Unlock instant, AI-driven research and patent intelligence for your innovation.

Block chain processing method, device, equipment and storage medium

A processing method and blockchain technology, applied in the field of information security, can solve the problems of a single cryptographic algorithm, loss of user data/assets, and the inability of algorithms to be used at the same time, achieving the effect of easy upgrade, improved security and scalability

Active Publication Date: 2022-06-28
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The existing blockchain network only supports a single cryptographic algorithm, and algorithms with mutually exclusive relationships cannot be used on the same blockchain network at the same time
When a certain signature algorithm / hash algorithm / encryption algorithm has a security hole, it cannot be directly upgraded and a hard fork is required
The cost of hard fork is very high, the old and new networks are not compatible, and users' data / assets will suffer huge losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain processing method, device, equipment and storage medium
  • Block chain processing method, device, equipment and storage medium
  • Block chain processing method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] figure 1 This is a flowchart of a blockchain processing method provided in Embodiment 1 of the present invention. This embodiment can be applied to the situation of how to process a blockchain, especially in a block that can support multiple mutually exclusive cryptographic algorithms. In the chain network, how to process the blockchain to solve the problem that the existing blockchain network only supports a single cryptographic algorithm, and when a security loophole occurs in the cryptographic algorithm, it cannot be directly upgraded, and a hard fork is required. The entire set of blockchain processing methods can be executed by the user node and the blockchain node, wherein the user node can be a device locally deployed with the blockchain client used by the user, such as a user terminal. Optionally, the user node can be a node in the blockchain network, or not a node in the blockchain network, but can interact with the blockchain node through the interface provide...

Embodiment 2

[0066] figure 2 This is a flowchart of a blockchain processing method provided in Embodiment 2 of the present invention. This embodiment is further optimized on the basis of the above-mentioned embodiments, and provides a scenario where a security loophole occurs in the cryptographic algorithm of the target user. For solutions on how to perform blockchain processing, see figure 2 , the method can specifically include:

[0067] S210: Determine a target cryptographic algorithm used by the target user from at least two candidate cryptographic algorithms provided by the blockchain network, wherein the at least two candidate cryptographic algorithms are deployed in the blockchain nodes.

[0068] S220, according to the target cryptographic algorithm, create a blockchain account of the target user, and add a marker of the target cryptographic algorithm to the blockchain account information as the algorithm marking part.

[0069] Among them, the algorithm marking part is used to d...

Embodiment 3

[0085] image 3 This is a flowchart of a blockchain processing method provided in Embodiment 3 of the present invention. On the basis of the above embodiments, this embodiment further explains how to create a target user's blockchain account according to the target cryptographic algorithm. see image 3 , the method can specifically include:

[0086] S310: Determine the target cryptographic algorithm used by the target user from at least two candidate cryptographic algorithms provided by the blockchain network, wherein the at least two candidate cryptographic algorithms are deployed in the blockchain nodes.

[0087] S320, according to the obtained random number and the target elliptic curve in the target cryptographic algorithm, determine the value part in the blockchain key of the target user.

[0088] In this embodiment, the value part of the blockchain key is the specific content of the blockchain key, which is used to sign / encrypt data, transaction requests, etc.; Digita...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a block chain processing method, device, equipment and storage medium. Wherein, the method is performed by the user node, and the method includes: determining the target cryptographic algorithm used by the target user from at least two candidate cryptographic algorithms provided by the blockchain network, wherein at least two candidate cryptographic algorithms are deployed on In the block chain node; according to the target cryptographic algorithm, create the block chain account of the target user, and add the marker of the target cryptographic algorithm to the block chain account information as the algorithm mark part, wherein, The algorithm marking part is used to determine the corresponding cryptographic algorithm in the process of verifying the account information by the blockchain node. Through the technical solutions provided by the embodiments of the present invention, the same blockchain network can support multiple mutually exclusive cryptographic algorithms, which greatly improves security and scalability, and is easy to upgrade without hard forks.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of information security, and in particular, to a blockchain processing method, device, device, and storage medium. Background technique [0002] Existing blockchain networks only support a single cryptographic algorithm, and algorithms with mutually exclusive relationships cannot be used simultaneously on the same blockchain network. When a certain signature algorithm / hash algorithm / encryption algorithm used has security holes, direct upgrade cannot be performed, and a hard fork is required. The cost of a hard fork is very high, the old and new networks are incompatible, and users' data / assets will suffer huge losses. SUMMARY OF THE INVENTION [0003] The embodiments of the present invention provide a blockchain processing method, device, device and storage medium. The same blockchain network can support multiple mutually exclusive cryptographic algorithms, greatly improving security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3247H04L9/3236H04L9/50
Inventor 荆博
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD