Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key updating method and device and storage medium

A key update and device technology, applied in the blockchain field, can solve problems such as error-prone, long update cycle, etc.

Active Publication Date: 2020-06-19
中移动信息技术有限公司 +1
View PDF11 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] MC synchronizes the newly generated keys to all SNs through DBLINK, which has the problem of long update cycle and error-prone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key updating method and device and storage medium
  • Key updating method and device and storage medium
  • Key updating method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] The first key update method is given here, applied to the first device, such as figure 2 As shown, key update methods include:

[0058] Step 201: Obtain the key update request of the service node corresponding to the first device, and generate corresponding key update information for the key update request; wherein, the key update information includes at least service node information and a new key;

[0059] Step 202: Send key update information to at least one second device, so that at least one second device can verify the validity of the key update information to obtain a verification result;

[0060] Step 203: receiving a verification result of at least one second device, and generating a corresponding block for the new key based on the verification result of at least one second device;

[0061] Step 204: Send the block to at least one second device, so that the at least one second device adds the block to the local blockchain to generate a new blockchain.

[006...

Embodiment 2

[0074] In order to better reflect the purpose of the present invention, on the basis of Embodiment 1 of the present invention, further illustrations are made, such as image 3 As shown, the key update method specifically includes:

[0075] Step 301: Obtain the key update request of the service node corresponding to the first device, and generate corresponding key update information for the key update request; wherein, the key update information includes at least service node information and a new key;

[0076] Step 302: Send key update information to at least one second device, so that at least one second device can verify the validity of the key update information to obtain a verification result;

[0077] Step 303: When the verification results of at least N second devices in at least one second device are valid, determine that the key update information is valid; generate a corresponding block for the new key;

[0078] Step 304: Send the block to at least one second device,...

Embodiment 3

[0093] In order to better reflect the purpose of the present invention, on the basis of Embodiment 1 of the present invention, further illustrations are made, such as Figure 4 As shown, the key update method specifically includes:

[0094] Step 401: Obtain the key update request of the service node corresponding to the first device, and generate corresponding key update information for the key update request; wherein, the key update information includes at least service node information and a new key;

[0095] Step 402: Send key update information to at least one second device, so that at least one second device performs validity verification on the key update information to obtain a verification result;

[0096] Step 403: receiving a verification result of at least one second device, and generating a corresponding block for the new key based on the verification result of at least one second device;

[0097] Step 404: Send the block to at least one second device, so that at ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a secret key updating method and device and a storage medium, and the method comprises the steps: obtaining a secret key updating request of a business node corresponding to a first device, and generating corresponding secret key updating information for the secret key updating request, wherein the key updating information at least comprises service node information and a new key; sending the key updating information to at least one piece of second equipment, so that at least one piece of second equipment performs validity verification on the key updating information to obtain a verification result; receiving a verification result of at least one second device, and generating a corresponding block for the new key based on the verification result ofat least one second device; and sending the block to at least one second device, so that at least one second device adds the block to a local block chain to generate a new block chain. Therefore, thesecurity of the secret key information and the secret key updating efficiency can be greatly improved.

Description

technical field [0001] The present invention relates to blockchain technology, in particular to a key update method, device and storage medium. Background technique [0002] The key in the mesh network system is divided into two parts: private key, certificate, and symmetric key. These two parts need to be transmitted and stored through different channels to ensure security. The private key and certificate are generated by the Management Center (MC), and are manually distributed and installed in the encryption machine to encrypt the symmetric key. [0003] figure 1 Shows a mesh network key update process, when the Beijing service node (Service Node, SN) key leaks or is not available, the Beijing SN sends a key update request to the mesh network headquarters SN, and the headquarters SN passes the mesh network MC After receiving the application from SN, a new key will be generated, and the newly generated key will be synchronously updated to all SNs through the database link...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0861H04L9/0891H04L63/12H04L67/104
Inventor 夏敬侃邹媛周成何勇强叶可可雷文丽张琰
Owner 中移动信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products