Method and system for realizing blockchain private key protection based on key splitting
A blockchain and key technology, applied in the field of information security, can solve problems such as irretrievability and lack of security of the private key of the blockchain
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0103] as attached figure 1 And attached figure 2 As shown, the method for realizing blockchain private key protection based on key splitting in the present invention utilizes a cloud cipher machine and an authentication server, uses a mobile phone as a terminal carrier, and implements a blockchain private key that supports certificate authentication and password authentication for mobile devices. Hard encryption; use the threshold algorithm to split the private key of the blockchain to achieve multi-party participation in key backup and key recovery / retrieval, including:
[0104] (1) Registration process: After the encryption machine generates a temporary key pair, it divides the private key to generate key fragments, and then double-encrypts the key fragments and outputs them to the mobile phone and the authentication server;
[0105] (2) Private key usage process: decrypt the key fragment within the valid period of key synthesis, synthesize the decrypted key fragment into...
Embodiment 2
[0175] as attached Figure 7 , attached Figure 8 And attached Figure 9 As shown, this embodiment is an improvement on the basis of Embodiment 1. The difference between this embodiment and Embodiment 1 is: In this embodiment, the mobile device certificate login command is the mobile device certificate login fingerprint P4, and the remote access authentication flag P3 for biometric authentication. details as follows:
[0176] In step (1.1), the mobile phone device certificate login command is the mobile phone device certificate login fingerprint P4, that is, access to the mobile phone is realized by entering the mobile phone device certificate login fingerprint P4 on the mobile phone; the remote access authentication mark is biometric authentication P3, namely Remote access via biometric authentication P3.
[0177] Correspondingly, in step (1.3), the cipher machine uses the cipher machine device certificate HSMCert and the biometric authentication P3 double encryption key ...
Embodiment 3
[0185] as attached Figure 10 , attached Figure 11 And attached Figure 12 As shown, this embodiment is a further improvement on the basis of Embodiment 1. The difference between this embodiment and Embodiment 1 is: In this embodiment, the mobile device certificate login command is the mobile device certificate login password P2 and the mobile device certificate Login fingerprint P4, remote access authentication marks are remote access password P1 and biometric authentication P3. details as follows:
[0186] In step (1.1), the mobile device certificate login command is the mobile device certificate login password P2 and the mobile device certificate login fingerprint P4, you can optionally enter the mobile device certificate login password P2 on the mobile phone or enter the mobile device The certificate is registered in the fingerprint P4 to realize the access to the mobile phone; the remote access authentication mark is the remote access password P1 and the biometric aut...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


