Movatterモバイル変換


[0]ホーム

URL:


CN108512661A - A kind of safety protecting method of block chain private key for user - Google Patents

A kind of safety protecting method of block chain private key for user
Download PDF

Info

Publication number
CN108512661A
CN108512661ACN201810284907.3ACN201810284907ACN108512661ACN 108512661 ACN108512661 ACN 108512661ACN 201810284907 ACN201810284907 ACN 201810284907ACN 108512661 ACN108512661 ACN 108512661A
Authority
CN
China
Prior art keywords
private key
user
hash value
block chain
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810284907.3A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU LINGGUANG QUANTUM TECHNOLOGY Co Ltd
Original Assignee
CHENGDU LINGGUANG QUANTUM TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU LINGGUANG QUANTUM TECHNOLOGY Co LtdfiledCriticalCHENGDU LINGGUANG QUANTUM TECHNOLOGY Co Ltd
Priority to CN201810284907.3ApriorityCriticalpatent/CN108512661A/en
Publication of CN108512661ApublicationCriticalpatent/CN108512661A/en
Withdrawnlegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses a kind of safety protecting methods of block chain private key for user, for solving the problems, such as the security protection given for change with private key after stolen after private key is lost.The present invention utilizes the randomness diffusion of hash algorithm and irreversible feature, the hash value for the security parameter that can be controlled using user is as private key, customer parameter is introduced under the premise of meeting private key randomness and requiring, effectively solves the problems, such as that the ownership proof of private key and private key give problem for change.The present invention can be widely applied to use application system of the random number as asymmetric cryptographic algorithm private key, especially have a good application prospect in block chain network.

Description

A kind of safety protecting method of block chain private key for user
Technical field
The invention belongs to block chain and its private key security technology area more particularly to a kind of safety of block chain private key for userMeans of defence.
Background technology
Block chain is a kind of a kind of chain type number for being sequentially in time combined into data block in such a way that sequence is connectedAccording to structure, and the distributed account book that ensures to distort in a manner of cryptography and can not forge.In block catenary system, private key isEach user oneself generates and oneself is responsible for the random number of keeping, theoretically without third-party participation, so private key is onceIt loses, just loses the management and control to account assets.With current calculation power and technology, from wallet address or public key retrodict private key be can notCapable.Therefore, for block chain user, private key is exactly all.Due to also lacking effective solution, institute at presentIt is faced with the risk for causing digital asset to lose due to private key is lost or is stolen with the user of block chain especially bit coin, is solvedPrivate key for user problem out of control has very important practical significance to the safety for promoting block chain network.
Invention content
Active demand for the protection of block chain private key for user and the deficiencies in the prior art, in order to solve the institute of private key for userIt has the right to belong to proof problem and security protection problem, the present invention provides a kind of safety protecting methods of block chain private key for user.One-way and randomness diffusion property of the method for the present invention based on Hash functions, utilize the hash value and use of the biological characteristic of userThe hash value for the hash value XOR operation value that the registered permanent residence enables is as private key.For not knowing that the hacker of biological characteristic and user password comesIt says, even if which give private key, a biological characteristic and password can not be found and obtain same private key, thus can be lifeThe proof that object feature and password belong to as private key, that is, in the case where private key is stolen, the biology for generating private key can be utilized specialThe proof that password of seeking peace belongs to as private key can utilize biological characteristic and password to restore again in the case where private key is lostPrivate key, it is to realize the safeguard protection of private key for user, i.e., anti-lost also to prevent being stolen.
A kind of safety protecting method of block chain private key for user of the present invention, including private key production method and security protection sideMethod, wherein private key production method includes but not limited to:Using the hash value of a security parameter as private key for user;Safety is anti-Maintaining method includes but not limited to:(1)When user account logs in and initiates transaction, communication terminal that system is registered to user in real timeReminder message is sent, when user has found account by illegal operation, it is out of control that user broadcasts its private key in block chain network in timeAlert message(Broadcast private key and public key out of control)And initiate all transaction unconfirmed for freezing to be signed by the private key, instituteIt is all illegal transaction corresponding trading processing unconfirmed to have node;(2)When there is dispute in the right of attribution of some private key, ifOne user can show a parameter within the time of restriction and be striven by the hash value of other node verification parameters and presenceThe private key of view is completely the same, then the user is considered as the lawful owner of the private key;(3)Lawful owner's weight of the private keyNew private key is newly generated, submission is transferred to whole digital assets in account corresponding to dispute private key in new private key accountTransaction, and show the hash value of the hash value and user password for generating the biological characteristic that there is dispute private key, ifThe hash value of the XOR operation value of the hash value of the biological characteristic and the hash value of user password and the private key that there is dispute are completeComplete consistent, then account private key change is recognized.
Further, hash value used by the method for the present invention includes using standard hash algorithm and anti-quantum calculationThe output result that hash algorithm obtains.
Further, security parameter used by the method for the present invention include but not limited to user biological feature hash value withThe XOR operation value of the hash value of user password.
Further, user biological feature used by the method for the present invention includes but not limited to fingerprint characteristic, facial characteristicsAnd iris feature.
Further, the private key in the method for the present invention includes but not limited to the ECC of 256 bits, 384 bits and 512 bitsAlgorithm(Including signature algorithm and Encryption Algorithm)Private key.
Compared with prior art, a kind of safety protecting method of block chain private key for user of the invention has following notable woundNew property:The present invention is using the randomness diffusion of hash algorithm and irreversible feature, the security parameter that can be controlled using userHash value as private key, rationally introduce customer parameter under the premise of meeting private key randomness and requiring, can effectively solve privateThe ownership proof problem of key and private key give problem for change, to realize the safeguard protection of private key for user, i.e., it is anti-lost also prevent it is stolenIt takes.The present invention can be widely applied to use application system of the random number as private key, especially have in block chain networkGood application prospect.
Description of the drawings
Fig. 1 is the private key production method schematic diagram of the present invention.
Specific implementation mode
To keep technical scheme of the present invention and advantage clearer, as the part of the present invention, below in conjunction with attached drawing andSpecific embodiment, the present invention is described in further detail.
The present invention is suitable for the situation of all private keys using random number as asymmetric cryptographic algorithm, and the present invention is not specificLimit the method that corresponding public key generates(For example, the public key production method spec256k1 of bit coin may be used).
Hash value used in the present invention includes using standard hash algorithm(Such as MD5, SHA_1, SHA_256 etc.)WithThe hash algorithm of anti-quantum calculation(Such as anti-quantum standard algorithm)Obtained output result.It is multiple used in the present inventionHash value may be used the same hash algorithm and generate, and multiple hash algorithms can also be used to generate.
Under normal conditions, block chain user node randomly generates a random number as private key, and still, which does not haveUser characteristics.After private key is stolen, user does not have effective means to control risk;After private key is lost, user also has no idea to give for change.The present invention utilizes the Hash for the security parameter that user can control using the randomness diffusion of hash algorithm and irreversible featureBe worth the ownership proof and private key that private key can be effectively solved the problems, such as private key gives problem for change, to realize private key for userSafeguard protection, i.e., it is anti-lost also to prevent being stolen.
As a preferred embodiment, private key production method of the invention is as shown in Figure 1, the embodiment is used to generateThe private key of the ECC algorithm of 256 bits, wherein using fingerprint characteristic and password as customer parameter, using user fingerprints featureThe hash value of the XOR operation value of the hash value of hash value and user password is as private key, that is, note user fingerprints are characterized as C, mouthEnable is P, then, private key SK=SHA_256 (SHA_256 (C) ⊕ SHA_256 (P)), wherein ⊕ indicates XOR operation.User adoptsBlock chain account is logged in private key SK to be stolen by hacker to reduce fingerprint characteristic and password without the use of fingerprint characteristic and passwordRisk.
It when practical application, needs to increase corresponding security mechanism in block catenary system, that is, user account is logged in and initiatedWhen transaction, communication equipment that system is registered to user in real time(Such as mobile phone)Reminder message is sent, when user has found account quiltWhen illegal operation, user may be used account out of control or other accounts and broadcast the police out of control of its private key in block chain network in timeReport message(Wherein, alert message includes the public key and private key of user)And it is all unconfirmed to initiate to freeze to be signed by the private keyTransaction, all nodes are all illegal transaction corresponding trading processing unconfirmed(That is, not handling the illegal transaction, accounting nodesAll illegal transactions are rejected from trading pit);It is possible thereby to be lost caused by reducing the stolen possibility of private key for user;Then, areaBlock catenary system starts the arbitration of the private key right of attribution, that is, if a user can show a parameter and quilt within the time of restrictionThe hash value of other node verification parameters is completely the same with the private key that there is dispute, then the user is considered as the conjunction of the private keyMethod owner;Obviously, the user for stealing SK can not show the security parameter for generating SK, and the lawful owner of the private key can be suitableProfit shows SHA_256 (C) ⊕ SHA_256 (P) and SK, to solve the problems, such as that the right of attribution of private key proves;Finally, the private keyLawful owner regenerate new private key, submission is transferred to whole digital assets in account corresponding to dispute private key newlyPrivate key account in transaction, and show for generate it is described exist dispute private key fingerprint characteristic hash value SHA_256(C) with the hash value SHA_256 of user password (P), if the hash value SHA_256 (C) of the fingerprint characteristic and using the registered permanent residenceThe hash value of the XOR operation value of the hash value SHA_256 (P) of order and the private key that there is dispute are completely the same, then account private keyChange and corresponding money transfer transactions are recognized.To realize the security protection to private key for user account.
When private key for user is lost, user can utilize the hash value SHA_256 (C) and user password of fingerprint characteristicHash value SHA_256 (P) restores private key.Certainly, in order to realize that better safeguard protection, user password and private key should be isolatedStorage protection.
In order to realize higher algorithm security, the private key of the ECC algorithm of 384 bits and 512 bits can also be used.
It should be noted that the method for the present invention can be widely applied to the generation of private key, it is not limited solely to use for block chainThe generation of family private key.
Embodiments described above is only a part of the embodiment of the present invention, instead of all the embodiments.This fieldOther direct embodiments for using the method for the present invention that those of ordinary skill is obtained under the premise of not making creative work, allBelong to the scope of protection of the invention.

Claims (5)

CN201810284907.3A2018-04-022018-04-02A kind of safety protecting method of block chain private key for userWithdrawnCN108512661A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201810284907.3ACN108512661A (en)2018-04-022018-04-02A kind of safety protecting method of block chain private key for user

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201810284907.3ACN108512661A (en)2018-04-022018-04-02A kind of safety protecting method of block chain private key for user

Publications (1)

Publication NumberPublication Date
CN108512661Atrue CN108512661A (en)2018-09-07

Family

ID=63380102

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201810284907.3AWithdrawnCN108512661A (en)2018-04-022018-04-02A kind of safety protecting method of block chain private key for user

Country Status (1)

CountryLink
CN (1)CN108512661A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109067529A (en)*2018-09-092018-12-21成都量安区块链科技有限公司A kind of production method of block chain private key for user
CN109359464A (en)*2018-10-292019-02-19南通大学 A wireless security authentication method based on blockchain technology
CN109639421A (en)*2019-01-092019-04-16山东浪潮质量链科技有限公司A kind of method that private key is given for change and server
CN110009352A (en)*2019-03-292019-07-12阿里巴巴集团控股有限公司Method and apparatus for resetting blockchain account key based on biometrics
CN110070363A (en)*2019-03-132019-07-30咪咕文化科技有限公司Account management method and verification method in block chain network and terminal equipment
CN110417546A (en)*2019-07-032019-11-05山东大学 Method and device for B-end using private key based on multi-party encryption
CN111159774A (en)*2019-12-112020-05-15马上游科技股份有限公司Decentralized intelligent contract escrow wallet method and system
CN111210224A (en)*2019-12-232020-05-29中思博安科技(北京)有限公司Access control method and device in block chain network
CN115098850A (en)*2022-05-142022-09-23陈勇Account management method, device and system
CN116566654A (en)*2023-04-122023-08-08南京玖时科技有限公司Protection system for block chain management server

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1336597A (en)*2000-08-022002-02-20邵通Ciphered matter and right transferring method and system
CN101626295A (en)*2008-07-082010-01-13中国移动通信集团公司Method, device and system for guaranteeing security of network logon
CN101635743A (en)*2009-04-022010-01-27浙江亚斯特科技有限公司System and method using biologic characteristic certification result to validate identity of mobile terminal holder
CN106059764A (en)*2016-08-022016-10-26西安电子科技大学Password and fingerprint third-party authentication method based on halting key derivation function
US20160330027A1 (en)*2015-05-052016-11-10ShoCard, Inc.Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices
CN107579817A (en)*2017-09-122018-01-12广州广电运通金融电子股份有限公司 Block chain-based user authentication method, device and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1336597A (en)*2000-08-022002-02-20邵通Ciphered matter and right transferring method and system
CN101626295A (en)*2008-07-082010-01-13中国移动通信集团公司Method, device and system for guaranteeing security of network logon
CN101635743A (en)*2009-04-022010-01-27浙江亚斯特科技有限公司System and method using biologic characteristic certification result to validate identity of mobile terminal holder
US20160330027A1 (en)*2015-05-052016-11-10ShoCard, Inc.Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices
CN106059764A (en)*2016-08-022016-10-26西安电子科技大学Password and fingerprint third-party authentication method based on halting key derivation function
CN107579817A (en)*2017-09-122018-01-12广州广电运通金融电子股份有限公司 Block chain-based user authentication method, device and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
T2噬菌体: "《哈希(Hash)与加密(Encrypt)的基本原理、区别及工程应用》", 《HTTPS://WWW.CNBLOGS.COM/LEOO2SK/ARCHIVE/2010/10/01/HASH-AND-ENCRYPT.HTML》*
巴比特: "《聊聊脑钱包的那些事儿,brainwallet.org永久关闭》", 《HTTPS://WWW.LIANSHIJIE.COM/COIN/25124》*

Cited By (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109067529A (en)*2018-09-092018-12-21成都量安区块链科技有限公司A kind of production method of block chain private key for user
CN109359464A (en)*2018-10-292019-02-19南通大学 A wireless security authentication method based on blockchain technology
CN109359464B (en)*2018-10-292021-10-15南通大学 A wireless security authentication method based on blockchain technology
CN109639421B (en)*2019-01-092021-09-21山东浪潮质量链科技有限公司Method for retrieving private key and server
CN109639421A (en)*2019-01-092019-04-16山东浪潮质量链科技有限公司A kind of method that private key is given for change and server
CN110070363A (en)*2019-03-132019-07-30咪咕文化科技有限公司Account management method and verification method in block chain network and terminal equipment
CN110009352A (en)*2019-03-292019-07-12阿里巴巴集团控股有限公司Method and apparatus for resetting blockchain account key based on biometrics
CN110009352B (en)*2019-03-292021-02-05创新先进技术有限公司Method and apparatus for resetting blockchain account key based on biometrics
CN110417546A (en)*2019-07-032019-11-05山东大学 Method and device for B-end using private key based on multi-party encryption
CN111159774A (en)*2019-12-112020-05-15马上游科技股份有限公司Decentralized intelligent contract escrow wallet method and system
CN111159774B (en)*2019-12-112022-07-15马上游科技股份有限公司Decentralized intelligent contract escrow wallet method and system
CN111210224A (en)*2019-12-232020-05-29中思博安科技(北京)有限公司Access control method and device in block chain network
CN115098850A (en)*2022-05-142022-09-23陈勇Account management method, device and system
CN116566654A (en)*2023-04-122023-08-08南京玖时科技有限公司Protection system for block chain management server

Similar Documents

PublicationPublication DateTitle
CN108512661A (en)A kind of safety protecting method of block chain private key for user
CN112132560B (en)Method and device for managing digital assets on chain
CN110958110B (en)Block chain private data management method and system based on zero knowledge proof
CN117097466A (en)Computer-implemented system and method for providing a decentralised protocol for retrieving encrypted assets
CN109670826B (en)Anti-quantum computation block chain transaction method based on asymmetric key pool
CN109146524A (en)A kind of agricultural product using block chain technology are traced to the source information security solution
CN103490889B (en)A kind of infinite length key internet communication encryption method
CN111404664B (en)Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
CN110381055B (en)RFID system privacy protection authentication protocol method in medical supply chain
Giri et al.Efficient biometric and password based mutual authentication for consumer USB mass storage devices
CN111416712B (en)Quantum secret communication identity authentication system and method based on multiple mobile devices
CN110336673A (en) A blockchain design method based on privacy protection
CN115442050A (en)Privacy protection federal learning method based on SM9 algorithm
CN108881960A (en)The method of intelligent video camera head security control and data confidentiality based on id password
CN105812142B (en)A kind of strong migration digital signature method merging fingerprint, ECDH and ECC
Giri et al.A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer usb mass storage devices
CN110505055A (en)Based on unsymmetrical key pond to and key card outer net access identity authentication method and system
CN106713329B (en) A RFID bidirectional authentication method based on cross bit operation and circular check function
CN111091380A (en)Block chain asset management method based on friend covert verification
CN110224816A (en)Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number
CN104901812B (en)A kind of RFID system safety certifying method of ECC combinations lightweight Hash functions
CN109067529A (en)A kind of production method of block chain private key for user
Lee et al.Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
CN110912702B (en)Block chain asset management method based on hidden social relationship
Li et al.An improved two-factor user authentication protocol for wireless sensor networks using elliptic curve cryptography

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
WW01Invention patent application withdrawn after publication

Application publication date:20180907

WW01Invention patent application withdrawn after publication

[8]ページ先頭

©2009-2025 Movatter.jp