Method and system for realizing block chain private key protection based on key segmentation

A blockchain and key technology, applied in the field of information security, can solve problems such as irretrievability and lack of security of the private key of the blockchain

Active Publication Date: 2017-03-29
北京信任度科技有限公司
View PDF6 Cites 89 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical task of the present invention is to address the above deficiencies, and provide a method and system for realizing blockchain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing block chain private key protection based on key segmentation
  • Method and system for realizing block chain private key protection based on key segmentation
  • Method and system for realizing block chain private key protection based on key segmentation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0098] as attached figure 1 And attached figure 2 As shown, the method for realizing blockchain private key protection based on key splitting in the present invention uses a cloud cipher machine and an authentication server, and uses a mobile phone as a terminal carrier to implement a blockchain private key that supports certificate authentication and password authentication for mobile devices. Hard encryption; use the threshold algorithm to split the private key of the blockchain to achieve multi-party participation in key backup and key recovery / retrieval, including:

[0099] (1) Registration process: After the encryption machine generates a temporary key pair, it divides the private key to generate key fragments, and then double-encrypts the key fragments and outputs them to the mobile phone and the authentication server;

[0100] (2) The process of using the private key: decrypt the key fragment within the validity period of the key synthesis, synthesize the decrypted ke...

Embodiment 2

[0170] as attached Figure 7 , attached Figure 8 And attached Figure 9 As shown, this embodiment is an improvement on the basis of Embodiment 1. The difference between this embodiment and Embodiment 1 is: In this embodiment, the mobile device certificate login command is the mobile device certificate login fingerprint P4, and the remote access authentication flag P3 for biometric authentication. details as follows:

[0171] In step (1.1), the mobile device certificate login command is the mobile device certificate login fingerprint P4, that is, access to the mobile phone is realized by entering the mobile device certificate login fingerprint P4 on the mobile phone; the remote access authentication mark is biometric authentication P3, namely Remote access via biometric authentication P3.

[0172] Correspondingly, in step (1.3), the cipher machine uses the cipher machine device certificate HSMCert and the biometric authentication P3 double encryption key fragment K2 to obt...

Embodiment 3

[0180] as attached Figure 10 , attached Figure 11 And attached Figure 12 As shown, this embodiment is a further improvement on the basis of Embodiment 1. The difference between this embodiment and Embodiment 1 is: In this embodiment, the mobile device certificate login command is the mobile device certificate login password P2 and the mobile device certificate Login fingerprint P4, remote access authentication marks are remote access password P1 and biometric authentication P3. details as follows:

[0181] In step (1.1), the mobile device certificate login command is the mobile device certificate login password P2 and the mobile device certificate login fingerprint P4, you can optionally enter the mobile device certificate login password P2 on the mobile phone or enter the mobile device on the mobile phone The certificate is registered in the fingerprint P4 to realize the access to the mobile phone; the remote access authentication mark is the remote access password P1 and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for realizing block chain private key protection based on key segmentation, and aims to solve a technical problem that a private key of a block chain is lack of security and cannot be retrieved. The method for realizing block chain private key protection based on key segmentation comprises that hard encryption for a block chain private key supporting mobile phone equipment certificate authentication and password authentication is realized by taking a mobile phone as a terminal carrier and using a cipher machine and an authentication server of the cloud; and the block chain private key is segmented by using a threshold algorithm, and multi-party participating key backup and key recovery/retrieval is realized. The method comprises (1) a registration procedure, (2) a private key utilization procedure, (3) a private key backup procedure, and (4) a private key recovery/retrieval procedure. The system structurally comprises a cipher machine and an authentication server of the cloud and a mobile phone acting as the terminal carrier. The method and the system disclosed by the invention can realize safe storage, safe utilization, multi-party participating backup and multi-party participating retrieval of the block chain private key.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for realizing blockchain private key protection based on key splitting. Background technique [0002] Blockchain (BlockChain) is an important concept of Bitcoin. It is essentially a decentralized database and serves as the underlying technology of Bitcoin. Blockchain is a series of data blocks associated with each other using cryptographic methods. Each data block contains the information of a Bitcoin network transaction, which is used to verify the validity of its information (anti-counterfeiting) and generate the next block. [0003] In a narrow sense, the blockchain is a chained data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be tamper-proof and unforgeable distributed ledgers. Broadly speaking, blockchain technology uses block chain data structures to verify and st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/38H04L9/08
CPCG06Q20/3829H04L9/0827H04L9/085
Inventor 马臣云
Owner 北京信任度科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products