Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A consortium chain node secret key distribution and backup system that improves the bip protocol

A node and key technology, applied in the blockchain field, can solve the problems of complex and inconvenient management of NVP node key distribution and backup, and achieve the effect of protecting privacy and ensuring security.

Active Publication Date: 2021-10-15
BEIJING UNIV OF TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem that in a single organization in the alliance chain network, one VP node has multiple NVP nodes, the NVP node secret key distribution and backup are complicated and inconvenient to manage, the invention proposes the alliance chain NVP node secret key based on the improved BIP protocol Allocation and backup method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A consortium chain node secret key distribution and backup system that improves the bip protocol
  • A consortium chain node secret key distribution and backup system that improves the bip protocol
  • A consortium chain node secret key distribution and backup system that improves the bip protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be described in detail below in conjunction with specific embodiments shown in the accompanying drawings.

[0043] figure 1 It is a structural diagram of an improved BIP protocol alliance chain node key distribution and backup system of the present invention, as shown in figure 1 shown, including:

[0044]The seed construction module is connected with the seed backup sub-module in the secret key derivation and secret key backup module. Key seed is the core of key derivation and key recovery, and seed generation is also the initial step of this method. The current organization identification code is input through the VP node, and the seed is obtained through three hash operations in the seed building module. During the encryption process, the first 64 bits of the third hash result are extracted as the seed check bit, which is used to verify the correctness and integrity of the seed when the key is recovered. The double-hash hash operation e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an improved BIP protocol alliance chain node secret key distribution and backup system. The method includes four parts: a seed construction module, a secret key derivation module, a secret key backup module, and a secret key recovery module. The seed construction module is used for Generate the secret key seed organized in the alliance chain network; the secret key derivation module is used to calculate the NVP node key pair using the secret key seed, including NVP node private key derivation and NVP public key calculation; the secret key backup module is used to back up the secret key The key seed and the index sequence input by the NVP node in the key derivation module, including the seed backup module and the derived index backup module; the key recovery module is used to restore the NVP node key after the NVP node key is lost, including seed recovery There are three parts: submodule, index recovery submodule, and secret key recovery submodule. The invention creates a safe and reliable key relationship system, which can safely generate seeds and store backups, and supports multi-key expansion.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to a consortium chain node secret key distribution and backup system which improves the BIP protocol. Background technique [0002] The self-trust of the blockchain is mainly reflected in the fact that users distributed in the blockchain do not need to trust the other party of the transaction, nor do they need to trust a centralized organization, but only need to trust the software system under the blockchain protocol to realize the transaction. The premise of this kind of self-trust is the consensus mechanism of the blockchain (consensus), that is, in a market that does not trust each other, the necessary and sufficient condition for each node to reach a consensus is that each node maximizes its own interests. Consideration, will spontaneously and honestly abide by the pre-set rules in the agreement, judge the authenticity of each record, and finally record the true record int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04L9/06
CPCH04L9/0631H04L9/0866H04L9/3066H04L9/3239H04L9/3242
Inventor 徐旭东宋世昕陈依然姬庆庆
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products