Block chain based key storage, updating method, apparatus, apparatus and medium
A technology for key storage and key update, applied in the fields of equipment and media, blockchain-based key storage, device, and update method, can solve the problems of potential security risks and easy leakage of keys, so as to avoid potential security risks. , the effect of improving safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0042] Example one
[0043] figure 1 It is a flowchart of a blockchain-based key storage method in the first embodiment of the present invention. The embodiment of the present invention is applicable to the situation that when an electronic device needs to be used as a central controllable device to control the blockchain network, the key that needs to be used is provided to the blockchain node for storage. The method can be implemented by a blockchain-based encryption The key storage device is implemented by software and / or hardware, and is specifically configured in the electronic device that carries the blockchain node. Of course, those skilled in the art should also understand that the key to be stored is not limited to the key provided by the central controllable device, but can also be a key that needs to be used in any blockchain network. The issuer of the key can be any blockchain node .
[0044] Such as figure 1 The shown key storage method based on blockchain includes: ...
Example Embodiment
[0065] Example two
[0066] figure 2 It is a flowchart of a blockchain-based key storage method in the second embodiment of the present invention. The embodiments of the present invention are additionally optimized on the basis of the technical solutions of the foregoing embodiments.
[0067] Further, after the operation "acquire a new key and the effective range of the new key according to the key storage message, and store it", add "if the encryption information associated with the key is obtained, then determine the The effective key corresponding to the effective range of the encrypted information; using the effective key to decrypt the encrypted information" to interact with the device sending the encrypted information through the key.
[0068] Preferably, the device that sends the encrypted information is an electronic device that carries a blockchain network node.
[0069] Such as figure 2 The shown one based on blockchain key storage method includes:
[0070] S210. Receive a...
Example Embodiment
[0094] Example three
[0095] image 3 It is a flowchart of a blockchain-based key storage method in the third embodiment of the present invention. The embodiments of the present invention are optimized on the basis of the technical solutions of the foregoing embodiments.
[0096] Further, "obtain a new key according to the key storage message" is refined into "obtain new key encryption information according to the key storage message, and use the stored key within the effective range to pair the new key. The key encrypted information is decrypted to obtain the new key" to enhance the security of the new key during transmission.
[0097] Such as image 3 The shown key storage method based on blockchain includes:
[0098] S310. Receive a key storage message.
[0099] In order to ensure the security of the new key distribution process, the central controllable device encrypts the key storage message including the new key with the historical key to generate a new key encrypted message; t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap