CN108377187B - Block chain private key using method and device based on biological characteristics - Google Patents

Block chain private key using method and device based on biological characteristics Download PDF

Info

Publication number
CN108377187B
CN108377187B CN201810235765.1A CN201810235765A CN108377187B CN 108377187 B CN108377187 B CN 108377187B CN 201810235765 A CN201810235765 A CN 201810235765A CN 108377187 B CN108377187 B CN 108377187B
Authority
CN
China
Prior art keywords
biological characteristics
private key
client
server
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810235765.1A
Other languages
Chinese (zh)
Other versions
CN108377187A (en
Inventor
赵瑞东
李婷
朱书杉
孙晓妮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chaoyue Technology Co Ltd
Original Assignee
Chaoyue Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chaoyue Technology Co Ltd filed Critical Chaoyue Technology Co Ltd
Priority to CN201810235765.1A priority Critical patent/CN108377187B/en
Publication of CN108377187A publication Critical patent/CN108377187A/en
Application granted granted Critical
Publication of CN108377187B publication Critical patent/CN108377187B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a block chain private key using method and device based on biological characteristics, which comprises the steps of collecting the biological characteristics at a client and generating a block chain private key according to the biological characteristics and salt values; carrying out hash operation on the biological characteristics at the client, transmitting a hash value and a salt value of the biological characteristics to the server, receiving the hash value and the salt value of the biological characteristics at the server, and storing the hash value and the salt value of the biological characteristics in a corresponding form; collecting biological characteristics at a client and obtaining a block chain private key according to the biological characteristics and a salt value; the method comprises the steps of collecting biological characteristics at a client, carrying out hash operation on the biological characteristics, transmitting hash values of the biological characteristics to a server, receiving the hash values of the biological characteristics at the server, reading corresponding salt values according to the stored hash values of the biological characteristics, transmitting the salt values to the client, receiving the salt values at the client, and generating a block chain private key according to the biological characteristics and the salt values.

Description

Block chain private key using method and device based on biological characteristics
Technical Field
The present invention relates to the field of communications, and more particularly, to a method and an apparatus for using a blockchain private key based on biometrics.
Background
The BlockChain (BlockChain) is an important technical innovation in the financial field, and the technology is considered as a next-generation subversive core technology after a steamer, electric power and the internet, and can be used in various fields such as intelligent contracts, stock exchange, electronic commerce, internet of things and the like. The block chain technology is a distributed book which combines and applies a point-to-point network technology, cryptography and a distributed consensus protocol. The distributed mode is a typical characteristic of a block chain, no third party participates, and a set of non-tampered whole network accounts is maintained among mutually untrustworthy or weakly-trusted participants. The account book is maintained by all nodes together, and each node participating in maintenance can be copied to obtain a complete account book copy. Hash and asymmetric encryption and decryption algorithms are used in the block chain to ensure the safety and the non-tampering of the block chain. The private key of the asymmetric encryption and decryption algorithm is the identity of the user, and the user generates a public key and an account address through the private key to perform transaction signature. If the private key is lost or stolen, the user's property cannot be retrieved or compromised.
The private key in the block chain in the prior art is any random number, and is stored in the following way:
1) and (3) off-line cold storage: printing or copying on paper, and storing paper medium safely; or stored in a storage medium such as a USB flash disk;
2) the client stores: the private key is managed by using the wallet, and the private key needs to be backed up periodically, so that the wallet is convenient to use;
3) platform hosting: and storing the private key ciphertext through the remote server.
The three ways, except that the off-line cold storage can resist the attack of hackers, but the usability is poor. The three modes are not easy to recover after being lost, and property loss is caused because the private key is lost or stolen. Meanwhile, the private key of the block chain is stored in an offline medium, a server or a user side in a plaintext or ciphertext mode, and a third party can possibly acquire the complete information of the private key under the condition that no user participates.
Aiming at the problems that the block chain private key is difficult to resist hacker attack and is not easy to recover in the prior art, no effective solution is provided at present.
Disclosure of Invention
In view of the above, an object of the embodiments of the present invention is to provide a method and an apparatus for using a blockchain private key based on biometrics, so that the blockchain private key can resist hacking and is easy to recover.
In view of the above, an aspect of the embodiments of the present invention provides a method for using a blockchain private key based on biometrics, including the following steps:
collecting biological characteristics at a client and generating a block chain private key according to the biological characteristics and the salt value;
carrying out hash operation on the biological characteristics at the client, transmitting a hash value and a salt value of the biological characteristics to the server, receiving the hash value and the salt value of the biological characteristics at the server, and storing the hash value and the salt value of the biological characteristics in a corresponding form;
collecting biological characteristics at a client and obtaining a block chain private key according to the biological characteristics and a salt value;
the method comprises the steps of collecting biological characteristics at a client, carrying out hash operation on the biological characteristics, transmitting hash values of the biological characteristics to a server, receiving the hash values of the biological characteristics at the server, reading corresponding salt values according to the stored hash values of the biological characteristics, transmitting the salt values to the client, receiving the salt values at the client, and generating a block chain private key according to the biological characteristics and the salt values.
In some embodiments, the biometric characteristic comprises at least one of: fingerprints, irises, palm prints, and common information; the salt value is a random number generated by the client or a predetermined number stored by the client, input by the user, or obtained by the server.
In some embodiments, the salt value is stored in encrypted form in the server, and the hash value of the biometric is stored in the server as an index to the corresponding salt value.
In some embodiments, the blockchain private key is generated from the biometric and the salt value, and the blockchain private key is generated for use with one or more irreversible single trapdoor functions.
In some embodiments, the hash operation is any one or a combination of any plurality of irreversible operations.
In some embodiments, the client and the server use a two-key encryption system, and the hash value and the salt value of the biometric are transmitted between the client and the server in a manner having encryption and a digital signature through one or more of key agreement, a certificate, a secure channel.
On the other hand, the embodiment of the invention also provides a device for using the block chain private key based on the biological characteristics, and the method is used.
In another aspect of the embodiments of the present invention, there is also provided a computer device including a memory, at least one processor, and a computer program stored on the memory and executable on the processor, the processor executing the program to perform the method described above.
In another aspect of the embodiments of the present invention, a computer-readable storage medium is further provided, in which a computer program is stored, and the computer program is executed by a processor to perform the above method.
In another aspect of the embodiments of the present invention, there is also provided a computer program product including a computer program stored on a computer-readable storage medium, the computer program including instructions which, when executed by a computer, cause the computer to perform the above method.
The invention has the following beneficial technical effects: according to the method and the device for using the block chain private key based on the biological characteristics, the biological characteristics are collected at the client side, and the block chain private key is generated according to the biological characteristics and the salt value; storing the hash value and the salt value of the biological characteristic in a corresponding form at the server; the server receives the hash value of the biological characteristics, reads the corresponding salt value according to the stored hash value of the biological characteristics and transmits the salt value to the client, and the client receives the salt value and generates the block chain private key according to the biological characteristics and the salt value, so that the block chain private key can resist hacker attacks and is easy to recover.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are required to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
FIG. 1 is a flow chart of a method for using a block chain private key based on biometrics according to the present invention;
FIG. 2 is a detailed flowchart of a portion of a method for using a biockchain private key according to the present invention;
FIG. 3 is a detailed flowchart of another part of the method for using the biometric-based blockchain private key according to the present invention;
fig. 4 is a schematic hardware structure diagram of an embodiment of a computer device for executing the method for using a biocharacteristic-based blockchain private key according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
In view of the above, a first aspect of the embodiments of the present invention provides a method for using a biometric-based blockchain private key. Fig. 1 is a flow chart illustrating a method for using a blockchain private key based on biometrics according to the present invention.
The block chain private key using method based on the biological characteristics comprises the following steps:
step S101, collecting biological characteristics at a client and generating a block chain private key according to the biological characteristics and a salt value;
step S103, carrying out hash operation on the biological characteristics at the client, transmitting the hash value and the salt value of the biological characteristics to the server, receiving the hash value and the salt value of the biological characteristics at the server, and storing the hash value and the salt value of the biological characteristics in a corresponding form;
step S105, collecting biological characteristics at a client and obtaining a block chain private key according to the biological characteristics and the salt value;
and S107, collecting the biological characteristics at the client, carrying out hash operation on the biological characteristics, transmitting the hash value of the biological characteristics to the server, receiving the hash value of the biological characteristics at the server, reading the corresponding salt value according to the stored hash value of the biological characteristics, transmitting the salt value to the client, receiving the salt value at the client, and generating the block chain private key according to the biological characteristics and the salt value.
In the embodiment of the present invention, step S101 is a step of generating a blockchain private key, step S103 is a step of storing the blockchain private key, step S105 is a step of using the blockchain private key, and step S107 is a step of recovering the blockchain private key when the salt value is lost.
Fig. 2 shows step S101 to step S103. As shown in fig. 2, a user enters a biometric I (information such as a fingerprint) at a client. The client generates a random number R as a salt value S, and the biometric feature and the random number generate a block chain private key through a series of operations (such as Hash (I) S).
As shown in fig. 2, in the storing step, the client generates a public-private key pair pub through an asymmetric algorithmc、pricAnd generates a random number R, performs a signature operation Sig (hash (R) handshake mark, pub) using a private keyc) And send the signature to the remote server. Server side obtains pub of client sidecSignature verification is carried out, and a public and private key pair pub is generated after the verification is passeds、prisEncrypting the Hash (R) and handshake mark by using the public key of the client end, pubc(Hash (R) handshake mark) signature operation Sig (pub) using private keyc(Hash (R) | handshake flag), pubs) And sends the signature to the client. Client-side obtaining server public key pubsAnd after the signature verification of the server is passed, decrypting by using a private key to obtain a Hash value (R), comparing the Hash value with the Hash value generated by the R, and after the comparison is passed, successfully handshaking between the client and the server. The client then computes a Hash (I)) using the server public key pubsEncrypt the Hash (I), salt, and sign Sig (pub) using private keys(Hash (I)), S)), the signature is sent to the server. After the server verifies the signature of the client, the Hash (Hash (I)) is obtained through private key decryption, and S, the Hash (Hash (I)) is used as an index to store a salt value ciphertext in the server. The user can directly store the salt value plaintext in other modes according to the requirement, so that the private key recovery can be conveniently carried out when the server cannot respond. The client stores the salt value S by using a symmetric algorithm, and stores a hash value of the salt value S.
Fig. 3 shows steps S105 to S107. As shown in fig. 3, the user enters the biometric I at the client, consistent with the biometric used for private key generation. The client decrypts to obtain a salt value S ', and if the Hash (S') is consistent with the stored Hash (S), the Hash (I) I S) generates a block chain private key for transaction; otherwise, recovering the private key.
As shown in fig. 3, in the recovery step, the client and the server repeat the handshake manner in the private key storage to obtain the public key of the other party. The client acquires the user biological characteristic I and calculates Hash (I)). By the server public key pubs' encrypted Hash (I)), Sig (pub) signed by clients' (Hash (I))) to the server. After the server side checks the signature, the server private key pri is useds' decryption obtains Hash (I)) and obtains salt ciphertext for index, and the client public key pub is used after decryptionc' encrypt salt S, Sig (pub) after server signc' (S)) to the client. After the client checks the signature, the client private key pub is usedcAnd decrypting to obtain a salt value S, and repeating the private key generation mode to recover the private key. After the private key is recovered, the client stores the salt value S ciphertext and Hash (S). On the other hand, if the user directly recovers the private key by adopting other modes, the salt value S ' is directly input, the private key generation mode is repeated to generate the private key ', and the public key is generated through the private key ', so that the account address is generated. Whether the private key recovery is successful is determined by matching the public key or the account address.
In some embodiments, the biometric characteristic comprises at least one of: fingerprints, irises, palm prints, and common information; the salt value is a random number generated by the client or a predetermined number stored by the client, input by the user, or obtained by the server.
Any biometric that is unique, not easily altered, and not easily stolen can be used as the biometric used in embodiments of the present invention. On the other hand, any number capable of salifying the result of the hash operation may be used as the salt, and a random number is just one of the preferred embodiments.
In some embodiments, the salt value is stored in encrypted form in the server, and the hash value of the biometric is stored in the server as an index to the corresponding salt value.
In some embodiments, the blockchain private key is generated from the biometric and the salt value, and the blockchain private key is generated for use with one or more irreversible single trapdoor functions.
In some embodiments, the hash operation is any one or a combination of any plurality of irreversible operations. The irreversible operation is intended to make the hash value function in fact as a message digest.
In some embodiments, the client and the server use a two-key encryption system, and the hash value and the salt value of the biometric are transmitted between the client and the server in a manner having encryption and a digital signature through one or more of key agreement, a certificate, a secure channel.
It can be seen from the foregoing embodiments that, in the method for using a biocharacteristics-based blockchain private key according to the embodiments of the present invention, the client collects the biological traits and generates the blockchain private key according to the biological traits and the salt value; storing the hash value and the salt value of the biological characteristic in a corresponding form at the server; the server receives the hash value of the biological characteristics, reads the corresponding salt value according to the stored hash value of the biological characteristics and transmits the salt value to the client, and the client receives the salt value and generates the block chain private key according to the biological characteristics and the salt value, so that the block chain private key can resist hacker attacks and is easy to recover. In the embodiment of the invention, the block chain private key is not stored, only the salt value is stored, and the client and the server can not obtain the complete block chain private key on the premise of no user biological characteristics. Compared with the ways of private key encryption storage, key division and the like, the way is safer. Meanwhile, the biological characteristics participate in the generation of the private key, the salt value is disturbed, the private key is ensured to have multiple characteristics of user identity and randomness, and the requirement of multiple private keys of a single user is met. Because the biological characteristics have the characteristics of uniqueness, difficult change, difficult stealing and the like, the user does not need to perform regular management or backup. Even if the salt value is stolen or lost, the private key and the user biological characteristics are not influenced safely.
It should be particularly noted that, the steps in the embodiments of the method for using a biockchain private key based on a biometric characteristic described above can be mutually intersected, replaced, added, and deleted, so that these reasonable permutation and combination transformations of the method for using a biockchain private key based on a biometric characteristic also belong to the scope of the present invention, and should not limit the scope of the present invention to the described embodiments.
In view of the above objects, a second aspect of the embodiments of the present invention provides an apparatus for using a biometric-based blockchain private key.
It can be seen from the foregoing embodiments that, in the device for using a biocharacteristics-based blockchain private key according to the embodiments of the present invention, the client collects the biological traits and generates the blockchain private key according to the biological traits and the salt value; storing the hash value and the salt value of the biological characteristic in a corresponding form at the server; the server receives the hash value of the biological characteristics, reads the corresponding salt value according to the stored hash value of the biological characteristics and transmits the salt value to the client, and the client receives the salt value and generates the block chain private key according to the biological characteristics and the salt value, so that the block chain private key can resist hacker attacks and is easy to recover. In the embodiment of the invention, the block chain private key is not stored, only the salt value is stored, and the client and the server can not obtain the complete block chain private key on the premise of no user biological characteristics. Compared with the ways of private key encryption storage, key division and the like, the way is safer. Meanwhile, the biological characteristics participate in the generation of the private key, the salt value is disturbed, the private key is ensured to have multiple characteristics of user identity and randomness, and the requirement of multiple private keys of a single user is met. Because the biological characteristics have the characteristics of uniqueness, difficult change, difficult stealing and the like, the user does not need to perform regular management or backup. Even if the salt value is stolen or lost, the private key and the user biological characteristics are not influenced safely.
It should be particularly noted that the above-mentioned embodiment of the apparatus for using a biocharacteristic-based blockchain private key uses an embodiment of the method for using a biocharacteristic-based blockchain private key to specifically describe the working processes of the modules, and those skilled in the art can easily think that the modules are applied to other embodiments of the method for using a biocharacteristic-based blockchain private key. Of course, since the steps in the embodiment of the method for using the biocharacteristics-based blockchain private key can be mutually intersected, replaced, added, and deleted, these reasonable permutation and combination transformations should also belong to the scope of the present invention, and should not limit the scope of the present invention to the embodiment.
In view of the above, a third aspect of the embodiments of the present invention provides an embodiment of a computer device for executing the method for using a biometric-based blockchain private key.
The computer device for executing the method for using the block chain private key based on the biological characteristics comprises a memory, at least one processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the program to execute any one of the methods.
Fig. 4 is a schematic hardware structure diagram of a computer device for executing the method for using a biocharacteristic-based blockchain private key according to an embodiment of the present invention.
Taking the computer device shown in fig. 4 as an example, the computer device includes a processor 401 and a memory 402, and may further include: an input device 403 and an output device 404.
The processor 401, the memory 402, the input device 403 and the output device 404 may be connected by a bus or other means, and fig. 4 illustrates an example of a connection by a bus.
The memory 402, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the biometric-based blockchain private key using method in the embodiments of the present application. The processor 401 executes various functional applications of the server and data processing, namely, implementing the biometric-based blockchain private key using method of the above-described method embodiment, by executing the nonvolatile software program, instructions and modules stored in the memory 402.
The memory 402 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created from use of the biometric-based blockchain private key using device, and the like. Further, the memory 402 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 402 may optionally include memory located remotely from processor 401, which may be connected to local modules via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 403 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the biometric-based blockchain private key using device. The output device 404 may include a display device such as a display screen.
Program instructions/modules corresponding to the one or more biometric-based blockchain private key usage methods are stored in the memory 402 and, when executed by the processor 401, perform the biometric-based blockchain private key usage method of any of the above-described method embodiments.
Any of the embodiments of the computer device for performing the biometric-based blockchain private key usage method may achieve the same or similar effects as any of the previous method embodiments corresponding thereto.
In view of the above object, a fourth aspect of the embodiments of the present invention provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program can execute the method for using the biometric-based blockchain private key in any of the above method embodiments and the apparatus/system for using the biometric-based blockchain private key in any of the above apparatus/system embodiments. Embodiments of the computer-readable storage medium may achieve the same or similar effects as any of the aforementioned method and apparatus/system embodiments corresponding thereto.
In view of the above object, a fifth aspect of the embodiments of the present invention proposes a computer program product, which includes a computer program stored on a computer-readable storage medium, the computer program including instructions that, when executed by a computer, cause the computer to execute the method for using a biometric-based blockchain private key in any of the above method embodiments and the apparatus/system for using a biometric-based blockchain private key in any of the above apparatus/system embodiments. Embodiments of the computer program product may achieve the same or similar effects as any of the aforementioned method and apparatus/system embodiments corresponding thereto.
Finally, it should be noted that, as will be understood by those skilled in the art, all or part of the processes of the methods of the above embodiments may be implemented by a computer program, which may be stored in a computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like. Embodiments of the computer program may achieve the same or similar effects as any of the preceding method embodiments to which it corresponds.
In addition, the apparatuses, devices and the like disclosed in the embodiments of the present invention may be various electronic terminal devices, such as a mobile phone, a Personal Digital Assistant (PDA), a tablet computer (PAD), a smart television and the like, or may be a large terminal device, such as a server and the like, and therefore the scope of protection disclosed in the embodiments of the present invention should not be limited to a specific type of apparatus, device. The client disclosed in the embodiment of the present invention may be applied to any one of the above electronic terminal devices in the form of electronic hardware, computer software, or a combination of both.
Furthermore, the method disclosed according to an embodiment of the present invention may also be implemented as a computer program executed by a CPU, and the computer program may be stored in a computer-readable storage medium. The computer program, when executed by the CPU, performs the above-described functions defined in the method disclosed in the embodiments of the present invention.
Further, the above method steps and system elements may also be implemented using a controller and a computer readable storage medium for storing a computer program for causing the controller to implement the functions of the above steps or elements.
Further, it should be appreciated that the computer-readable storage media (e.g., memory) described herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of example, and not limitation, nonvolatile memory can include Read Only Memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which can act as external cache memory. By way of example and not limitation, RAM is available in a variety of forms such as synchronous RAM (DRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The storage devices of the disclosed aspects are intended to comprise, without being limited to, these and other suitable types of memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with the following components designed to perform the functions described herein: a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP, and/or any other such configuration.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary designs, the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk, blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a," "an," "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of an embodiment of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.

Claims (7)

1. A block chain private key using method based on biological characteristics is characterized by comprising the following steps:
generating a private key of the block chain: collecting the biological characteristics at a client and generating a block chain private key according to the biological characteristics and the salt value;
and a storage step of the private key of the block chain: performing hash operation on the biological characteristics at a client, transmitting the hash value and the salt value of the biological characteristics to a server, receiving the hash value and the salt value of the biological characteristics at the server, and storing the hash value and the salt value of the biological characteristics in a corresponding form;
the use step of the private key of the block chain comprises the following steps: collecting the biological characteristics at a client and obtaining the block chain private key according to the biological characteristics and the salt value;
and (3) recovering the private key of the block chain when the salt value is lost: collecting the biological characteristics at a client, carrying out hash operation on the biological characteristics and transmitting a hash value of the biological characteristics to a server, receiving the hash value of the biological characteristics at the server, reading the corresponding salt value according to the stored hash value of the biological characteristics and transmitting the salt value to the client, receiving the salt value at the client and generating the block chain private key according to the biological characteristics and the salt value,
wherein said salt value is stored in encrypted form in the server and a hash value of said biometric is stored in the server as an index to the corresponding said salt value.
2. The method of claim 1, wherein the biometric characteristic comprises at least one of: fingerprints, irises and palm prints; the salt value is a random number generated by the client, or a predetermined number stored by the client, input by the user, or obtained by the server.
3. The method of claim 1, wherein the blockchain private key is generated based on the biometric and the salt value, and wherein the blockchain private key is generated using one or more irreversible single trapdoor functions.
4. The method of claim 1, wherein the hash operation is any one or a combination of any plurality of irreversible operations.
5. The method of claim 1, wherein the client and the server use a two-key encryption system, and wherein the hash value of the biometric and the salt value are transmitted between the client and the server with encryption and digital signatures via one or more of key agreement, certificates, secure channels.
6. A computer device comprising a memory, at least one processor and a computer program stored on the memory and executable on the processor, characterized in that the processor performs the method according to any of claims 1-5 when executing the program.
7. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the method of any one of claims 1 to 5.
CN201810235765.1A 2018-03-21 2018-03-21 Block chain private key using method and device based on biological characteristics Active CN108377187B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810235765.1A CN108377187B (en) 2018-03-21 2018-03-21 Block chain private key using method and device based on biological characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810235765.1A CN108377187B (en) 2018-03-21 2018-03-21 Block chain private key using method and device based on biological characteristics

Publications (2)

Publication Number Publication Date
CN108377187A CN108377187A (en) 2018-08-07
CN108377187B true CN108377187B (en) 2022-03-04

Family

ID=63018933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810235765.1A Active CN108377187B (en) 2018-03-21 2018-03-21 Block chain private key using method and device based on biological characteristics

Country Status (1)

Country Link
CN (1) CN108377187B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108667815A (en) * 2018-04-18 2018-10-16 价值互联(广州)信息技术有限公司 Block chain secret key encipher-decipher method, device and terminal based on bio-identification
CN110826034B (en) * 2018-08-14 2022-09-02 珠海金山办公软件有限公司 File signature method and device, electronic equipment and readable storage medium
CN110912683B (en) * 2018-09-18 2022-09-23 阿里巴巴集团控股有限公司 Password storage method and device and password verification method and device
CN109658078B (en) * 2018-12-19 2021-04-30 上海和数软件有限公司 Block chain private key generation method, device and medium based on biological characteristics
CN109660327A (en) * 2018-12-19 2019-04-19 上海和数软件有限公司 Block chain encryption method, device and readable storage medium storing program for executing based on iris
CN110599167A (en) * 2019-09-09 2019-12-20 深圳四方精创资讯股份有限公司 Identifier-based wallet private key management method, device and system and storage medium
CN111130751A (en) * 2019-11-04 2020-05-08 杭州云萃流图网络科技有限公司 Appointment information processing method, device and system based on block chain and electronic equipment
CN110995410A (en) * 2019-11-12 2020-04-10 杭州云萃流图网络科技有限公司 Method, device, equipment and medium for generating public key and private key
US11397760B2 (en) 2019-11-25 2022-07-26 International Business Machines Corporation Managing relationships between persons and physical objects based on physical fingerprints of the physical objects
US11798342B2 (en) * 2019-11-25 2023-10-24 International Business Machines Corporation Managing physical objects using crypto-anchors
CN112115491B (en) * 2020-08-20 2024-03-22 恒安嘉新(北京)科技股份公司 Symmetric encryption key protection method, device, equipment and storage medium
CN112054898B (en) * 2020-08-27 2022-10-25 中信银行股份有限公司 User private key backup and recovery method and device and electronic equipment
CN112217807B (en) * 2020-09-25 2022-09-16 山西特信环宇信息技术有限公司 Cone block chain key generation method, authentication method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101013943A (en) * 2007-02-14 2007-08-08 北京邮电大学 Method for binding/recovering key using fingerprint details
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area
CN107819571A (en) * 2017-09-29 2018-03-20 广东中科南海岸车联网技术有限公司 The generation method and device of private key

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104954328B (en) * 2014-03-27 2018-11-30 阿里巴巴集团控股有限公司 A kind of method and device of online registration and certification
CN106302336A (en) * 2015-05-25 2017-01-04 四川长虹电器股份有限公司 A kind of method, system and equipment realizing user fingerprints safety based on cloud computing
CN105631675B (en) * 2015-11-30 2019-06-11 东莞酷派软件技术有限公司 Information acquisition method and device, terminal
CN105812126B (en) * 2016-05-19 2018-10-12 齐鲁工业大学 Lightweight backup and the efficient restoration methods of healthy block chain data encryption key
CN106548345B (en) * 2016-12-07 2020-08-21 北京信任度科技有限公司 Method and system for realizing block chain private key protection based on key partitioning
CN106789096A (en) * 2017-03-30 2017-05-31 山东超越数控电子有限公司 A kind of biological characteristic cipher authentication method and device
CN107528688B (en) * 2017-09-30 2020-04-21 矩阵元技术(深圳)有限公司 Block chain key keeping and recovering method and device based on encryption delegation technology
CN107623569A (en) * 2017-09-30 2018-01-23 矩阵元技术(深圳)有限公司 Block chain key escrow and restoration methods, device based on Secret sharing techniques
CN107733656A (en) * 2017-10-23 2018-02-23 北京深思数盾科技股份有限公司 A kind of cipher authentication method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101013943A (en) * 2007-02-14 2007-08-08 北京邮电大学 Method for binding/recovering key using fingerprint details
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area
CN107819571A (en) * 2017-09-29 2018-03-20 广东中科南海岸车联网技术有限公司 The generation method and device of private key

Also Published As

Publication number Publication date
CN108377187A (en) 2018-08-07

Similar Documents

Publication Publication Date Title
CN108377187B (en) Block chain private key using method and device based on biological characteristics
US10785035B1 (en) Anti-replay attack authentication protocol
CN110603783B (en) Secure dynamic threshold signature scheme using trusted hardware
US10785019B2 (en) Data transmission method and apparatus
CN111639361A (en) Block chain key management method, multi-person common signature method and electronic device
US20120023336A1 (en) System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
US11223486B2 (en) Digital signature method, device, and system
CN110519046B (en) Quantum communication service station key negotiation method and system based on one-time asymmetric key pair and QKD
US20200228311A1 (en) Lightweight encryption, authentication, and verification of data moving to and from intelligent devices
CN110381055B (en) RFID system privacy protection authentication protocol method in medical supply chain
CN101399666A (en) Safety control method and system for digital certificate of file
CN110969431A (en) Safe trusteeship method, equipment and system of block chain digital currency private key
CN113630248B (en) Session key negotiation method
JP2010231404A (en) System, method, and program for managing secret information
CN114900304A (en) Digital signature method and apparatus, electronic device, and computer-readable storage medium
Tiwari et al. ACDAS: Authenticated controlled data access and sharing scheme for cloud storage
CN110690969A (en) Method and system for completing bidirectional SSL/TLS authentication in cooperation of multiple parties
Resende et al. PUF-based mutual multifactor entity and transaction authentication for secure banking
Amin et al. Anonymity preserving secure hash function based authentication scheme for consumer USB mass storage device
Verbücheln How perfect offline wallets can still leak bitcoin private keys
Zhu et al. Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography.
Zhu Cryptanalysis and improvement of a mobile dynamic ID authenticated key agreement scheme based on chaotic maps
CN114189388A (en) Alliance link key management system and method
Ashraf et al. Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication
Kumar et al. Handling secure healthcare data streaming using R2E algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 250104 No. 2877 Kehang Road, Sun Village Town, Jinan High-tech Zone, Shandong Province

Applicant after: Chaoyue Technology Co.,Ltd.

Address before: 250104 No. 2877 Kehang Road, Sun Village Town, Jinan High-tech Zone, Shandong Province

Applicant before: SHANDONG CHAOYUE DATA CONTROL ELECTRONICS Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant