (zh) * 2017-09-30 2020-04-21 矩阵元技术(深圳)有限公司 一种基于加密委托技术的区块链密钥保管及恢复方法、装置
CN111865586B (zh) * 2017-11-23 2023-01-10 创新先进技术有限公司 一种产品信息的加密方法及装置
CN108259169B (zh) * 2018-01-09 2021-07-20 北京大学深圳研究生院 一种基于区块链云存储的文件安全分享方法及系统
CN109361663B (zh) * 2018-10-10 2021-05-28 中航信托股份有限公司 一种访问加密数据的相关方法、系统和相关装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010034834A1 (en) * 2000-02-29 2001-10-25 Shinako Matsuyama Public-key-encryption data-communication system and data-communication-system forming method
CN106548345A (zh) * 2016-12-07 2017-03-29 北京信任度科技有限公司 基于密钥分割实现区块链私钥保护的方法及系统
CN109379189A (zh) * 2018-12-17 2019-02-22 江苏恒宝智能系统技术有限公司 区块链账户密钥备份及恢复方法、装置、终端及系统
CN110020857A (zh) * 2019-02-27 2019-07-16 阿里巴巴集团控股有限公司 一种存储、调用区块链账户私钥的方法及装置

Also Published As

Publication number Publication date
US20210250175A1 (en) 2021-08-12
EP3852042A1 (en) 2021-07-21
TW202032944A (zh) 2020-09-01
SG11202104312UA (en) 2021-05-28
TWI707571B (zh) 2020-10-11
EP3852042A4 (en) 2022-01-05
US11251961B2 (en) 2022-02-15
CN110020857A (zh) 2019-07-16

Similar Documents

Publication Publication Date Title
US11750591B2 (en) Key attestation statement generation providing device anonymity
US9762396B2 (en) Device theft protection associating a device identifier and a user identifier
WO2021036170A1 (zh) 一种区块链交易处理方法及装置
WO2021036172A1 (zh) 一种区块链交易查询方法及系统
US9652610B1 (en) Hierarchical data security measures for a mobile device
TWI740388B (zh) 基於可信執行環境的操作記錄儲存方法、裝置及設備
KR20170060004A (ko) 두 장치 간의 신뢰 확립 기법
US9954837B2 (en) Method of multi-factor authenication during encrypted communications
WO2020238248A1 (zh) 一种数据存储方法、装置及设备
WO2021036171A1 (zh) 一种区块链交易处理方法及装置
WO2021239072A1 (zh) 在联盟链网络中创建节点组、基于节点组的交易方法
WO2020186457A1 (zh) 网络摄像机的认证方法和装置
WO2018177394A1 (zh) 一种安卓so文件的保护方法及装置
WO2015144066A1 (en) Sensitive operation verification method, apparatus, and system
CN106033503A (zh) 在数字内容设备中在线写入应用密钥的方法、装置及系统
WO2021228230A1 (zh) 一种基于安全执行环境的数据验证方法及装置
WO2022237558A1 (zh) 一种基于区块链的用户要素认证的方法及装置
WO2023040451A1 (zh) 资源转移
US11251961B2 (en) Methods and apparatuses for storing or invoking blockchain account private keys
WO2023020234A1 (zh) 外部存储器、提供密码服务的方法及业务处理设备
US20110154436A1 (en) Provider Management Methods and Systems for a Portable Device Running Android Platform
TWI546698B (zh) 基於伺服器的登入系統、登入驗證伺服器及其驗證方法
US11804969B2 (en) Establishing trust between two devices for secure peer-to-peer communication
CN113689217A (zh) 区块链交易方法及装置
CN118041556A (zh) 鉴权方法、装置、电子设备及介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20763626

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020763626

Country of ref document: EP

Effective date: 20210413

NENP Non-entry into the national phase

Ref country code: DE