WO2021239034A1 - 基于身份加密的数据传送方法、装置、电子设备及存储介质 - Google Patents

基于身份加密的数据传送方法、装置、电子设备及存储介质 Download PDF

Info

Publication number
WO2021239034A1
WO2021239034A1 PCT/CN2021/096243 CN2021096243W WO2021239034A1 WO 2021239034 A1 WO2021239034 A1 WO 2021239034A1 CN 2021096243 W CN2021096243 W CN 2021096243W WO 2021239034 A1 WO2021239034 A1 WO 2021239034A1
Authority
WO
WIPO (PCT)
Prior art keywords
public
private key
user
address
public key
Prior art date
Application number
PCT/CN2021/096243
Other languages
English (en)
French (fr)
Inventor
谢丹力
贾牧
张鹏程
陆陈一帆
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2021239034A1 publication Critical patent/WO2021239034A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • This application relates to the field of security technology, and in particular to a data transmission method, device, electronic device, and computer-readable storage medium based on identity encryption.
  • the data transmission method based on identity encryption includes:
  • This application also provides a data transmission device based on identity encryption, the device comprising:
  • the public-private key pair generation module is used to receive a connection request from user A to user B, and allocate a first public-private key pair and a second public-private key pair to user B according to the connection request.
  • the first public-private key pair and the distribution of the second public-private key pair are successful, randomly assign a third private key pair to the user A;
  • the public key address calculation module is configured to calculate the public key address of the second public-private key pair based on the address calculation method according to the first public-private key pair, the second public-private key pair, and the third public-private key;
  • the encrypted data calculation module is used to extract the data set transmitted by the user A to the user B from the pre-built first blockchain, and perform an encryption operation on the data set according to the public key address to obtain the encryption data set;
  • the data transmission module is configured to use the encrypted data set to calculate the transmission public key address transmitted to the user B, verify whether the public key address and the transmission public key address are the same, if the public key address and the transmission public key address are the same If the transmission public key address is not the same, then refuse to transmit the data set to the user B. If the public key address is the same as the transmission public key address, then the data set is allowed to be transmitted to the user B, and The data set is stored in a pre-built second blockchain in a block chain manner.
  • This application also provides an electronic device, which includes:
  • Memory storing at least one instruction
  • the processor executes the instructions stored in the memory to implement the following steps:
  • the present application also provides a computer-readable storage medium in which at least one instruction is stored, and the at least one instruction is executed by a processor in an electronic device to implement the following steps:
  • FIG. 1 is a schematic flowchart of a data transmission method based on identity encryption provided by an embodiment of this application;
  • FIG. 2 is a detailed flow diagram of allocating a first public-private key pair and a second public-private key pair in a data transmission method based on identity encryption provided by an embodiment of the application;
  • FIG. 3 is a schematic diagram of a module for data transmission based on identity encryption provided by an embodiment of the application
  • FIG. 4 is a schematic diagram of the internal structure of an electronic device of a data transmission method based on identity encryption provided by an embodiment of the application;
  • the execution subject of the data transmission method based on identity encryption provided in the embodiments of the present application includes, but is not limited to, at least one of the electronic devices that can be configured to execute the method provided in the embodiments of the present application, such as a server and a terminal.
  • the example dynamic adjustment method can be executed by software or hardware installed on a terminal device or a server device, and the software can be a blockchain platform.
  • the server includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, etc.
  • Blockchain is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
  • Blockchain is essentially a decentralized database. It is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information for verification. The validity of the information (anti-counterfeiting) and the generation of the next block.
  • the blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.
  • the underlying platform of the blockchain can include processing modules such as user management, basic services, smart contracts, and operation monitoring.
  • the user management module is responsible for the identity information management of all blockchain participants, including the maintenance of public and private key generation (account management), key management, and maintenance of the correspondence between the user’s real identity and the blockchain address (authority management), etc.
  • account management the maintenance of public and private key generation
  • key management key management
  • authorization management etc.
  • authorities management supervise and audit certain real-identity transactions, and provide rule configuration for risk control (risk control audit)
  • basic service modules are deployed on all blockchain node devices to verify the validity of business requests, After completing the consensus on the valid request, it is recorded on the storage.
  • the basic service For a new business request, the basic service first performs interface adaptation analysis and authentication processing (interface adaptation), and then encrypts the business information through the consensus algorithm (consensus management), After encryption, it is completely and consistently transmitted to the shared ledger (network communication), and records are stored; the smart contract module is responsible for contract registration and issuance, contract triggering and contract execution.
  • contract logic through a certain programming language and publish to On the blockchain (contract registration), according to the logic of the contract terms, call keys or other events to trigger execution, complete the contract logic, and also provide the function of contract upgrade and cancellation;
  • the operation monitoring module is mainly responsible for the deployment of the product release process , Configuration modification, contract settings, cloud adaptation, and visual output of real-time status during product operation, such as alarms, monitoring network conditions, monitoring node equipment health status, etc.
  • This application provides a data transmission method based on identity encryption.
  • FIG. 1 it is a schematic flowchart of a data transmission method based on identity encryption provided by an embodiment of this application.
  • the method can be executed by a device, and the device can be implemented by software and/or hardware.
  • the data transmission method based on identity encryption includes:
  • connection request is implemented in different forms according to different scenarios. For example, in a blockchain transaction, if user A wants to transfer money to user B, he needs to send a transfer request before the transfer to ensure that the transfer is safe and normal. conduct.
  • the allocation of a first public-private key pair and a second public-private key pair to the user B according to the connection request includes:
  • the first and second public and private key pairs are: in, They are the first private key and the second private key, which are not publicly available. They are the first public key and the second public key.
  • public disclosure can be found in the blockchain, and if it is not publicly disclosed, it cannot be found in the blockchain and is kept confidential.
  • land Also known as the master public key, Also known as derived public key.
  • n is the product of two random prime numbers
  • g is a preset data value (preferably, the value of g is generally preset to be very large, such as 500000, because according to the nature of the exponential function a x , when the value of the base a satisfies When the value is greater than 1, and the value is larger, the value of a x is also larger. Therefore, the value of the master public key and derived public key obtained by combining this case is also larger, so that it is less likely to be cracked), mod is a modulo operation. For example, user A transfers money to user B, before the transfer, the first and second public-private key pairs of user B are created to ensure that the identities of user A and user B are encrypted during the subsequent data transmission process between user A and user B.
  • the third public-private key pair is in, Is the third private key, Is the third public key corresponding to the third private key pair, where:
  • g is a large number smaller than n that meets the security requirements of cryptography, and its recommended length is 2048 bits.
  • the method for calculating the public key address of the second public-private key pair is:
  • address represents the public key address of the second public-private key pair
  • KDF represents the address calculation method, such as the HMAC algorithm, etc.
  • Is the first public key Is the second public key
  • g is a preset data value
  • the calculation method is:
  • the first blockchain generally corresponds to user A, and the data set is stored in the blockchain instead of the ordinary database, in order to effectively utilize the data security and accuracy of the blockchain and further improve Data security is guaranteed, and secondly, the function of large-scale data extraction can be completed quickly based on the advantages of blockchain's high throughput.
  • said performing an encryption operation on the data set according to the public key address to obtain the encrypted data set includes: obtaining the user signature and the obfuscated public key of the user A, and combining the user signature and the obfuscated public key, The public key address and the data set are packaged to obtain an encrypted data set.
  • the expression form of the encrypted data set is: (sin, address, value), as in the blockchain transaction system, value is the data set, sin is the user signature of user A on the blockchain, It is the obfuscated public key of user A on the blockchain.
  • the calculation of the transmission public key address transmitted to the user B using the encrypted data set includes: extracting the obfuscated public key of user A in the encrypted data set, and calculating according to the obfuscated public key The transmission public key address.
  • calculation method for calculating the transmission public key address based on the obfuscated public key is:
  • KDF is an arbitrary address calculation algorithm
  • the data set is allowed to be transmitted to the user B, and the data set is stored in the pre-built second block chain in a block chain manner .
  • Alice usually has account transactions with Bob, Carol, Dave, Eric, Ivan, and Mallory.
  • Bob, Carol, and Dave transfer funds to Alice, they are not directly transferred out of the account.
  • they are in Bob-Alice and Carol.
  • -Alice and Dave-Alice send a connection request, and establish the first and second public-private key pair in Alice's account according to the connection request (the first public key of Alice's account is also called the master public key, and the second public key of Alice's account is The key is also known as the derived public key) to ensure that Alice and Bob, Alice and Carol, Alice and Dave are encrypted for the identities of Bob, Carol, Dave, and Alice during the transfer of money data.
  • the public key address of Alice's second public and private key is calculated.
  • the money data is encrypted according to the public key address Operation, because each account corresponds to a key pair, and the money data is also encrypted. For example, when Dave transfers money to Alice, each account corresponds to a key pair. The money data is converted between key pairs to realize the pairing. The hiding of each account.
  • the first and second public and private key pairs need to be established in Alice's account, and then use Alice's first .
  • the second public and private key is Bob, Carol, Dave establish a third private key pair, and then perform the transfer operation. Further, if Alice accepts Bob’s transfer successfully, Alice will transfer the account received from Bob to her fourth public key.
  • the key (corresponding to the second public key, also known as the derived public key), at this time the second public key has reached the preset threshold (the preset threshold only accepts at most one transfer of funds and one transfer of funds), so In the future, the second public key will no longer be used, and a new public key needs to be regenerated to exchange funds with Bob, Carol, and Dave.
  • This method is to avoid the problem of being tracked by big data due to repeated use of the same account, and to improve security.
  • FIG. 3 it is a functional block diagram of the data transmission device based on identity encryption of the present application.
  • the data transmission device 100 based on identity encryption described in this application can be installed in an electronic device.
  • the data transmission device based on identity encryption may include a public-private key pair generation module 101, a public key address calculation module 102, an encrypted data calculation module 103, and a data transmission module 104.
  • the module described in the present invention can also be called a unit, which refers to a series of computer program segments that can be executed by the processor of an electronic device and can complete fixed functions, and are stored in the memory of the electronic device.
  • each module/unit is as follows:
  • the public-private key pair generation module 101 is configured to receive a connection request from user A to user B, and allocate a first public-private key pair and a second public-private key pair to user B according to the connection request.
  • the first public-private key is When the allocation of the second public-private key pair is successful, a third private key pair is randomly allocated to the user A.
  • connection request is implemented in different forms according to different scenarios. For example, in a blockchain transaction, if user A wants to transfer money to user B, he needs to send a transfer request before the transfer to ensure that the transfer is safe and normal. conduct.
  • the allocating a first public-private key pair and a second public-private key pair to the user B according to the connection request includes: when the user B responds to the connection request, randomly generating a first private key and a second private key Two private keys, the first public key of the first private key and the second public key of the second private key are solved according to the modulo operation, and the first private key and the first public key are combined to obtain the The first public-private key pair is combined with the second private key and the second public key to obtain the second public-private key pair.
  • the first and second public and private key pairs are: in, They are the first private key and the second private key, which are not publicly available. They are the first public key and the second public key.
  • public disclosure can be found in the blockchain, and if it is not publicly disclosed, it cannot be found in the blockchain and is kept confidential.
  • land Also known as the master public key, Also known as derived public key.
  • n is the product of two random prime numbers
  • g is a preset data value (preferably, the value of g is generally preset to be very large, such as 500000, because according to the nature of the exponential function a x , when the value of the base a satisfies When the value is greater than 1, and the value is larger, the value of a x is also larger. Therefore, the value of the master public key and derived public key obtained by combining this case is also larger, so that it is less likely to be cracked), mod is a modulo operation. For example, user A transfers money to user B, before the transfer, the first and second public-private key pairs of user B are created to ensure that the identities of user A and user B are encrypted during the subsequent data transmission process between user A and user B.
  • the third public-private key pair is in, Is the third private key, Is the third public key corresponding to the third private key pair, where:
  • g is a large number smaller than n that meets the security requirements of cryptography, and its recommended length is 2048 bits.
  • the public key address calculation module 102 is configured to calculate the public key address of the second public-private key pair based on the address calculation method according to the first public-private key pair, the second public-private key pair, and the third public-private key .
  • the method for calculating the public key address of the second public-private key pair is:
  • address represents the public key address of the second public-private key pair
  • KDF represents the address calculation method, such as the HMAC algorithm, etc.
  • Is the first public key Is the second public key
  • g is a preset data value
  • the calculation method is:
  • the encrypted data calculation module 103 is used to extract the data set transmitted by the user A to the user B from the pre-built first blockchain, and perform an encryption operation on the data set according to the public key address to obtain Encrypted data set.
  • the first blockchain generally corresponds to user A, and the data set is stored in the blockchain instead of the ordinary database, in order to effectively utilize the data security and accuracy of the blockchain and further improve Data security is guaranteed, and secondly, the function of large-scale data extraction can be completed quickly based on the advantages of blockchain's high throughput.
  • said performing an encryption operation on the data set according to the public key address to obtain the encrypted data set includes: obtaining the user signature and the obfuscated public key of the user A, and combining the user signature and the obfuscated public key, The public key address and the data set are packaged to obtain an encrypted data set.
  • the expression form of the encrypted data set is: (sin, address, value), as in the blockchain transaction system, value is the data set, sin is the user signature of user A on the blockchain, It is the obfuscated public key of user A on the blockchain.
  • the data transmission module 104 is configured to use the encrypted data set to calculate the transmission public key address transmitted to the user B, to verify whether the public key address and the transmission public key address are the same, if the public key address and If the transmission public key address is not the same, then refuse to transmit the data set to the user B, if the public key address is the same as the transmission public key address, then the data set is allowed to be transmitted to the user B, And the data set is stored in a pre-built second blockchain in a block chain manner.
  • the calculation of the transmission public key address transmitted to the user B using the encrypted data set includes: extracting the obfuscated public key of user A in the encrypted data set, and calculating according to the obfuscated public key The transmission public key address.
  • calculation method for calculating the transmission public key address based on the obfuscated public key is:
  • KDF is an arbitrary address calculation algorithm
  • Alice usually has account transactions with Bob, Carol, Dave, Eric, Ivan, and Mallory.
  • Bob, Carol, and Dave transfer funds to Alice, they are not directly transferred out of the account.
  • they are in Bob-Alice and Carol.
  • -Alice and Dave-Alice send a connection request, and establish the first and second public-private key pair in Alice's account according to the connection request (the first public key of Alice's account is also called the master public key, and the second public key of Alice's account is The key is also known as the derived public key) to ensure that Alice and Bob, Alice and Carol, Alice and Dave are encrypted for the identities of Bob, Carol, Dave, and Alice during the transfer of money data.
  • the public key address of Alice's second public and private key is calculated.
  • the money data is encrypted according to the public key address Operation, because each account corresponds to a key pair, and the money data is also encrypted. For example, when Dave transfers money to Alice, each account corresponds to a key pair. The money data is converted between key pairs to realize the pairing. The hiding of each account.
  • the first and second public and private key pairs need to be established in Alice's account, and then use Alice's first .
  • the second public and private key is Bob, Carol, Dave establish a third private key pair, and then perform the transfer operation, further, if Alice accepts Bob’s transfer successfully, Alice will receive Bob’s account and transfer it to her fourth public
  • the key (corresponding to the second public key, also known as the derived public key), at this time the second public key has reached the preset threshold (the preset threshold only accepts at most one transfer of funds and one transfer of funds), so In the future, the second public key will no longer be used, and a new public key needs to be regenerated to exchange funds with Bob, Carol, and Dave.
  • This method is to avoid the problem of being tracked by big data due to repeated use of the same account, and to improve security.
  • FIG. 4 it is a schematic structural diagram of an electronic device implementing the data transmission method based on identity encryption in the present application.
  • the electronic device 1 may include a processor 10, a memory 11, and a bus, and may also include a computer program stored in the memory 11 and running on the processor 10, such as a data transmission program 12 based on identity encryption.
  • the memory 11 includes at least one type of readable storage medium, and the readable storage medium includes flash memory, mobile hard disk, multimedia card, card-type memory (for example: SD or DX memory, etc.), magnetic memory, magnetic disk, CD etc.
  • the memory 11 may be an internal storage unit of the electronic device 1 in some embodiments, for example, a mobile hard disk of the electronic device 1.
  • the memory 11 may also be an external storage device of the electronic device 1, such as a plug-in mobile hard disk, a smart media card (SMC), and a secure digital (Secure Digital) equipped on the electronic device 1. , SD) card, flash card (Flash Card), etc.
  • the memory 11 may also include both an internal storage unit of the electronic device 1 and an external storage device.
  • the memory 11 can be used not only to store application software and various types of data installed in the electronic device 1, such as the code of the data transmission program 12 based on identity encryption, etc., but also to temporarily store data that has been output or will be output.
  • the processor 10 may be composed of integrated circuits in some embodiments, for example, may be composed of a single packaged integrated circuit, or may be composed of multiple integrated circuits with the same function or different functions, including one or more Combinations of central processing unit (CPU), microprocessor, digital processing chip, graphics processor, and various control chips, etc.
  • the processor 10 is the control unit of the electronic device, which uses various interfaces and lines to connect the various components of the entire electronic device, and runs or executes programs or modules stored in the memory 11 (such as executing Data transfer programs based on identity encryption, etc.), and call data stored in the memory 11 to execute various functions of the electronic device 1 and process data.
  • the bus may be a peripheral component interconnection standard (PCI) bus or an extended industry standard architecture (EISA) bus, etc.
  • PCI peripheral component interconnection standard
  • EISA extended industry standard architecture
  • the bus can be divided into address bus, data bus, control bus and so on.
  • the bus is configured to implement connection and communication between the memory 11 and at least one processor 10 and the like.
  • This application first stores the data set in a pre-built blockchain, and uses the characteristics of the blockchain to improve the security of the data set, such as the fact that the data is not easily tampered with. At the same time, it generates the first public-private key pair and the first public-private key pair according to the connection request between users. Two public and private key pairs, and a third private key pair is randomly generated. Since multiple key pairs are generated during data transmission, the possibility of being cracked is reduced. In addition, the generated third private key is used to encrypt the data set. Instead of common public encryption methods, at the same time, during the data reception process, it is necessary to determine whether the generated address is the same as the public key address of the encrypted data to further improve security.
  • the data transmission method, device and computer-readable storage medium based on identity encryption proposed in this application can provide a solution for calculating the relationship based on the user's public and private key pair, thereby improving the security of data transmission.
  • FIG. 4 only shows an electronic device with components. Those skilled in the art can understand that the structure shown in FIG. 4 does not constitute a limitation on the electronic device 1, and may include fewer or more components than shown in the figure. Components, or combinations of certain components, or different component arrangements.
  • the electronic device 1 may also include a power source (such as a battery) for supplying power to various components.
  • the power source may be logically connected to the at least one processor 10 through a power management device, thereby controlling power
  • the device implements functions such as charge management, discharge management, and power consumption management.
  • the power supply may also include any components such as one or more DC or AC power supplies, recharging devices, power failure detection circuits, power converters or inverters, and power status indicators.
  • the electronic device 1 may also include various sensors, Bluetooth modules, Wi-Fi modules, etc., which will not be repeated here.
  • the electronic device 1 may also include a network interface.
  • the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a Bluetooth interface, etc.), which is usually used in the electronic device 1 Establish a communication connection with other electronic devices.
  • the electronic device 1 may also include a user interface.
  • the user interface may be a display (Display) and an input unit (such as a keyboard (Keyboard)).
  • the user interface may also be a standard wired interface or a wireless interface.
  • the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode, organic light-emitting diode) touch device, etc.
  • the display can also be appropriately called a display screen or a display unit, which is used to display the information processed in the electronic device 1 and to display a visualized user interface.
  • the identity-based data transmission program 12 stored in the memory 11 in the electronic device 1 is a combination of multiple instructions. When running in the processor 10, it can realize:
  • the integrated module/unit of the electronic device 1 may be stored in a computer-readable storage medium, which may be It is volatile or non-volatile.
  • the computer-readable storage medium may include: any entity or device capable of carrying the computer program code, recording medium, U disk, mobile hard disk, magnetic disk, optical disk, computer memory, read-only memory (ROM, Read-Only Memory) ).
  • At least one instruction is stored in the computer-readable storage medium, and the at least one instruction is executed by a processor in an electronic device to implement the following steps:
  • modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the modules can be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional modules in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit may be implemented in the form of hardware, or may be implemented in the form of hardware plus software functional modules.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

本申请涉及区块链技术,揭露了一种基于身份加密的数据传送方法,包括:为用户B分配第一公私钥对、第二公私钥对(S1)并随机为用户A分配第三私钥对(S2),根据第一公私钥对、第二公私钥对及第三公私钥,计算第二公私钥对的公钥地址(S3),根据公钥地址对数据集进行加密操作得到加密数据集,使用加密数据集计算传送至用户B的传送公钥地址(S4),验证公钥地址和传送公钥地址是否相同(S5),若公钥地址和所述传送公钥地址相同,则允许传送数据集至所述用户B(S7)。本申请还提出一种基于身份加密的数据传送装置、电子设备以及计算机可读存储介质。本申请根据用户的公私钥对进行关系计算,从而提高数据传送安全性的方案。

Description

基于身份加密的数据传送方法、装置、电子设备及存储介质
本申请要求于2020年5月28日提交中国专利局、申请号为CN202010471292.2、名称为“基于身份加密的数据传送方法、装置及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及安全技术领域,尤其涉及一种基于身份加密的数据传送方法、装置、电子设备及计算机可读存储介质。
背景技术
现有的数据加密方案主要通过使用公钥地址的方法来隐藏用户的身份信息,发明人意识到该机制是不可靠的,一方面因为数据存储在普通的数据库中安全性较低,另一方面,当某用户频繁使用自己的公钥地址进行交易时,通过交易频次及时间等可用来匹配出用户画像,从而进行用户判断得到用户信息,降低了安全性。
发明内容
本申请提供的一种基于身份加密的数据传送方法,包括:
接收用户A对用户B的连接请求,根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对;
当所述第一公私钥对及所述第二公私钥对分配成功时,随机为所述用户A分配第三私钥对;
根据所述第一公私钥对、所述第二公私钥对及所述第三公私钥,基于地址计算法计算所述第二公私钥对的公钥地址;
从预构建的第一区块链中,提取所述用户A向所述用户B传送的数据集,根据所述公钥地址对所述数据集进行加密操作,得到加密数据集;
使用所述加密数据集计算传送至所述用户B的传送公钥地址,验证所述公钥地址和所述传送公钥地址是否相同;
若所述公钥地址和所述传送公钥地址不相同,则拒绝传送所述数据集至所述用户B,若所述公钥地址和所述传送公钥地址相同,则允许传送所述数据集至所述用户B,并将所述数据集以块链方式存储至预构建的第二区块链。
本申请还提供一种基于身份加密的数据传送装置,所述装置包括:
公私钥对生成模块,用于接收用户A对用户B的连接请求,根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对,当所述第一公私钥对及所述第二公私钥对分配成功时,随机为所述用户A分配第三私钥对;
公钥地址计算模块,用于根据所述第一公私钥对、所述第二公私钥对及所述第三公私钥,基于地址计算法计算所述第二公私钥对的公钥地址;
加密数据计算模块,用于从预构建的第一区块链中,提取所述用户A向所述用户B传送的数据集,根据所述公钥地址对所述数据集进行加密操作,得到加密数据集;
数据传送模块,用于使用所述加密数据集计算传送至所述用户B的传送公钥地址,验证所述公钥地址和所述传送公钥地址是否相同,若所述公钥地址和所述传送公钥地址不相同,则拒绝传送所述数据集至所述用户B,若所述公钥地址和所述传送公钥地址相同,则允许传送所述数据集至所述用户B,并将所述数据集以块链方式存储至预构建的第二区块链。
本申请还提供一种电子设备,所述电子设备包括:
存储器,存储至少一个指令;及
处理器,执行所述存储器中存储的指令以实现如下步骤:
接收用户A对用户B的连接请求,根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对;
当所述第一公私钥对及所述第二公私钥对分配成功时,随机为所述用户A分配第三私钥对;
根据所述第一公私钥对、所述第二公私钥对及所述第三公私钥,基于地址计算法计算所述第二公私钥对的公钥地址;
从预构建的第一区块链中,提取所述用户A向所述用户B传送的数据集,根据所述公钥地址对所述数据集进行加密操作,得到加密数据集;
使用所述加密数据集计算传送至所述用户B的传送公钥地址,验证所述公钥地址和所述传送公钥地址是否相同;
若所述公钥地址和所述传送公钥地址不相同,则拒绝传送所述数据集至所述用户B,若所述公钥地址和所述传送公钥地址相同,则允许传送所述数据集至所述用户B,并将所述数据集以块链方式存储至预构建的第二区块链。
本申请还提供一种计算机可读存储介质,所述计算机可读存储介质中存储有至少一个指令,所述至少一个指令被电子设备中的处理器执行以实现如下步骤:
接收用户A对用户B的连接请求,根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对;
当所述第一公私钥对及所述第二公私钥对分配成功时,随机为所述用户A分配第三私钥对;
根据所述第一公私钥对、所述第二公私钥对及所述第三公私钥,基于地址计算法计算所述第二公私钥对的公钥地址;
从预构建的第一区块链中,提取所述用户A向所述用户B传送的数据集,根据所述公钥地址对所述数据集进行加密操作,得到加密数据集;
使用所述加密数据集计算传送至所述用户B的传送公钥地址,验证所述公钥地址和所述传送公钥地址是否相同;
若所述公钥地址和所述传送公钥地址不相同,则拒绝传送所述数据集至所述用户B,若所述公钥地址和所述传送公钥地址相同,则允许传送所述数据集至所述用户B,并将所述数据集以块链方式存储至预构建的第二区块链。
附图说明
图1为本申请一实施例提供的基于身份加密的数据传送方法的流程示意图;
图2为本申请一实施例提供的基于身份加密的数据传送方法中分配第一公私钥对、第二公私钥对的详细流程示意图;
图3为本申请一实施例提供的基于身份加密的数据传送的模块示意图;
图4为本申请一实施例提供的基于身份加密的数据传送方法的电子设备的内部结构示意图;
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请实施例提供的基于身份加密的数据传送方法的执行主体包括但不限于服务端、终端等能够被配置为执行本申请实施例提供的该方法的电子设备中的至少一种。换言之,所述实例动态调整方法可以由安装在终端设备或服务端设备的软件或硬件来执行,所述软件可以是区块链平台。所述服务端包括但不限于:单台服务器、服务器集群、云端服务器或云端服务器集群等。
区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链(Blockchain),本质上是一个去中心化的数据库,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。区块链可以包括区块链底层平台、平台产品服务层以及应用服务层。
区块链底层平台可以包括用户管理、基础服务、智能合约以及运营监控等处理模块。其中,用户管理模块负责所有区块链参与者的身份信息管理,包括维护公私钥生成(账户管理)、密钥管理以及用户真实身份和区块链地址对应关系维护(权限管理)等,并且在授权的情况下,监管和审计某些真实身份的交易情况,提供风险控制的规则配置(风控审计);基础服务模块部署在所有区块链节点设备上,用来验证业务请求的有效性,并对有效请求完成共识后记录到存储上,对于一个新的业务请求,基础服务先对接口适配解析和鉴权处理(接口适配),然后通过共识算法将业务信息加密(共识管理),在加密之后完整一致的传输至共享账本上(网络通信),并进行记录存储;智能合约模块负责合约的注册发行以及合约触发和合约执行,开发人员可以通过某种编程语言定义合约逻辑,发布到区块链上(合约注册),根据合约条款的逻辑,调用密钥或者其它的事件触发执行,完成合约逻辑,同时还提供对合约升级注销的功能;运营监控模块主要负责产品发布过程中的部署、配置的修改、合约设置、云适配以及产品运行中的实时状态的可视化输出,例如:告警、监控网络情况、监控节点设备健康状态等。
本申请提供一种基于身份加密的数据传送方法。参照图1所示,为本申请一实施例提供的基于身份加密的数据传送方法的流程示意图。该方法可以由一个装置执行,该装置可以由软件和/或硬件实现。
在本实施例中,基于身份加密的数据传送方法包括:
S1、接收用户A对用户B的连接请求,根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对。
所述连接请求根据场景的不同,所实现的形式也不相同,如在区块链交易中,用户A若要给用户B转账,需要在转账前需要发送转账请求,以保证转账可安全正常的进行。
详细地,所述根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对,参阅图3详细流程示意图,包括:
S11、当所述用户B响应所述连接请求时,随机生成第一私钥和第二私钥;
S12、根据取模运算求解所述第一私钥的第一公钥和所述第二私钥的第二公钥;
S13、组合所述第一私钥和所述第一公钥得到所述第一公私钥对,组合所述第二私钥和所述第二公钥得到所述第二公私钥对。
较佳地,所述第一、第二公私钥对分别为:
Figure PCTCN2021096243-appb-000001
其中,
Figure PCTCN2021096243-appb-000002
分别为第一私钥和第二私钥,不对外公开,
Figure PCTCN2021096243-appb-000003
分别为第一公钥和第二公钥,如在区块链交易系统中,对外公开是在区块链中可查,不对外公开是在区块链中无法查到,处于保密状态,进一步地,
Figure PCTCN2021096243-appb-000004
又称主公钥,
Figure PCTCN2021096243-appb-000005
又称衍生公钥。
其中:
Figure PCTCN2021096243-appb-000006
Figure PCTCN2021096243-appb-000007
其中,n是两个随机素数的乘积,g为预设的一个数据值(较佳地,一般g值预设的非常大,如500000,因为根据指数函数a x的性质,当底数a值满足大于1,且数值越大时,a x的值也越大,因此结合本案得到的主公钥及衍生公钥值也越大,从而更不易被破解),mod为取模运算。如用户A给用户B转账,在转账之前,先创建用户B的第一、第二公私钥对,以保障后续用户A与用户B的数据传送过程中,对用户A和用户B进行身份加密。
S2、当所述第一公私钥对及所述第二公私钥对分配成功,随机为所述用户A分配第 三私钥对。
优选地,所述第三公私钥对为
Figure PCTCN2021096243-appb-000008
其中,
Figure PCTCN2021096243-appb-000009
为第三私钥,
Figure PCTCN2021096243-appb-000010
为与所述第三私钥对对应的第三公钥,其中:
Figure PCTCN2021096243-appb-000011
g为小于n的满足密码学安全需求的大数,其推荐的长度为2048个bit位。
S3、根据所述第一公私钥对、所述第二公私钥对及所述第三公私钥,基于地址计算法计算所述第二公私钥对的公钥地址。
优选地,所述第二公私钥对的公钥地址的计算方法为:
Figure PCTCN2021096243-appb-000012
其中,address表示所述第二公私钥对的公钥地址,KDF表示所述地址计算法,如HMAC算法等,
Figure PCTCN2021096243-appb-000013
表示迪菲-赫尔曼秘钥交换法则,
Figure PCTCN2021096243-appb-000014
为所述第一公钥,
Figure PCTCN2021096243-appb-000015
为所述第二公钥,g为预设的数据值,进一步地,所述
Figure PCTCN2021096243-appb-000016
的计算方法为:
Figure PCTCN2021096243-appb-000017
S4、从预构建的第一区块链中,提取所述用户A向所述用户B传送的数据集,根据所述公钥地址对所述数据集进行加密操作得到加密数据集,使用所述加密数据集计算传送至所述用户B的传送公钥地址。
本申请较佳实施例中第一区块链一般与用户A对应,且将数据集存储至区块链中而不是普通数据库,是为了有效利用区块链的数据安全性及准确性,进一步提高数据的安全保证,其次也可根据区块链高吞吐量优点,快速的完成大批量数据提取的作用。
优选地,所述根据所述公钥地址对数据集进行加密操作得到加密数据集,包括:获取所述用户A的用户签名及混淆公钥,将所述用户签名及所述混淆公钥、所述公钥地址及所述数据集进行打包得到加密数据集。
进一步地,所述加密数据集的表现形式为:(sin,address,
Figure PCTCN2021096243-appb-000018
value),如在区块链交易系统中,value为所述数据集,sin为用户A在区块链的用户签名,
Figure PCTCN2021096243-appb-000019
为用户A的在区块链上的混淆公钥。
优选地,所述使用所述加密数据集计算传送至所述用户B的传送公钥地址,包括:提取所述加密数据集内用户A的所述混淆公钥,根据所述混淆公钥计算得到所述传送公钥地址。
进一步地,所述根据所述混淆公钥计算得到所述传送公钥地址的计算方法为:
Figure PCTCN2021096243-appb-000020
其中,
Figure PCTCN2021096243-appb-000021
为所述用户A的在区块链上的混淆公钥,KDF为任意的地址计算算法,
Figure PCTCN2021096243-appb-000022
表示迪菲-赫尔曼秘钥交换法则。
S5、验证所述公钥地址和所述传送公钥地址是否相同。
S6、若所述公钥地址和所述传送公钥地址不相同,则拒绝传送所述数据集至所述用户B。
S7、若所述公钥地址和所述传送公钥地址相同,则允许传送所述数据集至所述用户B,并将所述数据集以块链方式存储至预构建的第二区块链。
基于本申请可见,假设Alice平时和Bob,Carol,Dave,Eric,Ivan,Mallory有账户交易往来,当Bob,Carol,Dave转账给Alice,并不是直接将账户转出,先是在Bob-Alice、Carol-Alice、Dave-Alice之间发送连接请求,根据连接请求在Alice账户中建立第一、第二公私钥对(其中Alice账户的第一公钥又称为主公钥,Alice账户的第二公钥又称为衍生公钥),以保障Alice与Bob、Alice与Carol、Alice与Dave在金钱数据传送过程中,对Bob,Carol,Dave、Alice的身份进行身份加密。
进一步地,当Alice账户中建立第一、第二公私钥对后,通过S2可知,使用Alice的第一、第二公私钥为Bob,Carol,Dave建立第三私钥对,当每个账户的第三私钥对建立完 成后,根据Bob,Carol,Dave的第三私钥对,计算得到Alice第二公私钥的公钥地址,当有金钱转换的时候,根据公钥地址对金钱数据进行加密操作,因为每个账户都对应钥对,且在金钱数据上也进行加密,如Dave转账给Alice时,每个账户都对应钥对,是通过钥对之间进行金钱数据转化,从而实现了对每个账户的隐藏。
详细地,如上述举例所示,当在Bob-Alice、Carol-Alice、Dave-Alice之间连接请求成功后,需要在Alice账户中建立第一、第二公私钥对后,用Alice的第一、第二公私钥为Bob,Carol,Dave建立第三私钥对,进而进行转账操作,进一步地,如Alice接受Bob的转账成功后,Alice又将接受到Bob的账目转给自己的第四公钥(与第二公钥是对应关系,也称为衍生公钥),此时第二公钥已达到预设阈值(预设阈值最多只接受一次资金转入和一次的资金转出),因此今后不再使用第二公钥,需要重新生成新的公钥与Bob,Carol,Dave进行资金交流,此方法是为了避免同一个账户被反复使用导致被大数据追踪统计的问题,提高安全性。
如图3所示,是本申请基于身份加密的数据传送装置的功能模块图。
本申请所述基于身份加密的数据传送装置100可以安装于电子设备中。根据实现的功能,所述基于身份加密的数据传送装置可以包括公私钥对生成模块101、公钥地址计算模块102、加密数据计算模块103和数据传送模块104。本发所述模块也可以称之为单元,是指一种能够被电子设备处理器所执行,并且能够完成固定功能的一系列计算机程序段,其存储在电子设备的存储器中。
在本实施例中,关于各模块/单元的功能如下:
所述公私钥对生成模块101用于接收用户A对用户B的连接请求,根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对,当所述第一公私钥对及所述第二公私钥对分配成功时,随机为所述用户A分配第三私钥对。
所述连接请求根据场景的不同,所实现的形式也不相同,如在区块链交易中,用户A若要给用户B转账,需要在转账前需要发送转账请求,以保证转账可安全正常的进行。
详细地,所述根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对,包括:当所述用户B响应所述连接请求时,随机生成第一私钥和第二私钥,根据取模运算求解所述第一私钥的第一公钥和所述第二私钥的第二公钥,组合所述第一私钥和所述第一公钥得到所述第一公私钥对,组合所述第二私钥和所述第二公钥得到所述第二公私钥对。
较佳地,所述第一、第二公私钥对分别为:
Figure PCTCN2021096243-appb-000023
其中,
Figure PCTCN2021096243-appb-000024
分别为第一私钥和第二私钥,不对外公开,
Figure PCTCN2021096243-appb-000025
分别为第一公钥和第二公钥,如在区块链交易系统中,对外公开是在区块链中可查,不对外公开是在区块链中无法查到,处于保密状态,进一步地,
Figure PCTCN2021096243-appb-000026
又称主公钥,
Figure PCTCN2021096243-appb-000027
又称衍生公钥。
其中:
Figure PCTCN2021096243-appb-000028
Figure PCTCN2021096243-appb-000029
其中,n是两个随机素数的乘积,g为预设的一个数据值(较佳地,一般g值预设的非常大,如500000,因为根据指数函数a x的性质,当底数a值满足大于1,且数值越大时,a x的值也越大,因此结合本案得到的主公钥及衍生公钥值也越大,从而更不易被破解),mod为取模运算。如用户A给用户B转账,在转账之前,先创建用户B的第一、第二公私钥对,以保障后续用户A与用户B的数据传送过程中,对用户A和用户B进行身份加密。
优选地,所述第三公私钥对为
Figure PCTCN2021096243-appb-000030
其中,
Figure PCTCN2021096243-appb-000031
为第三私钥,
Figure PCTCN2021096243-appb-000032
是与所述第三私钥对对应的第三公钥,其中:
Figure PCTCN2021096243-appb-000033
g为小于n的满足密码学安全需求的大数,其推荐的长度为2048个bit位。
所述公钥地址计算模块102用于根据所述第一公私钥对、所述第二公私钥对及所述第 三公私钥,基于地址计算法计算所述第二公私钥对的公钥地址。
优选地,所述第二公私钥对的公钥地址的计算方法为:
Figure PCTCN2021096243-appb-000034
其中,address表示所述第二公私钥对的公钥地址,KDF表示所述地址计算法,如HMAC算法等,
Figure PCTCN2021096243-appb-000035
表示迪菲-赫尔曼秘钥交换法则,
Figure PCTCN2021096243-appb-000036
为所述第一公钥,
Figure PCTCN2021096243-appb-000037
为所述第二公钥,g为预设的数据值,进一步地,所述
Figure PCTCN2021096243-appb-000038
的计算方法为:
Figure PCTCN2021096243-appb-000039
所述加密数据计算模块103用于从预构建的第一区块链中,提取所述用户A向所述用户B传送的数据集,根据所述公钥地址对所述数据集进行加密操作得到加密数据集。
本申请较佳实施例中第一区块链一般与用户A对应,且将数据集存储至区块链中而不是普通数据库,是为了有效利用区块链的数据安全性及准确性,进一步提高数据的安全保证,其次也可根据区块链高吞吐量优点,快速的完成大批量数据提取的作用。
优选地,所述根据所述公钥地址对数据集进行加密操作得到加密数据集,包括:获取所述用户A的用户签名及混淆公钥,将所述用户签名及所述混淆公钥、所述公钥地址及所述数据集进行打包得到加密数据集。
进一步地,所述加密数据集的表现形式为:(sin,address,
Figure PCTCN2021096243-appb-000040
value),如在区块链交易系统中,value为所述数据集,sin为用户A在区块链的用户签名,
Figure PCTCN2021096243-appb-000041
为用户A的在区块链上的混淆公钥。
所述数据传送模块104用于使用所述加密数据集计算传送至所述用户B的传送公钥地址,验证所述公钥地址和所述传送公钥地址是否相同,若所述公钥地址和所述传送公钥地址不相同,则拒绝传送所述数据集至所述用户B,若所述公钥地址和所述传送公钥地址相同,则允许传送所述数据集至所述用户B,并将所述数据集以块链方式存储至预构建的第二区块链。
优选地,所述使用所述加密数据集计算传送至所述用户B的传送公钥地址,包括:提取所述加密数据集内用户A的所述混淆公钥,根据所述混淆公钥计算得到所述传送公钥地址。
进一步地,所述根据所述混淆公钥计算得到所述传送公钥地址的计算方法为:
Figure PCTCN2021096243-appb-000042
其中,
Figure PCTCN2021096243-appb-000043
为所述用户A的在区块链上的混淆公钥,KDF为任意的地址计算算法,
Figure PCTCN2021096243-appb-000044
表示迪菲-赫尔曼秘钥交换法则。
基于本申请可见,假设Alice平时和Bob,Carol,Dave,Eric,Ivan,Mallory有账户交易往来,当Bob,Carol,Dave转账给Alice,并不是直接将账户转出,先是在Bob-Alice、Carol-Alice、Dave-Alice之间发送连接请求,根据连接请求在Alice账户中建立第一、第二公私钥对(其中Alice账户的第一公钥又称为主公钥,Alice账户的第二公钥又称为衍生公钥),以保障Alice与Bob、Alice与Carol、Alice与Dave在金钱数据传送过程中,对Bob,Carol,Dave、Alice的身份进行身份加密。
进一步地,当Alice账户中建立第一、第二公私钥对后,通过S2可知,使用Alice的第一、第二公私钥为Bob,Carol,Dave建立第三私钥对,当每个账户的第三私钥对建立完成后,根据Bob,Carol,Dave的第三私钥对,计算得到Alice第二公私钥的公钥地址,当有金钱转换的时候,根据公钥地址对金钱数据进行加密操作,因为每个账户都对应钥对,且在金钱数据上也进行加密,如Dave转账给Alice时,每个账户都对应钥对,是通过钥对之间进行金钱数据转化,从而实现了对每个账户的隐藏。
详细地,如上述举例所示,当在Bob-Alice、Carol-Alice、Dave-Alice之间连接请求成功后,需要在Alice账户中建立第一、第二公私钥对后,用Alice的第一、第二公私钥为Bob,Carol,Dave建立第三私钥对,进而进行转账操作,进一步地,如Alice接受Bob的 转账成功后,Alice又将接受到Bob的账目转给自己的第四公钥(与第二公钥是对应关系,也称为衍生公钥),此时第二公钥已达到预设阈值(预设阈值最多只接受一次资金转入和一次的资金转出),因此今后不再使用第二公钥,需要重新生成新的公钥与Bob,Carol,Dave进行资金交流,此方法是为了避免同一个账户被反复使用导致被大数据追踪统计的问题,提高安全性。
如图4所示,是本申请实现基于身份加密的数据传送方法的电子设备的结构示意图。
所述电子设备1可以包括处理器10、存储器11和总线,还可以包括存储在所述存储器11中并可在所述处理器10上运行的计算机程序,如基于身份加密的数据传送程序12。
其中,所述存储器11至少包括一种类型的可读存储介质,所述可读存储介质包括闪存、移动硬盘、多媒体卡、卡型存储器(例如:SD或DX存储器等)、磁性存储器、磁盘、光盘等。所述存储器11在一些实施例中可以是电子设备1的内部存储单元,例如该电子设备1的移动硬盘。所述存储器11在另一些实施例中也可以是电子设备1的外部存储设备,例如电子设备1上配备的插接式移动硬盘、智能存储卡(Smart Media Card,SMC)、安全数字(Secure Digital,SD)卡、闪存卡(Flash Card)等。进一步地,所述存储器11还可以既包括电子设备1的内部存储单元也包括外部存储设备。所述存储器11不仅可以用于存储安装于电子设备1的应用软件及各类数据,例如基于身份加密的数据传送程序12的代码等,还可以用于暂时地存储已经输出或者将要输出的数据。
所述处理器10在一些实施例中可以由集成电路组成,例如可以由单个封装的集成电路所组成,也可以是由多个相同功能或不同功能封装的集成电路所组成,包括一个或者多个中央处理器(Central Processing unit,CPU)、微处理器、数字处理芯片、图形处理器及各种控制芯片的组合等。所述处理器10是所述电子设备的控制核心(Control Unit),利用各种接口和线路连接整个电子设备的各个部件,通过运行或执行存储在所述存储器11内的程序或者模块(例如执行基于身份加密的数据传送程序等),以及调用存储在所述存储器11内的数据,以执行电子设备1的各种功能和处理数据。
所述总线可以是外设部件互连标准(peripheral component interconnect,简称PCI)总线或扩展工业标准结构(extended industry standard architecture,简称EISA)总线等。该总线可以分为地址总线、数据总线、控制总线等。所述总线被设置为实现所述存储器11以及至少一个处理器10等之间的连接通信。
本申请首先将数据集存储至预构建的区块链中,利用区块链的数据不易被篡改等特点提高数据集的安全性,同时根据用户之间的连接请求生成第一公私钥对、第二公私钥对,并随机生成第三私钥对,由于在数据传输过程中生成了多种钥对,降低了被破解的可能性,另外使用生成的第三私钥对对数据集进行加密,而非普通已公开的加密手段,同时在数据接收过程中,需要判断生成的地址是否与加密数据的传送公钥地址是否相同,进一步提高安全性,另外每次数据传送所生成的私钥对都不尽相同,防止了交易频次及时间过多匹配出用户画像的现象。因此本申请提出的基于身份加密的数据传送方法、装置及计算机可读存储介质,可以提供一种根据用户的公私钥对进行关系计算,从而提高数据传送安全性的方案。
图4仅示出了具有部件的电子设备,本领域技术人员可以理解的是,图4示出的结构并不构成对所述电子设备1的限定,可以包括比图示更少或者更多的部件,或者组合某些部件,或者不同的部件布置。
例如,尽管未示出,所述电子设备1还可以包括给各个部件供电的电源(比如电池),优选地,电源可以通过电源管理装置与所述至少一个处理器10逻辑相连,从而通过电源管理装置实现充电管理、放电管理、以及功耗管理等功能。电源还可以包括一个或一个以上的直流或交流电源、再充电装置、电源故障检测电路、电源转换器或者逆变器、电源状 态指示器等任意组件。所述电子设备1还可以包括多种传感器、蓝牙模块、Wi-Fi模块等,在此不再赘述。
进一步地,所述电子设备1还可以包括网络接口,可选地,所述网络接口可以包括有线接口和/或无线接口(如WI-FI接口、蓝牙接口等),通常用于在该电子设备1与其他电子设备之间建立通信连接。
可选地,该电子设备1还可以包括用户接口,用户接口可以是显示器(Display)、输入单元(比如键盘(Keyboard)),可选地,用户接口还可以是标准的有线接口、无线接口。可选地,在一些实施例中,显示器可以是LED显示器、液晶显示器、触控式液晶显示器以及OLED(Organic Light-Emitting Diode,有机发光二极管)触摸器等。其中,显示器也可以适当的称为显示屏或显示单元,用于显示在电子设备1中处理的信息以及用于显示可视化的用户界面。
应该了解,所述实施例仅为说明之用,在专利申请范围上并不受此结构的限制。
所述电子设备1中的所述存储器11存储的基于身份加密的数据传送程序12是多个指令的组合,在所述处理器10中运行时,可以实现:
从预构建的第一区块链中,提取用户A对用户B的连接请求,根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对;
当所述第一公私钥对及所述第二公私钥对分配成功时,随机为所述用户A分配第三私钥对;
根据所述第一公私钥对、所述第二公私钥对及所述第三公私钥,基于地址计算法计算所述第二公私钥对的公钥地址;
接收所述用户A向所述用户B传送的数据集,根据所述公钥地址对所述数据集进行加密操作,得到加密数据集;
使用所述加密数据集计算传送至所述用户B的传送公钥地址,验证所述公钥地址和所述传送公钥地址是否相同;
若所述公钥地址和所述传送公钥地址不相同,则拒绝传送所述数据集至所述用户B,若所述公钥地址和所述传送公钥地址相同,则允许传送所述数据集至所述用户B,并将所述数据集以块链方式存储至预构建的第二区块链。
具体地,所述处理器10对上述指令的具体实现方法可参考图1对应实施例中相关步骤的描述,在此不赘述。
进一步地,所述电子设备1集成的模块/单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读存储介质中,所述计算机可读存储介质可以是易失性的,也可以是非易失性的。所述计算机可读存储介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)。
所述计算机可读存储介质中存储有至少一个指令,所述至少一个指令被电子设备中的处理器执行以实现如下步骤:
接收用户A对用户B的连接请求,根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对;
当所述第一公私钥对及所述第二公私钥对分配成功时,随机为所述用户A分配第三私钥对;
根据所述第一公私钥对、所述第二公私钥对及所述第三公私钥,基于地址计算法计算所述第二公私钥对的公钥地址;
从预构建的第一区块链中,提取所述用户A向所述用户B传送的数据集,根据所述公钥地址对所述数据集进行加密操作,得到加密数据集;
使用所述加密数据集计算传送至所述用户B的传送公钥地址,验证所述公钥地址和所 述传送公钥地址是否相同;
若所述公钥地址和所述传送公钥地址不相同,则拒绝传送所述数据集至所述用户B,若所述公钥地址和所述传送公钥地址相同,则允许传送所述数据集至所述用户B,并将所述数据集以块链方式存储至预构建的第二区块链。
在本申请所提供的几个实施例中,应该理解到,所揭露的设备,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能模块的形式实现。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。
因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附关联图表记视为限制所涉及的权利要求。
此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。系统权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第二等词语用来表示名称,而并不表示任何特定的顺序。
最后应说明的是,以上实施例仅用以说明本申请的技术方案而非限制,尽管参照较佳实施例对本申请进行了详细说明,本领域的普通技术人员应当理解,可以对本申请的技术方案进行修改或等同替换,而不脱离本申请技术方案的精神和范围。

Claims (20)

  1. 一种基于身份加密的数据传送方法,其中,所述方法包括:
    接收用户A对用户B的连接请求,根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对;
    当所述第一公私钥对及所述第二公私钥对分配成功时,随机为所述用户A分配第三私钥对;
    根据所述第一公私钥对、所述第二公私钥对及所述第三公私钥,基于地址计算法计算所述第二公私钥对的公钥地址;
    从预构建的第一区块链中,提取所述用户A向所述用户B传送的数据集,根据所述公钥地址对所述数据集进行加密操作,得到加密数据集;
    使用所述加密数据集计算传送至所述用户B的传送公钥地址,验证所述公钥地址和所述传送公钥地址是否相同;
    若所述公钥地址和所述传送公钥地址不相同,则拒绝传送所述数据集至所述用户B,若所述公钥地址和所述传送公钥地址相同,则允许传送所述数据集至所述用户B,并将所述数据集以块链方式存储至预构建的第二区块链。
  2. 如权利要求1所述的基于身份加密的数据传送方法,其中,所述根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对,包括:
    当所述用户B响应所述连接请求时,随机生成第一私钥和第二私钥;
    根据取模运算求解所述第一私钥的第一公钥和所述第二私钥的第二公钥;
    组合所述第一私钥和所述第一公钥得到所述第一公私钥对,组合所述第二私钥和所述第二公钥得到所述第二公私钥对。
  3. 如权利要求2所述的基于身份加密的数据传送方法,其中,所述根据取模运算求解所述第一私钥的第一公钥和所述第二私钥的第二公钥,包括:
    利用下述求解公式求解所述第一公钥
    Figure PCTCN2021096243-appb-100001
    及第二公钥
    Figure PCTCN2021096243-appb-100002
    Figure PCTCN2021096243-appb-100003
    Figure PCTCN2021096243-appb-100004
    其中,
    Figure PCTCN2021096243-appb-100005
    为所述第一私钥,
    Figure PCTCN2021096243-appb-100006
    所述第二私钥,n是两个随机素数的乘积值,g为预设的数据值,mod为所述取模运算。
  4. 如权利要求3所述的基于身份加密的数据传送方法,其中,所述地址计算法为:
    Figure PCTCN2021096243-appb-100007
    Figure PCTCN2021096243-appb-100008
    其中,address表示所述第二公私钥对的公钥地址,KDF表示所述地址计算法,
    Figure PCTCN2021096243-appb-100009
    表示迪菲-赫尔曼秘钥交换法则,
    Figure PCTCN2021096243-appb-100010
    是与所述第三私钥对对应的第三公钥。
  5. 如权利要求1所述的基于身份加密的数据传送方法,其中,所述根据所述公钥地址对所述数据集进行加密操作,得到加密数据集,包括:
    获取所述用户A的用户签名及混淆公钥;
    将所述用户签名、所述混淆公钥、所述公钥地址及所述数据集进行打包得到所述加密数据集。
  6. 如权利要求1中所述的基于身份加密的数据传送方法,其中,所述使用所述加密数据集计算传送至所述用户B的传送公钥地址,包括:
    提取所述加密数据集内用户A的所述混淆公钥;
    根据所述混淆公钥,利用下述计算方法计算得到所述传送公钥地址address_transmit,计算方法为:
    Figure PCTCN2021096243-appb-100011
    其中,
    Figure PCTCN2021096243-appb-100012
    为用户A的所述混淆公钥,KDF为所述地址计算法,
    Figure PCTCN2021096243-appb-100013
    为所述迪菲-赫尔曼秘钥交换法则,
    Figure PCTCN2021096243-appb-100014
    为所述第一公钥,
    Figure PCTCN2021096243-appb-100015
    为所述第二公钥,g为预设的数据值。
  7. 一种基于身份加密的数据传送装置,其中,所述装置包括:
    公私钥对生成模块,用于接收用户A对用户B的连接请求,根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对,当所述第一公私钥对及所述第二公私钥对分配成功时,随机为所述用户A分配第三私钥对;
    公钥地址计算模块,用于根据所述第一公私钥对、所述第二公私钥对及所述第三公私钥,基于地址计算法计算所述第二公私钥对的公钥地址;
    加密数据计算模块,用于从预构建的第一区块链中,提取所述用户A向所述用户B传送的数据集,根据所述公钥地址对所述数据集进行加密操作,得到加密数据集;
    数据传送模块,用于使用所述加密数据集计算传送至所述用户B的传送公钥地址,验证所述公钥地址和所述传送公钥地址是否相同,若所述公钥地址和所述传送公钥地址不相同,则拒绝传送所述数据集至所述用户B,若所述公钥地址和所述传送公钥地址相同,则允许传送所述数据集至所述用户B,并将所述数据集以块链方式存储至预构建的第二区块链。
  8. 如权利要求7所述的一种基于身份加密的数据传送装置,其中,所述根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对,包括:
    当所述用户B响应所述连接请求时,随机生成第一私钥和第二私钥;
    根据取模运算求解所述第一私钥的第一公钥和所述第二私钥的第二公钥;
    组合所述第一私钥和所述第一公钥得到所述第一公私钥对,组合所述第二私钥和所述第二公钥得到所述第二公私钥对。
  9. 一种电子设备,其中,所述电子设备包括:
    至少一个处理器;以及,
    与所述至少一个处理器通信连接的存储器;其中,
    所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行如下步骤:
    接收用户A对用户B的连接请求,根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对;
    当所述第一公私钥对及所述第二公私钥对分配成功时,随机为所述用户A分配第三私钥对;
    根据所述第一公私钥对、所述第二公私钥对及所述第三公私钥,基于地址计算法计算所述第二公私钥对的公钥地址;
    从预构建的第一区块链中,提取所述用户A向所述用户B传送的数据集,根据所述公钥地址对所述数据集进行加密操作,得到加密数据集;
    使用所述加密数据集计算传送至所述用户B的传送公钥地址,验证所述公钥地址和所述传送公钥地址是否相同;
    若所述公钥地址和所述传送公钥地址不相同,则拒绝传送所述数据集至所述用户B,若所述公钥地址和所述传送公钥地址相同,则允许传送所述数据集至所述用户B,并将所述数据集以块链方式存储至预构建的第二区块链。
  10. 如权利要求9所述的电子设备,其中,所述根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对,包括:
    当所述用户B响应所述连接请求时,随机生成第一私钥和第二私钥;
    根据取模运算求解所述第一私钥的第一公钥和所述第二私钥的第二公钥;
    组合所述第一私钥和所述第一公钥得到所述第一公私钥对,组合所述第二私钥和所述第二公钥得到所述第二公私钥对。
  11. 如权利要求10所述的电子设备,其中,所述根据取模运算求解所述第一私钥的第一公钥和所述第二私钥的第二公钥,包括:
    利用下述求解公式求解所述第一公钥
    Figure PCTCN2021096243-appb-100016
    及第二公钥
    Figure PCTCN2021096243-appb-100017
    Figure PCTCN2021096243-appb-100018
    Figure PCTCN2021096243-appb-100019
    其中,
    Figure PCTCN2021096243-appb-100020
    为所述第一私钥,
    Figure PCTCN2021096243-appb-100021
    所述第二私钥,n是两个随机素数的乘积值,g为预设的数据值,mod为所述取模运算。
  12. 如权利要求11所述的电子设备,其中,所述地址计算法为:
    Figure PCTCN2021096243-appb-100022
    Figure PCTCN2021096243-appb-100023
    其中,address表示所述第二公私钥对的公钥地址,KDF表示所述地址计算法,
    Figure PCTCN2021096243-appb-100024
    表示迪菲-赫尔曼秘钥交换法则,
    Figure PCTCN2021096243-appb-100025
    是与所述第三私钥对对应的第三公钥。
  13. 如权利要求9所述的电子设备,其中,所述根据所述公钥地址对所述数据集进行加密操作,得到加密数据集,包括:
    获取所述用户A的用户签名及混淆公钥;
    将所述用户签名、所述混淆公钥、所述公钥地址及所述数据集进行打包得到所述加密数据集。
  14. 如权利要求9中所述的电子设备,其中,所述使用所述加密数据集计算传送至所述用户B的传送公钥地址,包括:
    提取所述加密数据集内用户A的所述混淆公钥;
    根据所述混淆公钥,利用下述计算方法计算得到所述传送公钥地址address_transmit,计算方法为:
    Figure PCTCN2021096243-appb-100026
    其中,
    Figure PCTCN2021096243-appb-100027
    为用户A的所述混淆公钥,KDF为所述地址计算法,
    Figure PCTCN2021096243-appb-100028
    为所述迪菲-赫尔曼秘钥交换法则,
    Figure PCTCN2021096243-appb-100029
    为所述第一公钥,
    Figure PCTCN2021096243-appb-100030
    为所述第二公钥,g为预设的数据值。
  15. 一种计算机可读存储介质,存储有计算机程序,其中,所述计算机程序被处理器执行时实现如下步骤:
    接收用户A对用户B的连接请求,根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对;
    当所述第一公私钥对及所述第二公私钥对分配成功时,随机为所述用户A分配第三私钥对;
    根据所述第一公私钥对、所述第二公私钥对及所述第三公私钥,基于地址计算法计算所述第二公私钥对的公钥地址;
    从预构建的第一区块链中,提取所述用户A向所述用户B传送的数据集,根据所述公钥地址对所述数据集进行加密操作,得到加密数据集;
    使用所述加密数据集计算传送至所述用户B的传送公钥地址,验证所述公钥地址和所述传送公钥地址是否相同;
    若所述公钥地址和所述传送公钥地址不相同,则拒绝传送所述数据集至所述用户B,若所述公钥地址和所述传送公钥地址相同,则允许传送所述数据集至所述用户B,并将所述数据集以块链方式存储至预构建的第二区块链。
  16. 如权利要求15所述的计算机可读存储介质,其中,所述根据所述连接请求为所述用户B分配第一公私钥对、第二公私钥对,包括:
    当所述用户B响应所述连接请求时,随机生成第一私钥和第二私钥;
    根据取模运算求解所述第一私钥的第一公钥和所述第二私钥的第二公钥;
    组合所述第一私钥和所述第一公钥得到所述第一公私钥对,组合所述第二私钥和所述第二公钥得到所述第二公私钥对。
  17. 如权利要求16所述的计算机可读存储介质,其中,所述根据取模运算求解所述第一私钥的第一公钥和所述第二私钥的第二公钥,包括:
    利用下述求解公式求解所述第一公钥
    Figure PCTCN2021096243-appb-100031
    及第二公钥
    Figure PCTCN2021096243-appb-100032
    Figure PCTCN2021096243-appb-100033
    Figure PCTCN2021096243-appb-100034
    其中,
    Figure PCTCN2021096243-appb-100035
    为所述第一私钥,
    Figure PCTCN2021096243-appb-100036
    所述第二私钥,n是两个随机素数的乘积值,g为预设的数据值,mod为所述取模运算。
  18. 如权利要求17所述的计算机可读存储介质,其中,所述地址计算法为:
    Figure PCTCN2021096243-appb-100037
    Figure PCTCN2021096243-appb-100038
    其中,address表示所述第二公私钥对的公钥地址,KDF表示所述地址计算法,
    Figure PCTCN2021096243-appb-100039
    表示迪菲-赫尔曼秘钥交换法则,
    Figure PCTCN2021096243-appb-100040
    是与所述第三私钥对对应的第三公钥。
  19. 如权利要求15所述的计算机可读存储介质,其中,所述根据所述公钥地址对所述数据集进行加密操作,得到加密数据集,包括:
    获取所述用户A的用户签名及混淆公钥;
    将所述用户签名、所述混淆公钥、所述公钥地址及所述数据集进行打包得到所述加密数据集。
  20. 如权利要求15中所述的计算机可读存储介质,其中,所述使用所述加密数据集计算传送至所述用户B的传送公钥地址,包括:
    提取所述加密数据集内用户A的所述混淆公钥;
    根据所述混淆公钥,利用下述计算方法计算得到所述传送公钥地址address_transmit,计算方法为:
    Figure PCTCN2021096243-appb-100041
    其中,
    Figure PCTCN2021096243-appb-100042
    为用户A的所述混淆公钥,KDF为所述地址计算法,
    Figure PCTCN2021096243-appb-100043
    为所述迪菲-赫尔曼秘钥交换法则,
    Figure PCTCN2021096243-appb-100044
    为所述第一公钥,
    Figure PCTCN2021096243-appb-100045
    为所述第二公钥,g为预设的数据值。
PCT/CN2021/096243 2020-05-28 2021-05-27 基于身份加密的数据传送方法、装置、电子设备及存储介质 WO2021239034A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010471292.2A CN111683070B (zh) 2020-05-28 2020-05-28 基于身份加密的数据传送方法、装置及存储介质
CN202010471292.2 2020-05-28

Publications (1)

Publication Number Publication Date
WO2021239034A1 true WO2021239034A1 (zh) 2021-12-02

Family

ID=72453038

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/096243 WO2021239034A1 (zh) 2020-05-28 2021-05-27 基于身份加密的数据传送方法、装置、电子设备及存储介质

Country Status (2)

Country Link
CN (1) CN111683070B (zh)
WO (1) WO2021239034A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111683070B (zh) * 2020-05-28 2022-07-15 平安科技(深圳)有限公司 基于身份加密的数据传送方法、装置及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109919619A (zh) * 2019-04-30 2019-06-21 中央财经大学 一种区块链交易中身份隐私保护方法
CN110224985A (zh) * 2019-05-07 2019-09-10 平安科技(深圳)有限公司 数据处理的方法及相关装置
CN110519059A (zh) * 2019-09-29 2019-11-29 四川师范大学 一种基于双线性映射的区块链双密钥隐匿地址处理方法
CN110675265A (zh) * 2019-09-29 2020-01-10 四川师范大学 无临时密钥泄露的区块链双密钥隐匿地址协议的实现方法
US20200127813A1 (en) * 2017-04-24 2020-04-23 Blocksettle Ab Method and system for creating a user identity
CN111683070A (zh) * 2020-05-28 2020-09-18 平安科技(深圳)有限公司 基于身份加密的数据传送方法、装置及存储介质

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6247193B2 (ja) * 2014-10-10 2017-12-13 山下 健一 広告閲覧促進システム、情報処理方法及びプログラム
CN111008836B (zh) * 2019-11-15 2023-09-05 哈尔滨工业大学(深圳) 一种隐私安全转账支付方法、装置、系统及存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200127813A1 (en) * 2017-04-24 2020-04-23 Blocksettle Ab Method and system for creating a user identity
CN109919619A (zh) * 2019-04-30 2019-06-21 中央财经大学 一种区块链交易中身份隐私保护方法
CN110224985A (zh) * 2019-05-07 2019-09-10 平安科技(深圳)有限公司 数据处理的方法及相关装置
CN110519059A (zh) * 2019-09-29 2019-11-29 四川师范大学 一种基于双线性映射的区块链双密钥隐匿地址处理方法
CN110675265A (zh) * 2019-09-29 2020-01-10 四川师范大学 无临时密钥泄露的区块链双密钥隐匿地址协议的实现方法
CN111683070A (zh) * 2020-05-28 2020-09-18 平安科技(深圳)有限公司 基于身份加密的数据传送方法、装置及存储介质

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LEE, SEONG-WHAN ; LI, STAN Z: " Advances in biometrics : international conference, ICB 2007, Seoul, Korea, August 27 - 29, 2007 ; proceedings", vol. 10974 Chap.9, 22 June 2018, SPRINGER , Berlin, Heidelberg , ISBN: 3540745491, article FAN XINXIN: "Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems", pages: 127 - 138, XP047476581, 032548, DOI: 10.1007/978-3-319-94478-4_9 *

Also Published As

Publication number Publication date
CN111683070A (zh) 2020-09-18
CN111683070B (zh) 2022-07-15

Similar Documents

Publication Publication Date Title
JP7177575B2 (ja) ランダム・シーケンスを生成および検証するための分散型台帳
US10491396B2 (en) Method and server for providing notary service for file and verifying file recorded by notary service
US10235538B2 (en) Method and server for providing notary service for file and verifying file recorded by notary service
CN108345806B (zh) 一种硬件加密卡和加密方法
WO2018024061A1 (zh) 一种共享数字内容的许可证的方法、装置及系统
WO2018112946A1 (zh) 注册及授权方法、装置及系统
US20190295069A1 (en) Systems and methods for integrating cryptocurrency wallet identifiers with digital certificates
US20160294553A1 (en) Information delivery system
KR20180114182A (ko) 비밀 공유를 위한 타원 곡선 암호를 사용하는 개인용 장치 보안
US10454910B2 (en) Management apparatus, computer program product, system, device, method, information processing apparatus, and server
CN112953930A (zh) 一种云存储数据的处理方法、装置及计算机系统
JP2018501567A (ja) 装置検証方法及び機器
TW202011712A (zh) 密碼運算、創建工作密鑰的方法、密碼服務平台及設備
CN114884697B (zh) 基于国密算法的数据加解密方法及相关设备
CN112671720A (zh) 一种云平台资源访问控制的令牌构造方法、装置及设备
WO2021151308A1 (zh) 登录检验方法、装置及计算机可读存储介质
JP2019009767A (ja) 情報処理装置
CN109815747A (zh) 基于区块链的离线审计方法、电子装置及可读存储介质
CN113055380A (zh) 报文处理方法、装置、电子设备及介质
TW201832514A (zh) 隱藏還原區塊鏈交易中交易方資訊之裝置及其方法
WO2021239034A1 (zh) 基于身份加密的数据传送方法、装置、电子设备及存储介质
WO2022068234A1 (zh) 基于共享根密钥的加密方法、装置、设备及介质
CN114760114A (zh) 身份认证方法、装置、设备及介质
CN117240625B (zh) 一种涉及防篡改的数据处理方法、装置及电子设备
KR20180024389A (ko) 키 관리 장치 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21812303

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21812303

Country of ref document: EP

Kind code of ref document: A1