Block chain based key storage, updating method, apparatus, apparatus and medium

A technology for key storage and key update, applied in the fields of equipment and media, blockchain-based key storage, device, and update method, can solve the problems of potential security risks and easy leakage of keys, so as to avoid potential security risks. , the effect of improving safety

Active Publication Date: 2019-02-15
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the key is easy to leak, and there are security risks, and it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain based key storage, updating method, apparatus, apparatus and medium
  • Block chain based key storage, updating method, apparatus, apparatus and medium
  • Block chain based key storage, updating method, apparatus, apparatus and medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0042] Example one

[0043] figure 1 It is a flowchart of a blockchain-based key storage method in the first embodiment of the present invention. The embodiment of the present invention is applicable to the situation that when an electronic device needs to be used as a central controllable device to control the blockchain network, the key that needs to be used is provided to the blockchain node for storage. The method can be implemented by a blockchain-based encryption The key storage device is implemented by software and / or hardware, and is specifically configured in the electronic device that carries the blockchain node. Of course, those skilled in the art should also understand that the key to be stored is not limited to the key provided by the central controllable device, but can also be a key that needs to be used in any blockchain network. The issuer of the key can be any blockchain node .

[0044] Such as figure 1 The shown key storage method based on blockchain includes: ...

Example Embodiment

[0065] Example two

[0066] figure 2 It is a flowchart of a blockchain-based key storage method in the second embodiment of the present invention. The embodiments of the present invention are additionally optimized on the basis of the technical solutions of the foregoing embodiments.

[0067] Further, after the operation "acquire a new key and the effective range of the new key according to the key storage message, and store it", add "if the encryption information associated with the key is obtained, then determine the The effective key corresponding to the effective range of the encrypted information; using the effective key to decrypt the encrypted information" to interact with the device sending the encrypted information through the key.

[0068] Preferably, the device that sends the encrypted information is an electronic device that carries a blockchain network node.

[0069] Such as figure 2 The shown one based on blockchain key storage method includes:

[0070] S210. Receive a...

Example Embodiment

[0094] Example three

[0095] image 3 It is a flowchart of a blockchain-based key storage method in the third embodiment of the present invention. The embodiments of the present invention are optimized on the basis of the technical solutions of the foregoing embodiments.

[0096] Further, "obtain a new key according to the key storage message" is refined into "obtain new key encryption information according to the key storage message, and use the stored key within the effective range to pair the new key. The key encrypted information is decrypted to obtain the new key" to enhance the security of the new key during transmission.

[0097] Such as image 3 The shown key storage method based on blockchain includes:

[0098] S310. Receive a key storage message.

[0099] In order to ensure the security of the new key distribution process, the central controllable device encrypts the key storage message including the new key with the historical key to generate a new key encrypted message; t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a key storage and updating method, a device, a device and a medium based on a block chain. The key storage method comprises the following steps: receiving a key storage message; Acquiring a new key and an effective range of the new key according to the key storage message, and storing the new key; Updating the effective scope of the stored key based on thekey storage message. The key and the effective range of the key are introduced into the technical scheme, so that the block chain node can encrypt and decrypt the block data using the key, At the same time, the effective range is used to limit the block data that can be processed by the key, so that the key can be stopped in time when the key disclosure within the effective range is not detected,and when the key disclosure outside the effective range is not detected, the security hidden danger caused by the key disclosure can be avoided, and the security of the key used in the block chain isimproved.

Description

technical field [0001] Embodiments of the present invention relate to block chain data processing technology, and in particular to a block chain-based key storage and update method, device, device and medium. Background technique [0002] Blockchain is a new application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. In order to improve the security of data and operation, the use of keys is unavoidable. [0003] In the prior art, an asymmetric key pair is usually used to reflect the identity and authority of the key user. However, the key is easy to leak, and there are security risks, and it is necessary to further improve the security of the use of the key pair. Contents of the invention [0004] Embodiments of the present invention provide a block chain-based key storage and update method, device, device, and medium, so as to improve the security of keys used in the block chain...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/38G06Q40/04
CPCG06Q20/3829G06Q40/04
Inventor 肖伟
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products