Block chain processing method, device, equipment and storage medium
A processing method and blockchain technology, applied in the field of information security, can solve the problems of a single cryptographic algorithm, loss of user data/assets, and the inability of algorithms to be used at the same time, achieving the effect of easy upgrade, improved security and scalability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] figure 1 This is a flowchart of a blockchain processing method provided in Embodiment 1 of the present invention. This embodiment can be applied to the situation of how to process a blockchain, especially in a block that can support multiple mutually exclusive cryptographic algorithms. In the chain network, how to process the blockchain to solve the problem that the existing blockchain network only supports a single cryptographic algorithm, and when a security loophole occurs in the cryptographic algorithm, it cannot be directly upgraded, and a hard fork is required. The entire set of blockchain processing methods can be executed by the user node and the blockchain node, wherein the user node can be a device locally deployed with the blockchain client used by the user, such as a user terminal. Optionally, the user node can be a node in the blockchain network, or not a node in the blockchain network, but can interact with the blockchain node through the interface provide...
Embodiment 2
[0066] figure 2 This is a flowchart of a blockchain processing method provided in Embodiment 2 of the present invention. This embodiment is further optimized on the basis of the above-mentioned embodiments, and provides a scenario where a security loophole occurs in the cryptographic algorithm of the target user. For solutions on how to perform blockchain processing, see figure 2 , the method can specifically include:
[0067] S210: Determine a target cryptographic algorithm used by the target user from at least two candidate cryptographic algorithms provided by the blockchain network, wherein the at least two candidate cryptographic algorithms are deployed in the blockchain nodes.
[0068] S220, according to the target cryptographic algorithm, create a blockchain account of the target user, and add a marker of the target cryptographic algorithm to the blockchain account information as the algorithm marking part.
[0069] Among them, the algorithm marking part is used to d...
Embodiment 3
[0085] image 3 This is a flowchart of a blockchain processing method provided in Embodiment 3 of the present invention. On the basis of the above embodiments, this embodiment further explains how to create a target user's blockchain account according to the target cryptographic algorithm. see image 3 , the method can specifically include:
[0086] S310: Determine the target cryptographic algorithm used by the target user from at least two candidate cryptographic algorithms provided by the blockchain network, wherein the at least two candidate cryptographic algorithms are deployed in the blockchain nodes.
[0087] S320, according to the obtained random number and the target elliptic curve in the target cryptographic algorithm, determine the value part in the blockchain key of the target user.
[0088] In this embodiment, the value part of the blockchain key is the specific content of the blockchain key, which is used to sign / encrypt data, transaction requests, etc.; Digita...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


