Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Block chain cross-chain key security access method and device and storage medium

A technology for secure access and storage media, which is applied to secure communication devices and key distribution, and can solve the problems of private key data loss, permanent loss of private key, and easy theft or tampering of blockchain private key transmission.

Active Publication Date: 2020-08-14
蒋瑞诚
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002]In the existing general-purpose blockchain technology application, the user who holds the blockchain private key uses the private key stored on the physical medium to operate the blockchain Access, signature authentication, the physical media such as U disk, U-key, computer hard disk, paper, etc., but in this case the private key may be permanently lost along with the loss of the physical media
At the same time, the private key may also be stolen by illegal personnel and use the stolen private key to access the blockchain, resulting in data loss or property damage
Another existing blockchain technology saves the private key to other places in the network. When accessing the blockchain, the access to the blockchain is completed by reading the key through the network, but this method is through Network, especially the Internet, because the transmission of data and information in the network is insecure, so important information such as the blockchain private key is still easy to be stolen or tampered when transmitted on the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain cross-chain key security access method and device and storage medium
  • Block chain cross-chain key security access method and device and storage medium
  • Block chain cross-chain key security access method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0028] see figure 1 , figure 1 It is a schematic flow diagram of a method for securely accessing blockchain cross-chain keys provided by an embodiment of the present invention. The method includes:

[0029] Step S10: Convert the first private key of the original main blockchain into a second private key through a reversible encryption algorithm; the first private key is the original pri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain cross-chain key security access method. The method comprises the steps of: converting a first private key of a native main block chain into a second private key through a reversible encryption algorithm; backing up the first private key and the second private key to an information storage area; generating one or more third private keys by using a key generation element, and setting a third private key or a combination of a plurality of third private keys for accessing the key block chain; establishing a VPN channel to access the key block chain to obtain the second private key; converting the second private key into the first private key through the reversible encryption algorithm; and establishing a VPN channel of the native main block chain and accessing the native main block chain by using the first private key. Meanwhile, the invention further provides a block chain cross-chain key security access device and a storage medium. According to the technical scheme provided by the invention, the storage and use safety of block chain private keys is ensured, and a user can safely and conveniently connect, query and access the block chain.

Description

technical field [0001] The present invention relates to the technical field of secure access to blockchain cross-chain keys, in particular to a method, device and storage medium for secure access to blockchain cross-chain keys. Background technique [0002] In the existing general-purpose blockchain technology application, the user holding the private key of the blockchain uses the private key stored on the physical medium to perform operation access and signature authentication on the blockchain, such as U disk, U- key, computer hard disk, paper, etc., but in this case the private key may be permanently lost along with the loss of the physical medium. At the same time, the private key may also be stolen by criminals and use the stolen private key to access the blockchain, resulting in data loss or property damage. Another existing blockchain technology saves the private key to other places in the network. When accessing the blockchain, the access to the blockchain is compl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/27H04L9/08
CPCG06F16/27H04L9/0819
Inventor 蒋忠强欧光峰
Owner 蒋瑞诚
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products