Alliance chain node secret-key distribution and backup system by improved BIP protocol
A secret key and node technology, which is applied in the field of alliance chain node secret key distribution and backup system, can solve the problems of NVP node secret key distribution and backup complexity, inconvenient management, etc., and achieve the effect of protecting privacy and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The present invention will be described in detail below in conjunction with the specific embodiments shown in the drawings.
[0044] figure 1 It is a schematic diagram of the structure of the alliance chain node secret key distribution and backup system that improves the BIP protocol of the present invention, such as figure 1 Shown, including:
[0045] The seed building module is connected to the seed backup sub-module in the secret key derivation and secret key backup module. The key seed is the core of key derivation and key recovery, and seed generation is also the initial step of this method. The current organization identification code is input through the VP node, and the seed is obtained after three hash operations in the seed building module. In the encryption process, the first 64 bits of the third hash result are extracted as the seed check bit, which is used to verify the correctness and integrity of the seed when the secret key is restored. The double-hash hash...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com