Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blockchain secret key encryption and decryption methods and devices based on biological identification and terminal

A technology of biometric identification and encryption method, which is applied in biometric-based block chain secret key encryption and decryption methods, devices and terminals, and can solve user economic losses, user digital asset rights and interests attacks, and illegal stealing of block chain secret keys, etc. problems, to achieve the effects of not being easy to lose, increasing the difficulty of stealing, and ensuring the safety and reliability of storage

Inactive Publication Date: 2018-10-16
价值互联(广州)信息技术有限公司
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, most of the blockchain secret keys are completely kept by the users themselves. However, the blockchain secret keys kept by the users themselves are easy to be illegally stolen. Once the user's blockchain secret key is lost, the user's digital The asset rights and interests are attacked, which brings great economic losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain secret key encryption and decryption methods and devices based on biological identification and terminal
  • Blockchain secret key encryption and decryption methods and devices based on biological identification and terminal
  • Blockchain secret key encryption and decryption methods and devices based on biological identification and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0055] Obtain the blockchain secret key, and divide the blockchain secret key into sub-keys with a preset total number of shares. Assuming that the preset total number of shares is n, select a sub-key combination to form the first type of secret key , from which (n-a) molecular key combinations are selected to form the second type of key. For ease of understanding, in a simple implementation, it can be assumed that the blockchain key is divided into four parts ABCD, one of which is selected as the first type of key C, and three of them are selected as ABD. The second type of key.

[0056] The encryption key is generated by asymmetric encryption technology, where the encryption key includes a public key g and a private key s, and the private key s is associated with the user's biometric information, that is, the private key s is associated with the biometric information bound. The public key g corresponds to the private key s. Both the public key g and the private key s are s...

Embodiment approach 2

[0059] Obtain the blockchain secret key, divide the blockchain secret key into unequal sub-keys with a preset total number of shares, assuming that the preset total number of shares is n, select a sub-key combination to form the first type of secret key keys, from which (n-a) sub-keys are selected to combine to form the second type of keys. For ease of understanding, in a simple implementation, it can be assumed that the blockchain key is divided into four parts ABCD, one of which is selected as the first type of key C, and three of them are selected as ABD. The second type of key.

[0060] The encryption key g is generated by symmetric encryption technology, and the encryption key g is associated with the biometric information of the user, that is, the secret key g is bound to the biometric information.

[0061] Encrypt part of the sub-keys of the second type of key with the above-mentioned encryption key g. The user retains the first type of secret key, and the third-party...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides blockchain secret key encryption and decryption methods and devices based on biological identification and a terminal, and relates to the technical field of a blockchain. The encryption method comprises the steps of: acquiring a to-be-encrypted blockchain secret key of a user; segmenting the blockchain secret key to obtain a first-category secret key and a second-category secret key; acquiring an encryption secret key for encrypting the second-category secret key, and encrypting the second-category secret key by adopting the encryption secret key, wherein the encryptionsecret key is associated with biological characteristic information of the user, which is acquired in advance; and providing the first-category secret key to the user and storing the encrypted second-category secret key. According to the invention, illegal stealing of the blockchain secret key can be effectively prevented, and storage safety and reliability of the blockchain secret key are well promoted.

Description

technical field [0001] The present invention relates to the technical field of blockchain, in particular to a method, device and terminal for encryption and decryption of blockchain secret keys based on biometrics. Background technique [0002] With the perfect protocol and architecture design, the application and development of blockchain technology has built a safe and credible storage and transaction network. Among them, one of the key factors to ensure the security performance of blockchain technology lies in digital encryption technology, and once the encryption algorithm and secret key as the core of digital encryption technology are cracked, the data security of blockchain will be challenged, storage and transaction networks will also be destroyed. Although the design of the blockchain protocol is relatively rigorous, the security of the blockchain secret key as the user identity certificate has become a security shortcoming of the entire blockchain system. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06Q20/38G06Q20/40
CPCG06Q20/3829G06Q20/40145H04L9/3231H04L63/0478H04L63/065H04L63/0861
Inventor 陈伟恒刘希诚
Owner 价值互联(广州)信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products