Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Block chain key hierarchical management method

A layered management and blockchain technology, applied to key distribution, can solve the problems of direct intervention, theft, key efficiency and low security

Active Publication Date: 2019-10-01
峰杰技术有限公司
View PDF7 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The probability of the key being illegally stolen is high
[0006] (2) The key is stolen by the attacker, and the attacker will obtain the user's private information
[0007] (3) The efficiency and security of key recovery, generation, distribution and update are not high
[0008] (4) There are many direct human interventions in key management
There is very little work in this field, and there is no better key management solution to manage the keys in the existing blockchain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain key hierarchical management method
  • Block chain key hierarchical management method
  • Block chain key hierarchical management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] The technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0101] In the following description, a lot of specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, and those skilled in the art can do it without departing from the meaning of the present invention. By analogy, the present invention is therefore not limited to the specific examples disclosed below.

[0102] figure 1 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain key hierarchical management method, and relates to the technical field of data encryption management methods. The method comprises the following steps: initializing a user password, a login certificate, a password secret key, a main secret key and a main secret key ciphertext in a block chain system; generating a user private key, a user public key, a key fileand a user private key ciphertext; performing hierarchical management on the file encryption key, the file, the file ciphertext, the file encryption key ciphertext and the uploaded file; sharing corresponding files, and completing block chain key hierarchical management. According to the method, the key management efficiency can be improved, and the security of all keys is ensured. Meanwhile, anattacker cannot tamper the secret key, and the probability that the secret key is illegally stolen is low. In the transmission and storage process, even if the secret key is embezzled by an attacker,the attacker cannot obtain valuable information.

Description

technical field [0001] The present invention relates to the technical field of data encryption management methods, in particular to a layered management method for blockchain keys. Background technique [0002] Blockchain was originally referenced in Bitcoin and is the underlying technology of Bitcoin. Blockchain is essentially a distributed database integrated with various computer technologies such as point-to-point network, consensus mechanism, encryption algorithm, smart contract, digital signature and hash chain. It is precisely because of the use of these technologies in the blockchain that it has the characteristics of decentralization, non-repudiation, and traceability. In this way, Bitcoin can be freely circulated on the Internet and the value migration in the untrusted network can be realized. By designing various smart contracts based on the blockchain, the blockchain can be applied to various fields, such as healthcare, financial technology, computing, auditing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04L9/08
CPCH04L63/064H04L63/0442H04L9/0869H04L9/3066H04L9/3247
Inventor 郑丽娟李兆轩胡畅霞刘豫晋张宇周文峰毛志俊
Owner 峰杰技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products