Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Asymmetric key generation and distribution method and device based on block chain, and medium

An asymmetric key and blockchain technology, applied in the field of asymmetric key generation and distribution based on blockchain, can solve the problems of peeping, tampering with server storage data, low trust, etc., to improve efficiency and achieve The effect of non-repudiation

Inactive Publication Date: 2021-09-28
浪潮云洲工业互联网有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The centralized asymmetric encryption key management method has the following deficiencies. One is a single point of failure. If the password server fails or the network communication is abnormal, the password service will be unavailable.
Second, the password distribution process, especially the private key distribution process, has the possibility of being spied on and intercepted
The third is that the centralized password server has the possibility of being artificially controlled and tampering with the data stored in the server, and the trust degree is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric key generation and distribution method and device based on block chain, and medium
  • Asymmetric key generation and distribution method and device based on block chain, and medium
  • Asymmetric key generation and distribution method and device based on block chain, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solution and advantages of this specification clearer, the technical solution of this application will be clearly and completely described below in conjunction with specific embodiments of this specification and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in the description, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present application.

[0052] In the secret mechanism of information cryptography, the management process of key generation, storage and distribution is very important. If the key is leaked, the cryptographic secrecy mechanism will lose its function of protecting the confidentiality of information. Before the emergence of blockchain technology, the keys (including public and private k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an asymmetric key generation and distribution method and device based on a block chain, and a medium, and the method comprises the steps: receiving a public key storage request sent by a block chain client, and enabling a public key and a private key corresponding to the public key to be generated by the block chain client; after the key smart contract of the block chain receives the public key storage request, verifying the public key and storing the public key in the block chain; and receiving a public key query request sent by the block chain client, and feeding back a query result to the block chain client. According to the technical scheme provided by the embodiment of the invention, the public key related information of the scheme also has the characteristics of being public, transparent, non-tampering and the like by utilizing the characteristics of being public, transparent, non-tampering and the like of the block chain technology, so that the non-repudiation of user behaviors is realized, and the evidence of the public key related information has higher credibility in various legal disputes of economy and society.

Description

technical field [0001] The present application relates to the technical field of blockchain encryption, and in particular to a blockchain-based asymmetric key generation and distribution method, device and medium. Background technique [0002] Cryptography is very important in the field of information transmission. By encrypting the transmitted information, important secrets can be prevented from leaking, so as to protect people's lives and property, and protect people's rights and interests from being violated. Asymmetric cryptography algorithms can also be used in business fields such as digital signatures to ensure the authenticity of information, prevent repudiation, restrict people's social behavior, and promote the development of human society and economy. [0003] In the prior art, keys (including public keys and private keys) of asymmetric cryptographic algorithms are generally managed in a centralized manner. A cryptographic server or a cryptographic service clust...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0825H04L9/3247H04L9/50
Inventor 孙长杰黄镇国李照川王伟兵肖守明申传旺
Owner 浪潮云洲工业互联网有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products