Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cluster key generation method and device, and storage medium

A key generation device and key generation technology are applied to secure communication devices, public keys for secure communications, and key distribution, which can solve problems such as unsuitability for distributed environments, low efficiency and limitations of group keys, and achieve Improve resource sharing efficiency, improve key generation efficiency, and improve security effects

Active Publication Date: 2019-03-15
SICHUAN PANOVASIC TECH +1
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the embodiments of the present invention is to provide a cluster key generation method, device and storage medium to solve the problem that existing key generation methods are based on traditional centralized solutions, and are relatively limited to communication field, the efficiency of group key generation is low in distributed environments such as alliance chains, and it is not suitable for distributed environment problems
[0006] The above embodiment generates a cluster key pair through the cluster authority of the node cluster, so that different consortium chain nodes that need to share the same resource under the distributed architecture can obtain the resource through the cluster key, which solves the problem of existing key pairs based on traditional centralization. The generation technology is not suitable for distributed environments, and at the same time effectively improves the efficiency of key generation with common resource sharing requirements in distributed environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cluster key generation method and device, and storage medium
  • Cluster key generation method and device, and storage medium
  • Cluster key generation method and device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0036]According to the applicant's research, it is found that the group key management method in the prior art is as follows: the security agent of the first cluster master node sends a key agreement request message containing the key seed to the second cluster master node security agent, so that The second cluster master node security agent responds to the key negotiation request message and sends a key negotiation response message to the first cluster master node security agent and synchronizes the key seed to the second cluster slave node, wherein the key seed is used to generate key; the security agent of the first cluster master node responds to the key negotiation response message and synchronizes the key seed to the first cluster slave node; the first cluster master node security agent judges that the key seed is synchronized to the first cluster slave node and synchronized to Whether the second cluster slave node is successful; if so, the security agent of the first clu...

no. 2 example

[0064] In order to cooperate with the cluster key generation method provided in the first embodiment of the present invention, the second embodiment of the present invention further provides a cluster key generation device 20 .

[0065] Please refer to image 3 , image 3 It is a schematic diagram of modules of a cluster key generation device 20 provided in the second embodiment of the present invention.

[0066] The cluster key generation device 20 includes a cluster authority determination module 21 and a cluster key pair generation module 22 .

[0067] The cluster authority determination module 21 is used to determine the cluster authority of the node cluster. The node cluster includes at least one chain node of the consortium chain. The cluster authority is used to indicate whether the node cluster has the authority to obtain the corresponding resources in the consortium chain.

[0068] The cluster key pair generation module 22 is configured to generate a cluster key pair ...

no. 3 example

[0075] Please refer to Figure 4 , Figure 4 The third embodiment of the present invention provides a structural block diagram of an electronic device 30 applicable to the embodiments of the present application. The electronic device 30 provided in this embodiment may include a cluster key generating device 20 , a memory 31 , a storage controller 32 , a processor 33 , a peripheral interface 34 , an input and output unit 35 , an audio unit 36 ​​, and a display unit 37 . As an optional implementation manner, the electronic device 30 may be a certain chain node device in the consortium chain.

[0076] The memory 31, storage controller 32, processor 33, peripheral interface 34, input and output unit 35, audio unit 36, and display unit 37 are electrically connected to each other directly or indirectly to realize data transmission or interact. For example, these components can be electrically connected to each other through one or more communication buses or signal lines. The cl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cluster key generation method and device, and a storage medium, and relates to the technical field of block chain resource encryption. The cluster key generation method comprises the following steps of determining a cluster permission of a node cluster, wherein the node cluster comprises link nodes of at least one alliance chain, and the cluster permission is used for indicating whether the node cluster has the permission to obtain the corresponding resources in the alliance chain; and generating a cluster key pair shared by all the chain nodes in the node cluster on the basis of the cluster permission. According to the method, the cluster key pair is generated through the cluster permission of the node cluster, and a high-efficiency key generation mode with commonresource sharing requirements in a distributed environment of the alliance chain is provided.

Description

technical field [0001] The present invention relates to the technical field of block chain resource encryption, in particular to a cluster key generation method, device and storage medium thereof. Background technique [0002] At present, the concept of cluster key mostly appears in group communication and is widely used in the field of communication, such as military, public security, railway, electric power, etc. Cluster key can meet various business modes: group, unicast, broadcast communication, etc. . The confidentiality of group communication generally requires that the talkgroup meet forward security and backward security, that is, a newly joined member cannot analyze the communication content of the encrypted talkgroup before it joins, and a member who exits cannot analyze the communication of the encrypted talkgroup after he left content. This requires the group encryption communication protocol to update the currently used group key when the group members change....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L9/08H04L9/32H04L29/08
CPCH04L9/0861H04L9/0869H04L9/0891H04L9/3066H04L9/3268H04L67/1044
Inventor 康红娟李琦
Owner SICHUAN PANOVASIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products