TW201812638A - Storage design method of blockchain encrypted radio frequency chip - Google Patents

Storage design method of blockchain encrypted radio frequency chip Download PDF

Info

Publication number
TW201812638A
TW201812638A TW106131303A TW106131303A TW201812638A TW 201812638 A TW201812638 A TW 201812638A TW 106131303 A TW106131303 A TW 106131303A TW 106131303 A TW106131303 A TW 106131303A TW 201812638 A TW201812638 A TW 201812638A
Authority
TW
Taiwan
Prior art keywords
user
data
blockchain
radio frequency
frequency chip
Prior art date
Application number
TW106131303A
Other languages
Chinese (zh)
Other versions
TWI750223B (en
Inventor
陸揚
Original Assignee
大陸商上海鼎利信息科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 大陸商上海鼎利信息科技有限公司 filed Critical 大陸商上海鼎利信息科技有限公司
Publication of TW201812638A publication Critical patent/TW201812638A/en
Application granted granted Critical
Publication of TWI750223B publication Critical patent/TWI750223B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A storage design method of a blockchain encrypted radio frequency chip, comprising: step 1, designing the data structure of a blockchain encrypted radio frequency chip; step 2, designing the form in which data of the blockchain encrypted radio frequency chip is organized and stored in a user memory; and step 3, designing encryption and decryption processes for the blockchain encrypted radio frequency chip. By means of studying the encryption principle of blockchain, the storage design method of a blockchain encrypted radio frequency chip improves information security, satisfies the principle of one card for multiple uses, enhances the degree of information protection, and improves use security and convenience.

Description

區塊鏈加密射頻晶片存儲設計方法Blockchain encrypted RF chip storage design method

本發明係關於網際網路技術領域,以及一種區塊鏈加密射頻晶片存儲設計方法。The invention relates to the technical field of the Internet, and a method for designing a block chain encrypted radio frequency chip storage.

隨著區塊鏈技術的迅猛發展,區塊鏈的應用也愈加廣泛。區塊鏈加密射頻晶片作為用戶與區塊鏈網路的連接紐帶,重要性日益凸顯。區塊鏈加密射頻晶片的存儲方式時刻受到駭客和病毒的威脅,近年已經多次發生安全事件。為了讓區塊鏈的使用更加便捷,並提高安全性,必須借助使用便捷、安全性高、擴展性好、應用性強的區塊鏈加密射頻晶片作為工具。而區塊鏈加密射頻晶片的存儲與操作是基礎與核心,不僅要將區塊鏈的技術考慮在內,還要考慮安全性、應用性與擴展性。因此,極需一種解決以上問題的區塊鏈加密射頻晶片的存儲設計方法。With the rapid development of blockchain technology, the application of blockchain is becoming more and more widespread. The blockchain encrypted radio frequency chip is becoming increasingly important as the connection between users and the blockchain network. The storage method of the encrypted radio frequency chip of the blockchain is constantly threatened by hackers and viruses, and security incidents have occurred many times in recent years. In order to make the use of the blockchain more convenient and improve the security, it is necessary to use the blockchain encrypted RF chip as a tool that is easy to use, highly secure, extensible, and highly applicable. The storage and operation of the encrypted radio frequency chip of the blockchain is the foundation and core. Not only the technology of the blockchain should be taken into account, but also the security, application, and scalability. Therefore, there is a great need for a storage design method of a blockchain encrypted radio frequency chip that solves the above problems.

有鑑於此,本發明要解決的技術問題是提供一種使用廣泛、安全性高、擴展性好、應用性強的區塊鏈加密射頻晶片的存儲設計方法。In view of this, the technical problem to be solved by the present invention is to provide a storage design method for a blockchain encrypted radio frequency chip that is widely used, highly secure, highly scalable, and highly applicable.

為達到上述技術方案的效果,本發明的技術方案為:一種區塊鏈加密射頻晶片的存儲設計方法,包括以下步驟:In order to achieve the effect of the above technical solution, the technical solution of the present invention is: a method for designing storage of encrypted radio frequency chips of a blockchain, including the following steps:

第一步,設計區塊鏈加密射頻晶片的資料結構;The first step is to design the data structure of the blockchain encrypted RF chip;

第二步,設計區塊鏈加密射頻晶片中的資料在用戶記憶體中組織存放形式;The second step is to design the organization and storage form of the data in the blockchain encrypted RF chip in the user memory;

第三步,設計區塊鏈加密射頻晶片的加密、解密過程;The third step is to design the encryption and decryption process of the blockchain encrypted radio frequency chip;

區塊鏈加密射頻晶片的資料結構包含用戶資料、認證資料和帳戶資料;The data structure of the blockchain encrypted radio frequency chip includes user data, authentication data and account data;

所述用戶資料包括讀取控制資料A、用戶姓名、用戶電話、用戶ID;The user profile includes read control profile A, user name, user phone, and user ID;

其中,讀取控制資料A用於存儲控制用戶資料讀取的資訊,用戶姓名用於存儲用戶的姓名資訊,用戶電話用於存儲用戶的電話資訊,用戶ID存放內部用戶編號;Among them, the reading control data A is used to store information for controlling the reading of user data, the user name is used to store the user's name information, the user's phone is used to store the user's phone information, and the user ID is used to store the internal user number;

認證資料包括:讀取控制資料B、用戶密碼哈希(Hash)值、認證密鑰、帳戶主公鑰;Authentication data includes: read control data B, user password hash value, authentication key, account master public key;

其中,讀取控制資料B用於認證資料讀取的資訊,並且將認證資料讀取的資訊提取標記,並加上本地時間戳得到用戶防偽標記,防止篡改,最後把用戶防偽標記的值和用戶密碼的值經過哈希加密演算法變換成實際安全認證所需長度的哈希值,認證資料讀取的資訊提取標記的過程為:Among them, the read control data B is used to read the information of the authentication data, and the information read by the authentication data is extracted and marked with a local time stamp to obtain the user's anti-counterfeit mark to prevent tampering. Finally, the value of the user's anti-counterfeit mark and the user The value of the password is transformed into a hash value of the length required by the actual security authentication through a hash encryption algorithm. The process of extracting the mark from the information read by the authentication data is:

首先將任意長度的所述認證資料讀取的資訊經劃分而生成長度相等為4n位元組的子資訊段,其中n為根據系統提前制定的任意整數值,之後通過哈希函數變換成4n長度的哈希值,通過加上所述本地時間戳得到用戶防偽標記,在區塊鏈加密射頻晶片遺失情況下,有效地避免非法用戶暴力破解用戶密碼,最後認證密鑰用於讀取控制資料B和所述用戶密碼哈希值之間的安全認證,帳戶公鑰解密用於解密用戶防偽標記,以用於查詢上各個帳戶的餘額;First, the information read by the authentication data of any length is divided to generate sub-information segments with an equal length of 4n bytes, where n is an arbitrary integer value formulated in advance according to the system, and then transformed into a 4n length by a hash function The hash value of the user is obtained by adding the local timestamp to the user's anti-counterfeiting mark. In the case of the loss of the blockchain encrypted RF chip, it effectively prevents illegal users from violently cracking the user password. Finally, the authentication key is used to read the control data B Security authentication with the user password hash value, account public key decryption is used to decrypt the user's anti-counterfeiting mark, and used to query the balance of each account on the account;

帳戶資料包括:讀取控制資料C、主密鑰密文、主私鑰密文;Account information includes: read control data C, master key ciphertext, master private key ciphertext;

其中,讀取控制資料C用於存儲帳戶資料讀取的資訊,主密鑰密文用於關聯用戶密碼及帳戶私鑰,提升所述帳戶主公鑰的加密參數,提高破解難度,使帳戶更加安全;Among them, the read control data C is used to store the read information of the account data, and the master key ciphertext is used to associate the user password and the account private key, improve the encryption parameters of the account's master public key, increase the difficulty of cracking, and make the account more Safety;

區塊鏈加密射頻晶片中的資料在用戶記憶體中組織存放形式為樹型文件結構,具有多層次文件結構的形態,樹型文件結構分成三種層次:第一個層次是總控制文件,是多應用文件結構的根,為樹型文件結構的根目錄,用於存放區塊鏈加密射頻晶片的公共資訊檔,並且為所有的應用程式服務;第二個層次是應用文件,在總控制文件之下,為樹型文件結構的子目錄,根據使用情況分別建立多個應用文件,應用文件用於實現區塊鏈加密射頻晶片的多種應用功能;第三個層次是原子文件,用於存儲實際應用資料和相應的系統管理資訊,區塊鏈加密射頻晶片的資料結構中的資料資訊就存放於原子文件中,當應用文件需要時可調用相應的原子文件;The data in the blockchain encrypted RF chip is organized and stored in the user memory as a tree file structure with a multi-level file structure. The tree file structure is divided into three levels: the first level is the general control file, which is more The root of the application file structure is the root directory of the tree-type file structure, which is used to store the public information files of the blockchain-encrypted RF chip, and serves all applications. The second level is the application file. Below, it is a sub-directory of the tree-type file structure. Multiple application files are established according to the use situation. The application files are used to implement a variety of application functions of the blockchain encrypted RF chip. The third level is the atomic file, which is used to store the actual application. Data and the corresponding system management information, the data information in the data structure of the blockchain encrypted RF chip is stored in the atomic file, and the corresponding atomic file can be called when the application file requires;

區塊鏈加密射頻晶片的加密、解密過程為:The encryption and decryption process of the blockchain encrypted RF chip is:

(1)加密:系統隨機生成一個32位元組主密鑰,同時讀取用戶使用密碼,並且存儲到陣列矩陣,其中用戶使用密碼作為行向量,主密鑰作為列向量,並用加密演算法加密,得到主密鑰密文;(1) Encryption: The system randomly generates a 32-bit master key, and reads the user's password at the same time, and stores it into the array matrix. The user uses the password as the row vector, the master key as the column vector, and encrypts it with an encryption algorithm. To get the master key ciphertext;

(2)解密:從帳戶資料內讀取主密鑰密文,同時讀取用戶使用密碼,並且存儲到陣列矩陣,其中用戶使用密碼作為行向量,主密鑰密文作為列向量,通過解密演算法將作主密鑰密文還原成主密鑰,然後從區塊鏈加密射頻晶片中讀取主私鑰密文,通過所述用戶防偽標記的驗證,結合主密鑰將主密鑰密文還原成主私鑰。(2) Decryption: read the master key ciphertext from the account data, and read the user's password at the same time, and store it in the array matrix, where the user uses the password as the row vector and the master key ciphertext as the column vector. The master key ciphertext is restored to the master key, and then the master private key ciphertext is read from the blockchain-encrypted radio frequency chip, and the master key ciphertext is combined with the master key through the verification of the user's anti-counterfeiting mark. Revert to master private key.

本發明的一種區塊鏈加密射頻晶片存儲設計方法研究了區塊鏈的原理,考慮了資訊安全度,設計了區塊鏈加密射頻晶片的資料結構,並考慮了加密、解密的過程,為了滿足一卡多用的原則,設計了多層次文件結構,加大了資訊保護程度,提高使用的安全性和使用的便捷性。A method for designing a block chain encrypted radio frequency chip storage according to the present invention has studied the principle of the block chain, considered the information security, designed the data structure of the block chain encrypted radio frequency chip, and considered the process of encryption and decryption. The principle of one card and multiple uses has designed a multi-level file structure, which increases the degree of information protection and improves the security and convenience of use.

為了使本發明所要解決的技術問題、技術方案及有益效果更加清楚明白,以下結合附圖及實施例,對本發明進行詳細的說明。應當說明的是,此處所描述的具體實施例僅用以解釋本發明,並不用於限定本發明,能實現同樣功能的產品屬於等同替換和改進,均包含在本發明的保護範圍之內。具體方法如下:In order to make the technical problems, technical solutions, and beneficial effects to be more clearly understood by the present invention, the present invention is described in detail below with reference to the accompanying drawings and embodiments. It should be noted that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention. Products that can achieve the same function are equivalent replacements and improvements, and are included in the protection scope of the present invention. The specific method is as follows:

實施例1:用戶密碼的哈希函數構造Embodiment 1: Hash Function Construction of User Password

將驗證卡片所需的用戶使用密碼經過哈希函數變換成所需長度的哈希值,具體過程為首先將任意長度的用戶使用密碼經填補、劃分而生成長度為4n位元組的子資訊段,之後通過混沌反覆運算、函數變換、替換和函數查閱資料表生成4n長度的哈希值。具體演算法如下:The user password required to verify the card is transformed into a hash value of the required length by a hash function. The specific process is to first fill in and divide the user password of any length to generate a sub-information segment with a length of 4n bytes. , And then generate a hash value of 4n length through chaotic iterative operations, function transformations, substitutions, and function lookup tables. The specific algorithm is as follows:

a)將用戶使用密碼表示成制定的格式,初始格式為K=(α,x0 ,m),其中α為混沌映射的參數,x0 為混沌映射的初值,這裡為用戶的使用密碼,m為初始反覆運算次數。以0-1混沌序列初始化各寄存器為: a) The user's password is expressed in a specified format. The initial format is K = (α, x 0 , m), where α is the parameter of the chaotic mapping, and x 0 is the initial value of the chaotic mapping. Here is the user's password. m is the number of initial iterations. Initialize each register with a 0-1 chaotic sequence:

b)任意長度的用戶使用密碼經填補、劃分而生成長度為4n位元組的子資訊段。b) Users of any length use the password to fill and divide to generate sub-information segments with a length of 4n bytes.

c)使用函數f(*)重新計算A、B、C、D。c) Use function f (*) to recalculate A, B, C, D.

d)根據生成的A、B、C和D的最後位元(bit)決定A、B、C和D在混沌動態s-盒的替換次序,即將A、B、C和D分別與用標號1、2、3和4一一對應,按照函數F(*)的分函數下標順序做為混沌替換次序。d) Determine the replacement order of A, B, C, and D in the chaotic dynamic s-box according to the last bits of A, B, C, and D generated, that is, A, B, C, and D are respectively marked with 1 , 2, 3, and 4 correspond one-to-one, and the chaotic replacement order is based on the sub-function subscript order of the function F (*).

e)由A、B、C、D的最後位元(bit)查找並計算f(*)。e) Find and calculate f (*) from the last bit of A, B, C, D.

f)判斷原始資料是否處理完畢,是則輸出4n位元組的哈希值A、B、C、D,否則轉向b)步驟。f) Determine whether the original data has been processed. If yes, output 4n-byte hash values A, B, C, and D. Otherwise, go to step b).

實施例2:系統總控制文件下應用文件的定義與應用Example 2: Definition and application of application files under the overall system control file

在區塊鏈加密射頻晶片上建立文件系統根目錄上建立系統總控制文件。存放區塊鏈加密射頻晶片的公共資訊文件,並且為所有的應用程式服務。在總控制文件上根據使用情況分別建立多個應用目錄文件,例如為區塊鏈金融環境包括密鑰資訊、個人資訊等,接著定義金融接觸式的應用環境,根據中國金融區塊鏈加密射頻晶片規範可定義此應用的文件名為1PAY.SYS.DDF01。同樣可定義金融非接觸式系統環境,並定義為2PAY.SYS.DDF01。金融接觸式的應用環境與金融非接觸式的應用環境都為系統總控制文件之下的不同應用文件,應用文件通過檔案名實現不同應用的選擇從而實現射頻晶片的多種應用。Establish the overall system control file on the root directory of the file system on the blockchain encrypted RF chip. Store the public information files of the blockchain encrypted RF chip, and serve all applications. Establish multiple application directory files on the general control file according to the use situation, for example, the blockchain financial environment includes key information, personal information, etc., and then define a financial contact application environment. According to the Chinese financial blockchain encrypted RF chip The specification defines the file name for this application as 1PAY.SYS.DDF01. The financial contactless system environment can also be defined and defined as 2PAY.SYS.DDF01. Both the financial contact application environment and the financial contactless application environment are different application files under the overall control file of the system. The application file realizes the selection of different applications through the file name and thus realizes multiple applications of the RF chip.

實施例3:密鑰結構的具體規劃Embodiment 3: Specific Planning of Key Structure

密鑰管理是一口涉及密鑰的產生、檢驗、分配、傳遞、使用、保管、銷毀的綜合性技術,並且與密鑰的行政管理制度和人員的素質有密切的關係。目前國際標準化組織ISO己經制定了密鑰管理標準。但是由於加密系統實際使用情況的不同,具體的系統都有具體的實際要求,因此在標準化上很難統一。Key management is a comprehensive technology that involves the generation, inspection, distribution, transfer, use, storage, and destruction of keys, and is closely related to the key management system and the quality of personnel. At present, ISO has established key management standards. However, due to the different actual use of encryption systems, specific systems have specific practical requirements, so it is difficult to unify them in standardization.

目前的密鑰系統一般採用層次結構,使用密鑰保護密鑰的基本思想來進行設計。對於第(i+1)層的密鑰設計由第i層的密鑰來保護,同時本身也受到再上一層密鑰的保護。密鑰為層次化保護機制,下一層的密鑰由上面層次的密鑰保護。The current key system generally adopts a hierarchical structure and is designed using the basic idea of key protection keys. The key design of the (i + 1) -layer is protected by the key of the i-layer, and it is also protected by the key of the next layer. The key is a hierarchical protection mechanism, and the key of the next layer is protected by the key of the upper layer.

在實際使用中往往根據加密系統的功能結構來確定密鑰系統的層次結構,如果系統功能相對簡單,則密鑰層次就可相應減少。如果功能相對複雜則需要適當增加密鑰結構層數。通過分層模式的設計可大大提升密鑰管理系統的安全性。由於在每一層中都可使用新的協議進行變化、進行管理,因此整個密鑰系統為動態特徵,而不僅僅是一個靜態的存儲機制,伴隨著每一層密鑰,都存在相應的協議。In actual use, the key system hierarchy is often determined according to the functional structure of the encryption system. If the system functions are relatively simple, the key hierarchy can be reduced accordingly. If the functions are relatively complicated, the number of key structure layers needs to be increased appropriately. The design of the layered model can greatly improve the security of the key management system. Because new protocols can be used for change and management in each layer, the entire key system is a dynamic feature, not just a static storage mechanism. With each layer of keys, there are corresponding protocols.

在區塊鏈加密射頻晶片系統中使用三層密鑰管理系統,分別為主密鑰層,子密鑰層和對話密鑰層。在智慧區塊鏈加密射頻晶片和讀卡器中存有相同的系統主密鑰,根據系統的實際情況不同,有的智慧卡或者讀卡器中會有一個或多個主密鑰,以提高系統的安全性。本系統中只使用了一個主密鑰。使用可變的主密鑰參數對主密鑰進行加密就能得到子密鑰,同時採用另外的可變主密鑰參數對子密鑰進行加密就能得到第三層對話密鑰。對於讀卡器和晶片之間傳輸的資料採用對話密鑰進行加密。通常情況下,對話密鑰只能被用一次,這樣即使對話密鑰被攻擊者解碼,洩露的也僅僅只是一次傳輸資料。並且,無法從對話密鑰反推求得系統主密鑰。A three-layer key management system is used in the blockchain encrypted radio frequency chip system, which is a master key layer, a sub-key layer, and a session key layer. The same system master key is stored in the smart blockchain encrypted RF chip and card reader. Depending on the actual situation of the system, some smart cards or readers will have one or more master keys to improve System security. Only one master key is used in this system. Encrypting the master key with a variable master key parameter can obtain the sub-key, while encrypting the sub-key with another variable master key parameter can obtain the third-level session key. The data transmitted between the card reader and the chip is encrypted with a session key. Normally, the conversation key can only be used once, so even if the conversation key is decoded by an attacker, the leaked data is transmitted only once. In addition, the system master key cannot be derived from the session key.

對話密鑰生成方式;在區塊鏈加密射頻晶片內都設有態片製造標識碼,應用序號或者區塊鏈加密射頻晶片序號,其中,根據區塊鏈加密射頻晶片的序號有且唯一。另外,在交易時系統通常記錄交易的時間,在某些卡片內還有相應的計數器來控制讀寫次數。當卡片被執行某條指令後計數器自動增加。這就保證了每次交易的時候,計數器的值和交易時間不一致。因此使用主密鑰對卡的製造商識別碼,卡的序號進行加密生成子密鑰。雖然使用相同的主密鑰,但是由於序號各不相同,因此各卡生成的子密鑰也是不相同的。為了確保對於每張卡上的對話密鑰只使用一次,使用子密鑰對交易時間和計數器值進行加密生成對話密鑰。這樣對於同一張卡,每次交易使用的對話密鑰都是不同的。對於一個多用途的晶片而言,不同的應用常常使用不同的主密鑰,因此這使得解碼系統的工作量很大,而且解碼的意義也不大。Dialog key generation method; a state-of-the-art chip manufacturing identification code, an application serial number or a blockchain-encrypted radio-frequency chip serial number are set in the blockchain-encrypted radio-frequency chip, and the serial number of the radio-frequency-encrypted chip is unique and unique. In addition, the system usually records the transaction time during the transaction, and there are corresponding counters in some cards to control the number of reads and writes. The counter is automatically incremented when a certain instruction is executed on the card. This ensures that the value of the counter and the transaction time are inconsistent each time a transaction is made. Therefore, the master key is used to encrypt the card's manufacturer identification code and the card's serial number to generate a sub-key. Although the same master key is used, since the serial numbers are different, the sub-keys generated by each card are also different. To ensure that the session key on each card is used only once, the sub-key is used to encrypt the transaction time and the counter value to generate the session key. In this way, for the same card, the session key used for each transaction is different. For a multi-purpose chip, different applications often use different master keys, so this makes the decoding system a lot of work, and the meaning of decoding is not great.

主密鑰可由多個可信任的人彼此獨立提出一段數據然後合成一個密鑰,然後再加入安全亂數加密運算獲得。因此主密鑰的生成和變化方式都難預測。系統主密鑰在下載的過程中如果不謹慎就會造成密鑰的洩露,因此主密鑰的下載必須在安全的環境下進行。由於需要人為將系統主密鑰裝載入射頻晶片及讀卡器,因此確保下載過程必須在專用的設備上進行,下載時的環境必須安全的,在射頻卡在接觸上不能丟失資訊。在卡內作業系統確保主密鑰在下載後就不能再被讀取。讀卡器內無法進行密鑰下載十分麻煩,往往加入安全模組用以存放密鑰,以實現加密與解密演算法。The master key can be obtained by multiple trusted persons independently submitting a piece of data and then synthesizing a key, and then adding a secure random number encryption operation. Therefore, it is difficult to predict how the master key is generated and changed. If the system master key is not carefully downloaded during the download process, the key will be leaked. Therefore, the download of the master key must be performed in a secure environment. Since the master key of the system needs to be manually loaded into the radio frequency chip and the card reader, the downloading process must be performed on a dedicated device, the environment during downloading must be safe, and information cannot be lost on the contact of the radio frequency card. The operating system inside the card ensures that the master key can no longer be read after downloading. It is very troublesome to download the key in the card reader, and often a security module is added to store the key to implement the encryption and decryption algorithms.

加密解密演算法使用了數位混沌序列,能在不過多增加運算量的前提下,對數字混沌反覆運算過程加以改進,使整個系統所產生的偽隨機序列更加類似雜訊,並且減少弱密鑰的比例,擴大可用密鑰的空間,使密鑰的選取具有更大的隨機性。由於數位混沌系統反覆運算所產生的偽混沌序列週期不可預測,難於精確分析,並且遠遠小於2N (N是實現精度)。雖然提高了實現精度,偽混沌序列的平均週期仍然不會有大的提高,並且還是會存在序列被吸引到某個固定值的情況。為了改進偽混沌序列的週期特性,延長並且控制其序列週期,利用m序列對混沌反覆運算系統進行擾動的方法。The encryption and decryption algorithm uses digital chaotic sequences, which can improve the iterative process of digital chaos without increasing the amount of computation, making the pseudo-random sequence generated by the entire system more similar to noise, and reducing the number of weak keys. Proportion, expand the space of available keys, and make the selection of keys more random. Due to the unpredictable period of the pseudo-chaotic sequence generated by the iterative operation of the digital chaotic system, it is difficult to accurately analyze, and it is far less than 2 N (N is the implementation accuracy). Although the implementation accuracy is improved, the average period of the pseudo-chaotic sequence will not be greatly improved, and there may still be cases where the sequence is attracted to a fixed value. In order to improve the periodic characteristics of pseudo-chaotic sequences, to extend and control the sequence period, the method of using m-sequences to perturb the chaotic iterative computing system is proposed.

no

[圖1] 為區塊鏈加密射頻晶片存儲設計方法的具體步驟。[Figure 1] Specific steps for the design method of encrypted radio frequency chip storage for the blockchain.

Claims (1)

一種區塊鏈加密射頻晶片的存儲設計方法,其特徵在於,包括以下步驟: 第一步,設計區塊鏈加密射頻晶片的資料結構; 第二步,設計區塊鏈加密射頻晶片中的資料在用戶記憶體中組織存放形式; 第三步,設計區塊鏈加密射頻晶片的加密、解密過程; 所述區塊鏈加密射頻晶片的資料結構包含用戶資料、認證資料和帳戶資料; 所述用戶資料包括讀取控制資料A、用戶姓名、用戶電話、用戶ID以及用戶密碼; 其中,所述讀取控制資料A用於存儲所述用戶資料讀取的資訊,所述用戶姓名用於存儲用戶的姓名資訊,所述用戶電話用於存儲用戶的電話資訊,所述用戶ID存放內部用戶編號,所述用戶密碼用於存儲用戶設定的使用密碼; 所述認證資料包括:讀取控制資料B、用戶密碼哈希值、認證密鑰、帳戶主公鑰; 其中,所述讀取控制資料B用於存儲所述認證資料讀取的資訊,並且對所述認證資料讀取的資訊進行提取標記,並加上本地時間戳得到用戶防偽標記,防止篡改,最後把所述用戶防偽標記的值和所述用戶密碼的值經過哈希加密演算法變換成實際安全認證所需長度的所述用戶密碼哈希值,對所述認證資料讀取的資訊進行提取標記的過程為: 首先將任意長度的所述認證資料讀取的資訊劃分而生成長度相等為8位元组的子資訊段,之後通過哈希函數將所述子資訊段轉換生成8位元組長度的哈希值,通過加上所述本地時間戳得到所述用戶防偽標記,能在所述區塊鏈加密射頻晶片遺失情況下,避免非法用戶暴力破解所述用戶密碼,最後所述認證密鑰用於所述讀取控制資料B和所述用戶密碼哈希值之間的安全認證,所述帳戶主公鑰用於解密所述用戶防偽標記,以用於查詢上各個帳戶的餘額; 所述帳戶資料包括:讀取控制資料C、主密鑰密文、主私鑰密文; 其中,所述讀取控制資料C用於存儲所述帳戶資料讀取的資訊,所述主密鑰密文用於關聯所述用戶密碼及主密鑰,提升所述帳戶主公鑰的加密參數,提高破解難度,使帳戶更加安全;所述主私鑰密文用於加大所述區塊鏈加密射頻晶片的加密、解密過程的複雜度,進一步提高所述區塊鏈加密射頻晶片的安全性; 所述區塊鏈加密射頻晶片中的資料在所述用戶記憶體中組織存放形式為樹型文件結構,具有多層次文件結構的形態,所述樹型文件結構被分成三種層次:第一個層次是總控制文件,是所述樹型文件結構的根,作為所述樹型文件結構的根目錄,用於存放所述區塊鏈加密射頻晶片的公共資訊檔,並且為所有的應用程序服務;第二個層次是應用文件,在所述總控制文件之下,作為所述樹型文件結構的子目錄,根據使用情況分別建立多個所述應用文件,所述應用文件用於實現所述區塊鏈加密射頻晶片的多種應用功能;第三個層次是原子文件,用於存儲實際應用資料和相應的系統管理資訊,所述用戶資料、所述認證資料和所述帳戶數據就存放於所述原子文件中,當所述應用文件需要時可調用相應的所述原子文件; 所述區塊鏈加密射頻晶片的加密、解密過程為: (1)加密:所述區塊鏈加密射頻晶片隨機生成一個32位元組主密鑰,同時讀取所述用戶密碼,並且存儲到一個陣列矩陣,所述陣列矩陣中所述用戶密碼作為行向量,所述主密鑰作為列向量,並用加密演算法加密,得到所述主密鑰密文;所述主密鑰經過所述用戶防偽標記,通過加密演算法,生成所述區塊鏈加密射頻晶片的主私鑰; (2)解密:從所述帳戶資料中讀取所述主密鑰密文,同時讀取所述用戶密碼,並且存儲到另一個陣列矩陣,其中所述用戶密碼作為行向量,所述主密鑰密文作為列向量,通過解密演算法將所述主密鑰密文還原成所述主密鑰,然後從所述區塊鏈加密射頻晶片中讀取所述主私鑰密文,通過所述用戶防偽標記的驗證,並且結合所述主密鑰將所述主私鑰密文還原成主私鑰。A storage design method of a blockchain encrypted radio frequency chip is characterized in that it includes the following steps: the first step is to design the data structure of the blockchain encrypted radio frequency chip; the second step is to design the data in the blockchain encrypted radio frequency chip. The organization and storage form in the user memory; the third step is to design the encryption and decryption process of the blockchain encrypted radio frequency chip; the data structure of the blockchain encrypted radio frequency chip includes user data, authentication data and account data; the user data Including reading control data A, user name, user phone, user ID, and user password; wherein the reading control data A is used to store information read by the user data, and the user name is used to store the user's name Information, the user phone is used to store the user's phone information, the user ID stores an internal user number, and the user password is used to store a user password set by the user; the authentication information includes: read control data B, user password A hash value, an authentication key, and an account master public key; wherein the read control data B is used to store the authentication data Data, and extract the information read from the authentication data and add a local time stamp to obtain the user anti-counterfeiting mark to prevent tampering. Finally, the value of the user anti-counterfeiting mark and the value of the user password The hash encryption algorithm is used to transform the hash value of the user password required for actual security authentication. The process of extracting and marking the information read by the authentication data is as follows: First, the authentication data of any length is read. Divides the information to generate 8-byte sub-information segments, and then converts the sub-information segments by a hash function to generate a 8-byte-length hash value, and obtains the result by adding the local timestamp. The user anti-counterfeiting mark can prevent an illegal user from violently cracking the user password when the blockchain encrypted radio frequency chip is lost. Finally, the authentication key is used for the read control data B and the user password. Greek security authentication, the account master public key is used to decrypt the user's anti-counterfeiting mark for querying the balance of each account; the account information includes Read the control data C, the master key ciphertext, and the master private key ciphertext; wherein the read control data C is used to store information read by the account data, and the master key ciphertext is used to associate with The user password and the master key are used to improve the encryption parameters of the account's master public key, increase the difficulty of cracking, and make the account more secure; the master private key ciphertext is used to increase the encryption of the blockchain-encrypted radio frequency chip, The complexity of the decryption process further improves the security of the blockchain-encrypted radio frequency chip; the data in the blockchain-encrypted radio frequency chip is organized and stored in the user memory as a tree-type file structure with multiple levels The file structure, the tree file structure is divided into three levels: the first level is the general control file, is the root of the tree file structure, as the root directory of the tree file structure, used to store all The public information file of the encrypted radio frequency chip of the blockchain is described, and it serves all applications; the second level is the application file, which is a sub-directory of the tree file structure under the general control file A plurality of the application files are respectively established according to the use conditions, and the application files are used to implement multiple application functions of the blockchain encrypted radio frequency chip; the third layer is an atomic file for storing actual application data and corresponding systems Management information, the user data, the authentication data, and the account data are stored in the atomic file, and the corresponding atomic file can be called when the application file requires; the blockchain-encrypted radio frequency chip The encryption and decryption processes are as follows: (1) Encryption: The blockchain-encrypted radio frequency chip randomly generates a 32-bit master key, reads the user password at the same time, and stores it into an array matrix, the array matrix The user password is used as a row vector, the master key is used as a column vector, and encrypted with an encryption algorithm to obtain the ciphertext of the master key; the master key passes the user anti-counterfeiting mark and passes the encryption algorithm, Generating the master private key of the blockchain-encrypted radio frequency chip; (2) decryption: reading the master key ciphertext from the account data, and simultaneously reading the user password And stored in another array matrix, where the user password is a row vector and the master key ciphertext is a column vector, the master key ciphertext is restored to the master key by a decryption algorithm, and then from The ciphertext of the master private key is read in the blockchain encrypted radio frequency chip, verified by the user's anti-counterfeiting mark, and the master private key ciphertext is restored to the master private key in combination with the master key.
TW106131303A 2016-09-12 2017-09-12 Blockchain encrypted radio frequency chip storage design method TWI750223B (en)

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
CN201610818053 2016-09-12
CN201610818053.3 2016-09-12
CN201610815590.2 2016-09-12
??201610815590.2 2016-09-12
CN201610818054 2016-09-12
??201610818053.3 2016-09-12
CN201610818054.8 2016-09-12
CN201610815590 2016-09-12
??201610818054.8 2016-09-12

Publications (2)

Publication Number Publication Date
TW201812638A true TW201812638A (en) 2018-04-01
TWI750223B TWI750223B (en) 2021-12-21

Family

ID=61561350

Family Applications (2)

Application Number Title Priority Date Filing Date
TW106131303A TWI750223B (en) 2016-09-12 2017-09-12 Blockchain encrypted radio frequency chip storage design method
TW106131301A TWI749061B (en) 2016-09-12 2017-09-12 Blockchain identity system

Family Applications After (1)

Application Number Title Priority Date Filing Date
TW106131301A TWI749061B (en) 2016-09-12 2017-09-12 Blockchain identity system

Country Status (2)

Country Link
TW (2) TWI750223B (en)
WO (2) WO2018046009A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI729781B (en) * 2020-04-21 2021-06-01 麥睿資訊股份有限公司 Data authentication system and data authentication method thereof
TWI777048B (en) * 2018-09-30 2022-09-11 開曼群島商創新先進技術有限公司 Anti-counterfeiting method and device based on blockchain, electronic equipment
TWI833900B (en) * 2019-02-22 2024-03-01 英商安全事件有限公司 Security data processing device

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108306896B (en) * 2018-03-29 2023-06-23 上海交通大学 Substation state monitoring system and method with data protection function
CN108768933B (en) * 2018-04-11 2020-11-03 深圳技术大学 Autonomous supervision digital identity authentication system on block chain platform
CN109257342B (en) 2018-09-04 2020-05-26 阿里巴巴集团控股有限公司 Block chain cross-chain authentication method, system, server and readable storage medium
CN109255619A (en) * 2018-09-26 2019-01-22 北京亚联之星信息技术有限公司 A kind of identity identifying method and equipment based on block chain
CN109583215B (en) * 2018-09-28 2022-11-15 创新先进技术有限公司 Method and device for processing credit investigation data and block chain data sharing system
US10970372B2 (en) 2018-11-01 2021-04-06 Microsoft Technology Licensing, Llc Revocable biometric print based identification
CN109447029B (en) * 2018-11-12 2022-09-02 公安部第三研究所 Electronic identity card photo generation system and method
CN111224804B (en) * 2018-11-26 2022-12-09 ***通信集团辽宁有限公司 Internet of things equipment initialization method and device, internet of things equipment and storage medium
CN111327568B (en) * 2018-12-14 2022-04-01 中国电信股份有限公司 Identity authentication method and system
CN109493058A (en) * 2018-12-14 2019-03-19 深圳壹账通智能科技有限公司 A kind of personal identification method and relevant device based on block chain
CN109861996B (en) * 2019-01-17 2023-06-02 深圳壹账通智能科技有限公司 Block chain-based relationship proving method, device, equipment and storage medium
CN111522809B (en) * 2019-02-02 2023-04-21 阿里巴巴集团控股有限公司 Data processing method, system and equipment
SG11201908982QA (en) * 2019-03-29 2019-10-30 Alibaba Group Holding Ltd Managing sensitive data elements in a blockchain network
CN110516451B (en) * 2019-07-24 2021-03-02 杭州电子科技大学 Block chain-based derived ciphertext piece secret level change and decryption reminding notification method
CN110457954B (en) * 2019-07-29 2023-08-25 创新先进技术有限公司 Contract management device and method
CN110532293B (en) * 2019-09-02 2023-04-07 浪潮软件股份有限公司 Data stream life cycle management method and system based on block chain technology
CN110781140B (en) * 2019-09-06 2023-08-18 平安科技(深圳)有限公司 Method, device, computer equipment and storage medium for signing data in blockchain
CN110570309B (en) * 2019-09-16 2023-06-16 上海保险交易所股份有限公司 Method and system for replacing a leader of a blockchain network
CN111092851A (en) * 2019-09-23 2020-05-01 上海唯链信息科技有限公司 Data verification method and device of Internet of things temperature detection equipment based on block chain
TWI711000B (en) * 2019-09-30 2020-11-21 辰光能源科技有限公司 Environmental health and product quality establishment system
TWI740234B (en) * 2019-10-16 2021-09-21 辰光能源科技有限公司 Real Food System
TWI727474B (en) * 2019-10-25 2021-05-11 李婷婷 Digital identity management system and method
CN110990808B (en) * 2019-11-21 2022-04-01 杭州趣链科技有限公司 Notarization number shaking method based on block chain
CN111556007B (en) * 2020-03-03 2021-09-24 支付宝实验室(新加坡)有限公司 Identity verification method, device and equipment based on block chain and storage medium
CN111428253B (en) * 2020-03-24 2023-04-07 福建福链科技有限公司 Data protection method and system suitable for block chain
CN111914270A (en) * 2020-07-08 2020-11-10 广西佳壹大数据科技股份有限公司 Programmable authentication service method and system based on block chain technology
CN112073661B (en) * 2020-08-03 2022-10-25 浙江旅游职业学院 Tamper-proof video monitoring system for sterile workshop
CN112184974B (en) * 2020-09-27 2022-06-07 江苏天创科技有限公司 Monitoring system based on 5G communication node
CN112447291B (en) * 2020-11-23 2023-03-28 四川大学华西医院 Block chain-based method for sharing hospital data
CN112561006B (en) * 2020-12-04 2023-08-29 中国联合网络通信集团有限公司 Electronic license plate management method, radio frequency identification reader-writer, node, equipment and medium
CN112749409B (en) * 2021-01-06 2024-03-08 上海零数众合信息科技有限公司 Encryption method based on random number in block chain
CN112819628B (en) * 2021-02-01 2024-02-02 网易(杭州)网络有限公司 Transaction replay prevention detection method, device and system, electronic equipment and storage medium
CN112989392B (en) * 2021-04-19 2022-08-30 河北科技大学 Battlefield situation perception method, system and terminal equipment
CN113570321B (en) * 2021-04-29 2022-12-16 国家能源集团新能源有限责任公司 Hydrogen energy data management system
CN113364596A (en) * 2021-05-27 2021-09-07 南方科技大学 Ore digging method and device based on block chain, mobile terminal and storage medium
CN114189388A (en) * 2021-12-17 2022-03-15 中国电子科技网络信息安全有限公司 Alliance link key management system and method
CN114584343B (en) * 2022-01-24 2023-05-02 厦门理工学院 Data protection method and system for cloud computing center and readable storage medium
CN114900348B (en) * 2022-04-28 2024-01-30 福建福链科技有限公司 Block chain sensor data verification method and terminal
CN115002779B (en) * 2022-07-29 2022-11-22 杭州宇链科技有限公司 Pseudo base station prevention and control method and system based on block chain and security chip
CN116132174B (en) * 2023-02-13 2024-04-16 华中师范大学 Remote secure communication method, system and terminal of 5G Internet of vehicles supply chain
CN116828457B (en) * 2023-08-30 2023-11-17 四川轻化工大学 Intelligent wireless monitoring method, system and medium applied to cellar

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6061449A (en) * 1997-10-10 2000-05-09 General Instrument Corporation Secure processor with external memory using block chaining and block re-ordering
US6831982B1 (en) * 1999-11-19 2004-12-14 Storage Technology Corporation Encryption key management system using multiple smart cards
GB9930145D0 (en) * 1999-12-22 2000-02-09 Kean Thomas A Method and apparatus for secure configuration of a field programmable gate array
TWI351864B (en) * 2005-03-25 2011-11-01 Via Tech Inc Apparatus and method for employing cyrptographic f
CN101490689B (en) * 2006-07-07 2012-05-16 桑迪士克股份有限公司 Content control system and method using certificate chains
KR101366243B1 (en) * 2006-12-04 2014-02-20 삼성전자주식회사 Method for transmitting data through authenticating and apparatus therefor
CN101308546B (en) * 2008-05-20 2011-04-20 上海华申智能卡应用***有限公司 Radio frequency label data protection method of safe storage structure having multi-stage protection
CN102144371B (en) * 2008-09-10 2015-06-03 Lg电子株式会社 Method for selectively encrypting control signal
JP5813380B2 (en) * 2011-06-03 2015-11-17 株式会社東芝 Semiconductor memory device
US10102510B2 (en) * 2012-11-28 2018-10-16 Hoverkey Ltd. Method and system of conducting a cryptocurrency payment via a mobile device using a contactless token to store and protect a user's secret key
US10346814B2 (en) * 2014-06-04 2019-07-09 MONI Limited System and method for executing financial transactions
TWI528217B (en) * 2014-07-02 2016-04-01 柯呈翰 A method and system for adding dynamic labels to a file and encrypting the file
CN205003731U (en) * 2015-09-30 2016-01-27 深圳市招股科技有限公司 Digital cash hardware wallet based on two interfaces IC -card
CN105701372B (en) * 2015-12-18 2019-04-09 布比(北京)网络技术有限公司 A kind of building of block chain identity and verification method
CN105610578B (en) * 2016-01-25 2019-05-03 杭州复杂美科技有限公司 Block chain information deposits card and method for secret protection
CN105790954B (en) * 2016-03-02 2019-04-09 布比(北京)网络技术有限公司 A kind of method and system constructing electronic evidence
CN105871855B (en) * 2016-04-11 2019-09-13 杨鹏 The method and system that a kind of electronic equipment identification code is generated, stores and identified
CN105812126B (en) * 2016-05-19 2018-10-12 齐鲁工业大学 Lightweight backup and the efficient restoration methods of healthy block chain data encryption key

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI777048B (en) * 2018-09-30 2022-09-11 開曼群島商創新先進技術有限公司 Anti-counterfeiting method and device based on blockchain, electronic equipment
US11562375B2 (en) 2018-09-30 2023-01-24 Advanced New Technologies Co., Ltd. Blockchain-based data verification method, apparatus, and electronic device
TWI833900B (en) * 2019-02-22 2024-03-01 英商安全事件有限公司 Security data processing device
TWI729781B (en) * 2020-04-21 2021-06-01 麥睿資訊股份有限公司 Data authentication system and data authentication method thereof

Also Published As

Publication number Publication date
TW201812630A (en) 2018-04-01
TWI750223B (en) 2021-12-21
WO2018046009A1 (en) 2018-03-15
TWI749061B (en) 2021-12-11
WO2018046008A1 (en) 2018-03-15

Similar Documents

Publication Publication Date Title
TWI750223B (en) Blockchain encrypted radio frequency chip storage design method
CN107070660B (en) Storage design method of block chain encryption radio frequency chip
US10187200B1 (en) System and method for generating a multi-stage key for use in cryptographic operations
KR101824787B1 (en) System and methods for encrypting data
US8938067B2 (en) Format preserving encryption methods for data strings with constraints
CN105024803B (en) Behavior fingerprint in white box realization
CN105306194B (en) For encrypted file and/or the multiple encryption method and system of communications protocol
US20160006570A1 (en) Generating a key derived from a cryptographic key using a physically unclonable function
CN106888081B (en) Wide coding of intermediate values within white-box implementations
CN103378971B (en) A kind of data encryption system and method
CN102138300A (en) Message authentication code pre-computation with applications to secure memory
KR101989813B1 (en) Generating and verifying the alternative data in a specified format
CN111066077B (en) Encryption device, encryption method, decryption device, and decryption method
US10164945B2 (en) Method, apparatus, and computer-readable medium for masking data
US20160072779A1 (en) Securing a cryptographic device against implementation attacks
JP2008513811A (en) Calculation conversion method and system
JP2017187724A (en) Encryption device, encryption method, decryption device, and decryption method
CN104200137A (en) Method for guaranteeing self-security of JAVA program
EP3214567B1 (en) Secure external update of memory content for a certain system on chip
JP2002539545A (en) Anonymization method
CN114430321B (en) DFA self-adaptive security-based black box traceable key attribute encryption method and device
CN115766244A (en) Internet of vehicles information encryption method and device, computer equipment and storage medium
CN100486157C (en) Distribution type data encryption method
RU2470470C2 (en) Protecting execution of cryptographic computation
WO2021044465A1 (en) Encrypting device, decrypting device, computer program, encryption method, decryption method, and data structure