Secure key signature method based on block chain technology

A blockchain and security technology, applied in the blockchain field, can solve problems such as reduced security, low security, unfavorable automatic operation and maintenance of the system, and achieve the effect of protecting security, improving security, and realizing automatic operation and maintenance management

Active Publication Date: 2018-05-18
江苏安凰领御科技有限公司
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen from this that the signature private key of the node is stored in the node in a simple password-protected way such as the PIN code, and will be loaded in the memory during operation. Since the operating system has rich communication and data exchange functions , which virtually provides a channel for information leakage and malware dissemination, so that the signature private key loaded in the memory is also exposed to various attacks and easily exported. Once the attacker breaks through the node, the signature private key can be stolen. And use the signature private key to sign, which is less secure
In addition, the user needs to enter the PIN code during the operation process, and each upgrade service requires manual participation, which is not conducive to the automatic operation and maintenance of the system. If the PIN code is written into the operation and maintenance script, the security will be reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure key signature method based on block chain technology
  • Secure key signature method based on block chain technology
  • Secure key signature method based on block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0038] This application discloses a key security signature method based on blockchain technology. The method is used in a blockchain system. The blockchain system includes several nodes, usually at least three, and each node communicates with each other in pairs. Establish a communication connection. The nodes here can be various devices such as computers, servers, workstations, and printers. This method can be executed by any node in the blockchain system. This method mainly includes key import and key application. part.

[0039] The first part is to execute the key import part when deploying the blockchain system on the node for the first time. This part includes the following steps, such as image 3 Shown:

[0040] First, create a wallet file. The wallet file includes at least the node key. The wallet file usually includes the wallet ad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure key signature method based on the block chain technology, and relates to the technical field of block chains. The method comprises the following steps: dynamically creating and initializing a security execution area, calling a security area entry instruction through a key loading function to enter the security execution area, loading a node key in a key file to thesecurity execution area, in a consensus process with other nodes in a block chain system, calling the security area entry instruction through a signature function to enter the security execution area, wherein the parameters of the signature function comprises a private key identifier and data to be signed, determining a signature private key corresponding to the private key identifier in the security execution area, signing the data to be signed by using the signature private key, and returning a signature result. According to the method, the security execution area of the CPU is fully used,the key of the node is stored in the security execution area, and the signature process is also executed in the security execution area, so that the security of the key is protected.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to a key security signature method based on block chain technology. Background technique [0002] Blockchain is a decentralized, tamper-proof, and shared digital ledger, which is used to record transactions in public or private peer-to-peer networks. The transaction ledger will be distributed to all nodes in the blockchain system. Each node does not Relying on third parties (such as financial institutions) to arbitrate transactions, they use consensus protocols to negotiate book content, and use cryptographic hash algorithms and digital signatures to ensure the integrity of transactions. After each node reaches a consensus through the consensus process, the transaction is written into the block and added to the blockchain. Taking the blockchain system including 3 nodes as an example, the consensus process of each node is as follows: figure 1 Shown: Node 1 initiates a consensu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/53
CPCG06F21/53H04L9/3226H04L9/3249
Inventor 申子熹
Owner 江苏安凰领御科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products