[go: up one dir, main page]

CN113904850B - Blockchain-based private key keystore secure login method, electronic device, storage medium - Google Patents

Blockchain-based private key keystore secure login method, electronic device, storage medium Download PDF

Info

Publication number
CN113904850B
CN113904850B CN202111178401.2A CN202111178401A CN113904850B CN 113904850 B CN113904850 B CN 113904850B CN 202111178401 A CN202111178401 A CN 202111178401A CN 113904850 B CN113904850 B CN 113904850B
Authority
CN
China
Prior art keywords
private key
user
keystore
information
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111178401.2A
Other languages
Chinese (zh)
Other versions
CN113904850A (en
Inventor
翟红鹰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shantou Pengda Information Technology Co ltd
Original Assignee
Puhua Yunchuang Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Puhua Yunchuang Technology Beijing Co ltd filed Critical Puhua Yunchuang Technology Beijing Co ltd
Priority to CN202111178401.2A priority Critical patent/CN113904850B/en
Publication of CN113904850A publication Critical patent/CN113904850A/en
Application granted granted Critical
Publication of CN113904850B publication Critical patent/CN113904850B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Lock And Its Accessories (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention provides a safe login method based on a blockchain private key keystore and electronic equipment, wherein the safe login method based on the blockchain private key keystore comprises the following steps: acquiring user login information, wherein the login information comprises user biological identification information for uniquely identifying the user information; acquiring unique identification information generated based on the user biological identification information according to the user login information; decrypting the private key keystore stored with the private key according to the unique identification information to obtain the private key; authenticating whether the private key and the corresponding public key are successfully paired; if the pairing is successful, the user is logged in. The scheme of the invention utilizes the biological recognition technology to obtain the unique password encryption private key generation keystore to provide security. When keystore is lost, the user biometric information cannot be acquired and cannot be decrypted keystore, so that the security of the system is ensured.

Description

基于区块链私钥keystore安全登录方法,电子设备,存储介质Blockchain-based private key keystore secure login method, electronic device, storage medium

技术领域Technical Field

本发明涉及区块链技术领域,尤其涉及一种基于区块链私钥keystore安全登录方法、keystore生成方法、系统及电子设备。The present invention relates to the field of blockchain technology, and in particular to a blockchain private key keystore secure login method, a keystore generation method, a system and an electronic device.

背景技术Background Art

随着计算机技术的飞速发展,信息网络已经成为社会发展的重要保证。有很多是敏感信息,甚至是国家机密。所以难免会吸引来自世界各地的各种人为攻击(例如信息泄露、信息窃取、数据篡改、数据删添、计算机病毒等)With the rapid development of computer technology, information networks have become an important guarantee for social development. There is a lot of sensitive information, even state secrets. Therefore, it is inevitable that it will attract various human attacks from all over the world (such as information leakage, information theft, data tampering, data deletion, computer viruses, etc.)

大多数安全性问题的出现都是由于人为恶意试图获得某种好处或损害某些人而故意引起的。可以看出保证网络安全不仅仅只是需要使它没有编程错误,更重要的可能是需要更加的防范,防止这些恶意利用网络信息安全漏洞而制造网络风险的人。同时,必须清楚地认识到,能够制止偶然实施破坏行为的敌人的方法收效甚微。而在信息网络中登录认证作为系统第一道关卡,这时候就显得尤为重要。虽然在登录认证过程也需要密码认证,但是传统的密码存储在服务器,存在丢失和被窃取的隐患。Most security issues are intentionally caused by malicious attempts to gain some benefit or harm someone. It can be seen that ensuring network security is not just about making it free of programming errors. More importantly, it may be necessary to take more precautions to prevent those who maliciously exploit network information security loopholes to create network risks. At the same time, it must be clearly recognized that methods that can stop enemies who accidentally carry out destructive behavior have little effect. In the information network, login authentication is the first checkpoint of the system, so it is particularly important at this time. Although password authentication is also required in the login authentication process, traditional passwords are stored on the server, which has the risk of being lost and stolen.

发明内容Summary of the invention

有鉴于此,本发明实施例提供一种基于区块链私钥keystore安全登录方法,至少部分解决现有技术中存在的问题。In view of this, an embodiment of the present invention provides a secure login method based on a blockchain private keystore, which at least partially solves the problems existing in the prior art.

第一方面,本发明实施例提供了一种基于区块链私钥keystore安全登录方法,其特征在于,所述基于区块链私钥keystore安全登录方法包括:In a first aspect, an embodiment of the present invention provides a secure login method based on a blockchain private keystore, characterized in that the secure login method based on a blockchain private keystore includes:

获取用户登录信息,所述登录信息包括供唯一确认用户信息的用户生物识别信息;Obtaining user login information, wherein the login information includes user biometric information for uniquely identifying user information;

根据所述用户登录信息获取基于所述用户生物识别信息生成的唯一识别信息;Acquire unique identification information generated based on the user's biometric information according to the user login information;

根据所述唯一识别信息解密存储有私钥的私钥keystore以获取私钥;Decrypting the private key keystore storing the private key according to the unique identification information to obtain the private key;

认证所述私钥和对应的公钥是否配对成功;Verify whether the private key and the corresponding public key are paired successfully;

若配对成功,则供用户登录。If the pairing is successful, the user will be asked to log in.

根据本发明实施例的一种具体实现方式,所述根据所述唯一识别信息解密存储有私钥的私钥keystore以获取私钥的步骤中的所述keystore的生成方法包括:According to a specific implementation of an embodiment of the present invention, the method for generating the keystore in the step of decrypting the private key keystore storing the private key according to the unique identification information to obtain the private key includes:

获取用户信息,所述用户信息包括用户生物识别信息;Acquiring user information, wherein the user information includes user biometric information;

根据加密算法加密所述用户生物识别信息生成唯一识别信息;Encrypt the user's biometric information according to an encryption algorithm to generate unique identification information;

根据唯一识别信息结合区块链加密方法加密私钥生成私钥keystore;Encrypt the private key based on the unique identification information and blockchain encryption method to generate a private keystore;

存储所述私钥keystore至本地存储器和服务器端。The private key keystore is stored in the local storage and the server.

根据本发明实施例的一种具体实现方式,所述根据加密算法加密所述用户生物识别信息生成唯一识别信息的步骤中的所述加密算法包括哈希算法或者椭圆曲线加密算法。According to a specific implementation manner of the embodiment of the present invention, the encryption algorithm in the step of encrypting the user biometric information according to an encryption algorithm to generate unique identification information includes a hash algorithm or an elliptic curve encryption algorithm.

根据本发明实施例的一种具体实现方式,所述获取用户信息的步骤之后还包括:According to a specific implementation of the embodiment of the present invention, after the step of obtaining user information, the step further includes:

根据所述用户信息在区块链服务上生成配对的私钥和公钥;Generate a paired private key and public key on the blockchain service according to the user information;

保存所述公钥至服务器端。The public key is saved to the server.

根据本发明实施例的一种具体实现方式,所述认证所述私钥和对应的公钥是否配对成功的方法包括:According to a specific implementation of an embodiment of the present invention, the method for verifying whether the private key and the corresponding public key are successfully paired includes:

根据所述私钥加密随机字符串生成用户签名串;Encrypting a random string according to the private key to generate a user signature string;

获取与私钥配对的公钥,并根据所述公钥对随机字符串生成服务端签名串;Obtain a public key paired with a private key, and generate a server-side signature string based on the public key pair of random strings;

比对所述用户签名串和所述服务端签名串是否一致。Compare the user signature string and the server signature string to see if they are consistent.

第二方面,本发明实施例提供了一种keystore生成方法,所述keystore生成方法包括:In a second aspect, an embodiment of the present invention provides a keystore generation method, the keystore generation method comprising:

获取用户信息,所述用户信息包括用户生物识别信息;Acquiring user information, wherein the user information includes user biometric information;

根据所述用户生物识别信息结合加密算法加密生成唯一识别信息;Generate unique identification information based on the user's biometric information and encryption algorithm;

根据唯一识别信息结合区块链加密方法加密私钥生成私钥keystore;Encrypt the private key based on the unique identification information and blockchain encryption method to generate a private keystore;

保存所述私钥keystore至本地存储器和服务器端。The private key keystore is saved to the local storage and the server.

第三方面,一种基于区块链keystore安全登录系统,所述基于区块链keystore安全登录系统包括:In a third aspect, a blockchain keystore-based secure login system is provided, wherein the blockchain keystore-based secure login system comprises:

信息获取模块,用于获取用户登录信息,所述登录信息包括供唯一确认用户信息的用户生物识别信息;An information acquisition module, used to acquire user login information, wherein the login information includes user biometric information for uniquely confirming user information;

唯一识别信息获取模块,用于根据所述用户登录信息获取基于所述用户生物识别信息生成的唯一识别信息;A unique identification information acquisition module, used to acquire unique identification information generated based on the user's biometric information according to the user login information;

Keystore解密模块,用于根据所述唯一识别信息解密存储有私钥的私钥keystore以获取私钥;A keystore decryption module, used for decrypting a private key keystore storing a private key according to the unique identification information to obtain the private key;

认证模块,用于认证所述私钥和对应的公钥是否配对成功;An authentication module, used to authenticate whether the private key and the corresponding public key are successfully paired;

登录模块,用于在配对成功时供用户登录。The login module is used to log in the user when pairing is successful.

根据本发明实施例的一种具体实现方式,所述基于区块链keystore安全登录系统还包括Keystore生成模块,所述keystore生成模块包括:According to a specific implementation of an embodiment of the present invention, the blockchain keystore-based secure login system further includes a Keystore generation module, and the Keystore generation module includes:

用户信息获取单元,用于获取用户信息,所述用户信息包括用户生物识别信息;A user information acquisition unit, used to acquire user information, wherein the user information includes user biometric information;

唯一识别信息生成单元,用于根据加密算法加密所述用户生物识别信息生成唯一识别信息;A unique identification information generating unit, configured to generate unique identification information by encrypting the user biometric identification information according to an encryption algorithm;

Keystore生成单元,用于根据唯一识别信息结合区块链加密方法加密私钥生成私钥keystore;A keystore generation unit, used to generate a private keystore by encrypting a private key according to the unique identification information in combination with a blockchain encryption method;

存储单元,用于存储所述私钥keystore至本地存储器和服务器端。The storage unit is used to store the private key keystore in the local storage and the server.

第四方面,本发明实施例还提供了一种电子设备,该电子设备包括:In a fourth aspect, an embodiment of the present invention further provides an electronic device, the electronic device comprising:

至少一个处理器;以及,at least one processor; and,

与该至少一个处理器通信连接的存储器;其中,a memory communicatively connected to the at least one processor; wherein,

该存储器存储有可被该至少一个处理器执行的指令,该指令被该至少一个处理器执行,以使该至少一个处理器能够执行前述第一方面或第一方面的任一实现方式中的基于区块链私钥keystore安全登录方法。The memory stores instructions that can be executed by the at least one processor, and the instructions are executed by the at least one processor so that the at least one processor can execute the blockchain private key keystore-based secure login method in the aforementioned first aspect or any implementation of the first aspect.

第四方面,本发明实施例还提供了一种非暂态计算机可读存储介质,该非暂态计算机可读存储介质存储计算机指令,该计算机指令用于使该计算机执行前述第一方面或第一方面的任一实现方式中的基于区块链私钥keystore安全登录方法。In a fourth aspect, an embodiment of the present invention further provides a non-transitory computer-readable storage medium, which stores computer instructions, and the computer instructions are used to enable the computer to execute the blockchain private key keystore-based secure login method in the aforementioned first aspect or any implementation of the first aspect.

第五方面,本发明实施例还提供了一种计算机程序产品,该计算机程序产品包括存储在非暂态计算机可读存储介质上的计算程序,该计算机程序包括程序指令,当该程序指令被计算机执行时,使该计算机执行前述第一方面或第一方面的任一实现方式中的基于区块链私钥keystore安全登录方法。In the fifth aspect, an embodiment of the present invention further provides a computer program product, which includes a computer program stored on a non-transitory computer-readable storage medium, and the computer program includes program instructions. When the program instructions are executed by a computer, the computer executes the blockchain private key keystore-based secure login method in the aforementioned first aspect or any implementation of the first aspect.

本发明实施例中的基于区块链私钥keystore安全登录方法,所述基于区块链私钥keystore安全登录方法包括:获取用户登录信息,所述登录信息包括供唯一确认用户信息的用户生物识别信息;根据所述用户登录信息获取基于所述用户生物识别信息生成的唯一识别信息;根据所述唯一识别信息解密存储有私钥的私钥keystore以获取私钥;认证所述私钥和对应的公钥是否配对成功;若配对成功,则供用户登录。本发明的方案利用生物识别技术获取唯一密码加密私钥生成keystore提供安全性。当keystore丢失时,由于无法获取用户生物识别信息而无法解密keystore,从而保障系统的安全性。The blockchain private key keystore secure login method in the embodiment of the present invention comprises: obtaining user login information, the login information includes user biometric information for uniquely confirming user information; obtaining unique identification information generated based on the user biometric information according to the user login information; decrypting the private key keystore storing the private key according to the unique identification information to obtain the private key; authenticating whether the private key and the corresponding public key are paired successfully; if the pairing is successful, the user is allowed to log in. The solution of the present invention uses biometric technology to obtain a unique password to encrypt the private key to generate a keystore to provide security. When the keystore is lost, the keystore cannot be decrypted because the user's biometric information cannot be obtained, thereby ensuring the security of the system.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1为本发明实施例提供的一种基于区块链私钥keystore安全登录方法流程示意图;FIG1 is a schematic diagram of a method for securely logging in to a blockchain private keystore provided by an embodiment of the present invention;

图2为本发明实施例提供的一种基于区块链私钥keystore安全登录方法流程示意图;FIG2 is a schematic diagram of a method for secure login based on a blockchain private keystore provided by an embodiment of the present invention;

图3为本发明实施例提供的一种基于区块链私钥keystore安全登录系统模块图;FIG3 is a module diagram of a blockchain private keystore-based secure login system provided by an embodiment of the present invention;

图4为本发明实施例提供的电子设备示意图。FIG. 4 is a schematic diagram of an electronic device provided by an embodiment of the present invention.

本发明目的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The purpose, features and advantages of the present invention will be further described with reference to the accompanying drawings in conjunction with the embodiments.

具体实施方式DETAILED DESCRIPTION

下面结合附图对本发明实施例进行详细描述。The embodiments of the present invention are described in detail below with reference to the accompanying drawings.

以下通过特定的具体实例说明本发明的实施方式,本领域技术人员可由本说明书所揭露的内容轻易地了解本发明的其他优点与功效。显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。本发明还可以通过另外不同的具体实施方式加以实施或应用,本说明书中的各项细节也可以基于不同观点与应用,在没有背离本发明的精神下进行各种修饰或改变。需说明的是,在不冲突的情况下,以下实施例及实施例中的特征可以相互组合。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following describes the embodiments of the present invention through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the contents disclosed in this specification. Obviously, the described embodiments are only part of the embodiments of the present invention, rather than all of the embodiments. The present invention can also be implemented or applied through other different specific embodiments, and the details in this specification can also be modified or changed in various ways based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that the following embodiments and features in the embodiments can be combined with each other without conflict. Based on the embodiments in the present invention, all other embodiments obtained by ordinary technicians in this field without making creative work belong to the scope of protection of the present invention.

需要说明的是,下文描述在所附权利要求书的范围内的实施例的各种方面。应显而易见,本文中所描述的方面可体现于广泛多种形式中,且本文中所描述的任何特定结构及/或功能仅为说明性的。基于本发明,所属领域的技术人员应了解,本文中所描述的一个方面可与任何其它方面独立地实施,且可以各种方式组合这些方面中的两者或两者以上。举例来说,可使用本文中所阐述的任何数目个方面来实施设备及/或实践方法。另外,可使用除了本文中所阐述的方面中的一或多者之外的其它结构及/或功能性实施此设备及/或实践此方法。It should be noted that various aspects of the embodiments within the scope of the appended claims are described below. It should be apparent that the aspects described herein can be embodied in a wide variety of forms, and any specific structure and/or function described herein is merely illustrative. Based on the present invention, it should be understood by those skilled in the art that an aspect described herein can be implemented independently of any other aspect, and two or more of these aspects can be combined in various ways. For example, any number of aspects described herein can be used to implement the device and/or practice the method. In addition, other structures and/or functionalities other than one or more of the aspects described herein can be used to implement this device and/or practice this method.

还需要说明的是,以下实施例中所提供的图示仅以示意方式说明本发明的基本构想,图式中仅显示与本发明中有关的组件而非按照实际实施时的组件数目、形状及尺寸绘制,其实际实施时各组件的型态、数量及比例可为一种随意的改变,且其组件布局型态也可能更为复杂。It should also be noted that the illustrations provided in the following embodiments are only schematic illustrations of the basic concept of the present invention. The drawings only show components related to the present invention rather than being drawn according to the number, shape and size of components in actual implementation. In actual implementation, the type, quantity and proportion of each component may be changed arbitrarily, and the component layout may also be more complicated.

另外,在以下描述中,提供具体细节是为了便于透彻理解实例。然而,所属领域的技术人员将理解,可在没有这些特定细节的情况下实践所述方面。Additionally, in the following description, specific details are provided to facilitate a thorough understanding of the examples. However, one skilled in the art will appreciate that the aspects described may be practiced without these specific details.

本发明实施例提供一种基于区块链私钥keystore安全登录方法。本实施例提供的基于区块链私钥keystore安全登录方法可以由一计算装置来执行,该计算装置可以实现为软件,或者实现为软件和硬件的组合,该计算装置可以集成设置在服务器、终端设备等中。The embodiment of the present invention provides a blockchain-based private key keystore secure login method. The blockchain-based private key keystore secure login method provided in this embodiment can be executed by a computing device, which can be implemented as software, or as a combination of software and hardware, and the computing device can be integrated in a server, terminal device, etc.

本发明实施例涉及的相关术语解释说明:Explanation of relevant terms involved in the embodiments of the present invention:

1、区块链公钥私钥1. Blockchain public key and private key

公钥是与私钥算法一起使用的密钥对的非秘密一半。公钥通常用于加密会话密钥、验证数字签名,或加密可以用相应的私钥解密的数据。公钥和私钥是通过一种算法得到的一个密钥对(即一个公钥和一个私钥),其中的一个向外界公开,称为公钥;另个自己保留,称为私钥。通过这种算法得到的密钥对能保证在世界范围内是唯一的。使用这个密钥对的时候,如果用其中一个密钥加密一段数据,必须用另一个密钥解密。如用公钥加密数据就必须用私钥解密,如果用私钥加密也必须用公钥解密,否则解密将不会成功。The public key is the non-secret half of a key pair used with a private key algorithm. Public keys are often used to encrypt session keys, verify digital signatures, or encrypt data that can be decrypted with the corresponding private key. The public key and private key are a key pair (i.e., a public key and a private key) obtained through an algorithm, one of which is made public to the outside world, called the public key; the other is kept to oneself, called the private key. The key pair obtained by this algorithm is guaranteed to be unique worldwide. When using this key pair, if one of the keys is used to encrypt a piece of data, the other key must be used to decrypt it. If the data is encrypted with the public key, it must be decrypted with the private key. If it is encrypted with the private key, it must also be decrypted with the public key, otherwise the decryption will not be successful.

公钥加密算法中使用两个密钥,而不是使用一个共享的密钥。一个密钥是公钥(public key),一个密钥是私钥(private key)。用公钥加密的密文只能用对应私钥解密,反之,用私钥加密的密文只能用对应公钥解密。Public key encryption algorithms use two keys instead of a shared key. One key is a public key and the other is a private key. Ciphertext encrypted with a public key can only be decrypted with the corresponding private key, and vice versa, ciphertext encrypted with a private key can only be decrypted with the corresponding public key.

公钥加密,也叫非对称(密钥)加密(public key encryption),属于通信科技下的网络安全二级学科,指的是由对应的一对唯一性密钥(即公开密钥和私有密钥)组成的加密方法。它解决了密钥的发布和管理问题,是商业密码的核心。在公钥加密体制中,没有公开的是私钥,公开的是公钥。Public key encryption, also known as asymmetric (key) encryption, is a secondary discipline of network security under communication technology. It refers to an encryption method consisting of a pair of corresponding unique keys (i.e., a public key and a private key). It solves the problem of key issuance and management and is the core of commercial cryptography. In the public key encryption system, the private key is not disclosed, and the public key is disclosed.

2、生物识别技术。2. Biometric technology.

所谓生物识别技术就是,通过计算机与光学、声学、生物传感器和生物统计学原理等高科技手段密切结合,利用人体固有的生理特性,(如指纹、脸象、虹膜等)和行为特征(如笔迹、声音、步态等)来进行个人身份的鉴定。The so-called biometric technology is to identify personal identity by closely combining computers with high-tech means such as optics, acoustics, biosensors and biostatistics principles, using the inherent physiological characteristics of the human body (such as fingerprints, facial images, irises, etc.) and behavioral characteristics (such as handwriting, voice, gait, etc.).

生物识别系统对生物特征进行取样,提取其特征并且转化成数字代码,并进一步将这些代码组成特征模板。由于微处理器及各种电子元器件成本不断下降,精度逐渐提高,生物识别系统逐渐应用于商业上的授权控制如门禁、企业考勤管理系统安全认证等领域。用于生物识别的生物特征有手形、指纹、脸形、虹膜、视网膜、脉搏、耳廓等,行为特征有签字、声音、按键力度等。基于这些特征,人们已经发展了手形识别、指纹识别、面部识别、发音识别、虹膜识别、签名识别等多种生物识别技术。The biometric system samples biological features, extracts their features and converts them into digital codes, and further combines these codes into feature templates. As the cost of microprocessors and various electronic components continues to decline and the accuracy gradually increases, biometric systems are gradually applied to commercial authorization control such as access control, enterprise attendance management system security authentication and other fields. The biological features used for biometrics include hand shape, fingerprint, face shape, iris, retina, pulse, auricle, etc., and behavioral features include signature, sound, key strength, etc. Based on these features, people have developed a variety of biometric technologies such as hand shape recognition, fingerprint recognition, face recognition, pronunciation recognition, iris recognition, signature recognition, etc.

由于人体特征具有人体所固有的不可复制的独一性,这一生物密钥无法复制,失窃或被遗忘,利用生物识别技术进行身份认定,安全、可靠、准确。而常见的口令、IC卡、条纹码、磁卡或钥匙则存在着丢失、遗忘、复制及被盗用诸多不利因素。因此采用生物"钥匙",您可以不必携带大串的钥匙,也不用费心去记或更换密码。而系统管理员更不必因忘记密码而束手无策。生物识别技术产品均借助于现代计算机技术实现,很容易配合电脑和安全、监控、管理系统整合,实现自动化管理。Because human characteristics are unique and cannot be copied, this biological key cannot be copied, stolen or forgotten. Using biometric technology for identity identification is safe, reliable and accurate. Common passwords, IC cards, bar codes, magnetic cards or keys have many disadvantages such as loss, forgetting, copying and theft. Therefore, with the use of biological "keys", you don't have to carry a bunch of keys, nor do you have to bother to remember or change passwords. And system administrators don't have to be helpless because of forgotten passwords. Biometric technology products are all realized with the help of modern computer technology, and it is easy to integrate with computers and security, monitoring and management systems to achieve automated management.

3.Hash算法3. Hash Algorithm

哈希算法(Hash)又称摘要算法(Digest),它的作用是:对任意一组输入数据进行计算,得到一个固定长度的输出摘要。哈希算法的特性:Hash algorithm is also called digest algorithm. Its function is to calculate any set of input data and obtain an output digest of fixed length. Characteristics of hash algorithm:

1)单向不可逆1) One-way irreversible

哈希(Hash)算法是一种单向密码体制,即只有加密过程,没有解密过程。Hash algorithm is a one-way cryptographic system, that is, there is only an encryption process but no decryption process.

2)可重复性2) Repeatability

相同输入经过同一哈希函数得到相同散列值,但并非散列值相同则输入结果相同。The same input will get the same hash value when it passes through the same hash function, but the same hash value does not necessarily mean the input result is the same.

4.椭圆曲线密码学4. Elliptic Curve Cryptography

椭圆曲线密码学(英语:Elliptic curve cryptography,缩写为ECC),一种建立公开密钥加密的算法,基于椭圆曲线数学。椭圆曲线在密码学中的使用是在1985年由NealKoblitz和Victor Miller分别独立提出的。Elliptic curve cryptography (ECC) is an algorithm for establishing public key encryption based on elliptic curve mathematics. The use of elliptic curves in cryptography was independently proposed by Neal Koblitz and Victor Miller in 1985.

ECC的主要优势是在某些情况下它比其他的方法使用更小的密钥——比如RSA加密算法——提供相当的或更高等级的安全。ECC的另一个优势是可以定义群之间的双线性映射,基于Weil对或是Tate对;双线性映射已经在密码学中发现了大量的应用,例如基于身份的加密。其缺点是同长度密钥下加密和解密操作的实现比其他机制花费的时间长,但由于可以使用更短的密钥达到同级的安全程度,所以同级安全程度下速度相对更快。一般认为140比特的椭圆曲线密钥提供的安全强度与1024比特RSA密钥相当。The main advantage of ECC is that in some cases it can provide equivalent or higher levels of security using smaller keys than other methods, such as the RSA encryption algorithm. Another advantage of ECC is that bilinear maps between groups can be defined, based on Weil pairs or Tate pairs; bilinear maps have found a large number of applications in cryptography, such as identity-based encryption. Its disadvantage is that encryption and decryption operations take longer to implement with keys of the same length than other mechanisms, but since shorter keys can be used to achieve the same level of security, it is relatively faster for the same level of security. It is generally believed that the security strength provided by a 140-bit elliptic curve key is equivalent to that of a 1024-bit RSA key.

参见图1,本发明实施例提高一种keystore生成方法,所述keystore生成方法包括:Referring to FIG. 1 , an embodiment of the present invention provides a keystore generation method, the keystore generation method comprising:

步骤S101,获取用户信息,所述用户信息包括用户生物识别信息;Step S101, obtaining user information, wherein the user information includes user biometric information;

所述获取用户信息的步骤之后还包括:The step of obtaining user information further includes:

根据所述用户信息在区块链服务上生成配对的私钥和公钥;Generate a paired private key and public key on the blockchain service according to the user information;

保存所述公钥至服务器端。The public key is saved to the server.

本实施例中,公钥与私钥是一对,如果用公钥对数据进行加密,只有用对应的私钥才能解密;如果用私钥对数据进行加密,那么只有用对应的公钥才能解密。因为加密和解密使用的是两个不同的密钥,所以这种算法叫作非对称加密算法。非对称加密算法实现机密信息交换的基本过程是:甲方生成一对密钥并将其中的一把作为公钥向其它方公开;得到该公钥的乙方使用该密钥对机密信息进行加密后再发送给甲方;甲方再用自己保存的另一把专用密钥对加密后的信息进行解密。另一方面,甲方可以使用乙方的公钥对机密信息进行签名后再发送给乙方;乙方再用自己的私匙对数据进行验签。In this embodiment, the public key and the private key are a pair. If the data is encrypted with the public key, it can only be decrypted with the corresponding private key; if the data is encrypted with the private key, it can only be decrypted with the corresponding public key. Because two different keys are used for encryption and decryption, this algorithm is called an asymmetric encryption algorithm. The basic process of implementing confidential information exchange with an asymmetric encryption algorithm is: Party A generates a pair of keys and discloses one of them as a public key to other parties; Party B, who obtains the public key, uses the key to encrypt confidential information and then sends it to Party A; Party A then uses another private key that it keeps to decrypt the encrypted information. On the other hand, Party A can use Party B's public key to sign confidential information and then send it to Party B; Party B then uses its own private key to verify the signature of the data.

用户向服务方提供身份信息进行注册,服务方收到请求后验证信息并调用区块链服务生成公钥私钥。公钥存储在服务器,私钥下发给用户。此环节之后,服务器再无私钥信息,即使服务器用户数据被盗,也无法获取用户私钥,从而确保用户登录信息的安全性。The user provides the service provider with identity information to register. After receiving the request, the service provider verifies the information and calls the blockchain service to generate a public key and a private key. The public key is stored on the server, and the private key is sent to the user. After this step, the server no longer has private key information. Even if the server user data is stolen, the user's private key cannot be obtained, thus ensuring the security of the user's login information.

步骤S102,根据所述用户生物识别信息结合加密算法加密生成唯一识别信息;Step S102, encrypting the user's biometric information with an encryption algorithm to generate unique identification information;

步骤S103,根据唯一识别信息结合区块链加密方法加密私钥生成私钥keystore;Step S103, encrypting the private key according to the unique identification information and the blockchain encryption method to generate a private keystore;

步骤S104,保存所述私钥keystore至本地存储器和服务器端。Step S104, saving the private key keystore to the local storage and the server.

用户调用生物识别技术获取用户人脸、指纹、体态等生物特有信息,通过HasH算法和椭圆曲线加密算法进行计算、加密等操作生成唯一识别信息,此唯一识别信息不进行存储,每次通过需要使用时调用生物识别技术获取。The user calls biometric technology to obtain the user's face, fingerprint, body shape and other biological information, and uses the HasH algorithm and elliptic curve encryption algorithm to perform calculations, encryption and other operations to generate unique identification information. This unique identification information is not stored and is obtained by calling biometric technology each time it is needed.

利用用户唯一识别信息作为密码,使用区块链技术,加密私钥生成keystore。将生成的keystore本地进行持久化存储同时将生成的keystore存储到服务器端。The user's unique identification information is used as the password, and the blockchain technology is used to encrypt the private key to generate the keystore. The generated keystore is persistently stored locally and stored on the server.

keystore就是私钥的再加密形式,在区块链钱包中导出keystore时,通常会提示用户输入密码,这个密码就是对私钥进行一次再加密,只要密码不丢失,得到的keystore文件就可以在任意网络环境下传播。其他用户即使拿到keystore文件,但是没有密码一样也无法恢复出私钥。The keystore is a re-encrypted form of the private key. When exporting the keystore in the blockchain wallet, the user is usually prompted to enter a password. This password is used to re-encrypt the private key. As long as the password is not lost, the keystore file can be spread in any network environment. Even if other users get the keystore file, they cannot recover the private key without the password.

本发明实施例采用区块链keystore技术存储私钥,利用生物识别技术获取唯一密码加密私钥生成keystore提供安全性。当keystore丢失时,由于无法获取用户生物识别信息而无法解密keystore,从而保障系统的安全性。The embodiment of the present invention adopts blockchain keystore technology to store private keys, and uses biometric technology to obtain a unique password to encrypt the private key to generate a keystore to provide security. When the keystore is lost, the keystore cannot be decrypted because the user's biometric information cannot be obtained, thereby ensuring the security of the system.

基于上述实施例,参照图2,本发明实施例还提供的一种基于区块链私钥keystore安全登录方法,所述基于区块链私钥keystore安全登录方法包括:Based on the above embodiment, with reference to FIG2 , an embodiment of the present invention further provides a blockchain-based private key keystore secure login method, the blockchain-based private key keystore secure login method comprising:

步骤S201,获取用户登录信息,所述登录信息包括供唯一确认用户信息的用户生物识别信息;Step S201, obtaining user login information, wherein the login information includes user biometric information for uniquely confirming user information;

用户录入登录信息,登录信息包括用户基本身份信息,基本身份信息在用户注册时进行限定,可以限定使用相关身份号码注册、或者手机号码、或者其他相关信息。其中还包括可以唯一确认用户信息的用户生物识别信息,用户生物识别信息包括指纹、脸象、虹膜等。The user enters login information, which includes the user's basic identity information. The basic identity information is limited when the user registers, and can be limited to registration with a related identity number, or a mobile phone number, or other related information. It also includes the user's biometric information that can uniquely confirm the user's information, including fingerprints, facial images, irises, etc.

步骤S202,根据所述用户登录信息获取基于所述用户生物识别信息生成的唯一识别信息;Step S202, obtaining unique identification information generated based on the user's biometric information according to the user login information;

用户调用生物识别技术获取用户人脸、指纹、体态等生物特有信息,通过HasH算法和椭圆曲线加密算法进行计算、加密等操作生成唯一识别信息,此唯一识别信息不进行存储,每次通过需要使用时调用生物识别技术获取。The user calls biometric technology to obtain the user's face, fingerprint, body shape and other biological information, and uses the HasH algorithm and elliptic curve encryption algorithm to perform calculations, encryption and other operations to generate unique identification information. This unique identification information is not stored and is obtained by calling biometric technology each time it is needed.

步骤S203,根据所述唯一识别信息解密存储有私钥的私钥keystore以获取私钥;Step S203, decrypting the private key keystore storing the private key according to the unique identification information to obtain the private key;

用户调用生物识别技术获取用户唯一识别信息,利用用户唯一识别信息解密keystore获取用户私钥。The user uses biometric technology to obtain the user's unique identification information, and uses the user's unique identification information to decrypt the keystore to obtain the user's private key.

步骤S204,认证所述私钥和对应的公钥是否配对成功;Step S204, verifying whether the private key and the corresponding public key are paired successfully;

步骤S205,若配对成功,则供用户登录。Step S205: If the pairing is successful, the user is allowed to log in.

调用服务端认证接口,将随机字符串和签名串上传到服务端,服务端使用配对公钥对随机字符串进行签名,比对服务端签名串和用户签名串,俩个签名串一致则认证通过。Call the server authentication interface, upload the random string and signature string to the server, the server uses the paired public key to sign the random string, compares the server signature string with the user signature string, and the authentication is successful if the two signature strings are consistent.

与上面的方法实施例相对应,参见图3,本发明实施例还提供了一种基于区块链keystore安全登录系统,所述基于区块链keystore安全登录系统包括:Corresponding to the above method embodiment, referring to FIG3 , an embodiment of the present invention further provides a blockchain keystore-based secure login system, the blockchain keystore-based secure login system comprising:

信息获取模块201,用于获取用户登录信息,所述登录信息包括供唯一确认用户信息的用户生物识别信息;The information acquisition module 201 is used to acquire user login information, wherein the login information includes user biometric information for uniquely confirming user information;

唯一识别信息获取模块203,用于根据所述用户登录信息获取基于所述用户生物识别信息生成的唯一识别信息;A unique identification information acquisition module 203, configured to acquire unique identification information generated based on the user's biometric identification information according to the user login information;

Keystore解密模块203,用于根据所述唯一识别信息解密存储有私钥的私钥keystore以获取私钥;Keystore decryption module 203, used to decrypt the private key keystore storing the private key according to the unique identification information to obtain the private key;

认证模块204,用于认证所述私钥和对应的公钥是否配对成功;An authentication module 204 is used to authenticate whether the private key and the corresponding public key are paired successfully;

登录模块205,用于在配对成功时供用户登录。The login module 205 is used for allowing the user to log in when the pairing is successful.

所述基于区块链keystore安全登录系统还包括Keystore生成模块,所述keystore生成模块包括:The blockchain keystore-based secure login system also includes a Keystore generation module, which includes:

用户信息获取单元,用于获取用户信息,所述用户信息包括用户生物识别信息;A user information acquisition unit, used to acquire user information, wherein the user information includes user biometric information;

唯一识别信息生成单元,用于根据加密算法加密所述用户生物识别信息生成唯一识别信息;A unique identification information generating unit, configured to generate unique identification information by encrypting the user biometric identification information according to an encryption algorithm;

Keystore生成单元,用于根据唯一识别信息结合区块链加密方法加密私钥生成私钥keystore;A keystore generation unit, used to generate a private keystore by encrypting a private key according to the unique identification information in combination with a blockchain encryption method;

存储单元,用于存储所述私钥keystore至本地存储器和服务器端。The storage unit is used to store the private key keystore in the local storage and the server.

图3所示装置可以对应的执行上述方法实施例中的内容,本实施例未详细描述的部分,参照上述方法实施例中记载的内容,在此不再赘述。The device shown in FIG3 can correspondingly execute the contents in the above method embodiment. For the parts not described in detail in this embodiment, refer to the contents recorded in the above method embodiment and will not be described again here.

参见图4,本发明实施例还提供了一种电子设备40,该电子设备包括:Referring to FIG. 4 , an embodiment of the present invention further provides an electronic device 40, the electronic device comprising:

至少一个处理器;以及,at least one processor; and,

与该至少一个处理器通信连接的存储器;其中,a memory communicatively connected to the at least one processor; wherein,

该存储器存储有可被该至少一个处理器执行的指令,该指令被该至少一个处理器执行,以使该至少一个处理器能够执行前述方法实施例中的基于区块链私钥keystore安全登录方法的keystore生成方法。The memory stores instructions that can be executed by the at least one processor, and the instructions are executed by the at least one processor so that the at least one processor can execute the keystore generation method based on the blockchain private key keystore secure login method in the aforementioned method embodiment.

本发明实施例还提供了一种非暂态计算机可读存储介质,该非暂态计算机可读存储介质存储计算机指令,该计算机指令用于使该计算机执行前述方法实施例中的基于区块链私钥keystore安全登录方法的keystore生成方法。An embodiment of the present invention also provides a non-transitory computer-readable storage medium, which stores computer instructions, and the computer instructions are used to enable the computer to execute the keystore generation method based on the blockchain private key keystore secure login method in the aforementioned method embodiment.

本发明实施例还提供了一种计算机程序产品,该计算机程序产品包括存储在非暂态计算机可读存储介质上的计算程序,该计算机程序包括程序指令,当该程序指令被计算机执行时,使该计算机执行前述方法实施例中的的基于区块链私钥keystore安全登录方法的keystore生成方法。An embodiment of the present invention also provides a computer program product, which includes a computer program stored on a non-transitory computer-readable storage medium, and the computer program includes program instructions. When the program instructions are executed by a computer, the computer executes the keystore generation method based on the blockchain private key keystore secure login method in the aforementioned method embodiment.

下面参考图4,其示出了适于用来实现本发明实施例的电子设备40的结构示意图。本发明实施例中的电子设备可以包括但不限于诸如移动电话、笔记本电脑、数字广播接收器、PDA(个人数字助理)、PAD(平板电脑)、PMP(便携式多媒体播放器)、车载终端(例如车载导航终端)等等的移动终端以及诸如数字TV、台式计算机等等的固定终端。图4示出的电子设备仅仅是一个示例,不应对本发明实施例的功能和使用范围带来任何限制。Referring to FIG. 4 below, it shows a schematic diagram of the structure of an electronic device 40 suitable for implementing an embodiment of the present invention. The electronic device in the embodiment of the present invention may include, but is not limited to, mobile terminals such as mobile phones, laptop computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), vehicle-mounted terminals (such as vehicle-mounted navigation terminals), etc., and fixed terminals such as digital TVs, desktop computers, etc. The electronic device shown in FIG. 4 is only an example and should not bring any limitation to the functions and scope of use of the embodiments of the present invention.

如图4所示,电子设备40可以包括处理装置(例如中央处理器、图形处理器等)401,其可以根据存储在只读存储器(ROM)402中的程序或者从存储装置408加载到随机访问存储器(RAM)403中的程序而执行各种适当的动作和处理。在RAM 403中,还存储有电子设备40操作所需的各种程序和数据。处理装置401、ROM 402以及RAM 403通过总线404彼此相连。输入/输出(I/O)接口405也连接至总线404。As shown in FIG4 , the electronic device 40 may include a processing device (e.g., a central processing unit, a graphics processing unit, etc.) 401, which can perform various appropriate actions and processes according to a program stored in a read-only memory (ROM) 402 or a program loaded from a storage device 408 into a random access memory (RAM) 403. Various programs and data required for the operation of the electronic device 40 are also stored in the RAM 403. The processing device 401, the ROM 402, and the RAM 403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to the bus 404.

通常,以下装置可以连接至I/O接口405:包括例如触摸屏、触摸板、键盘、鼠标、图像传感器、麦克风、加速度计、陀螺仪等的输入装置406;包括例如液晶显示器(LCD)、扬声器、振动器等的输出装置407;包括例如磁带、硬盘等的存储装置408;以及通信装置409。通信装置409可以允许电子设备40与其他设备进行无线或有线通信以交换数据。虽然图中示出了具有各种装置的电子设备40,但是应理解的是,并不要求实施或具备所有示出的装置。可以替代地实施或具备更多或更少的装置。Typically, the following devices may be connected to the I/O interface 405: input devices 406 including, for example, a touch screen, a touchpad, a keyboard, a mouse, an image sensor, a microphone, an accelerometer, a gyroscope, etc.; output devices 407 including, for example, a liquid crystal display (LCD), a speaker, a vibrator, etc.; storage devices 408 including, for example, a magnetic tape, a hard disk, etc.; and communication devices 409. The communication device 409 may allow the electronic device 40 to communicate wirelessly or wired with other devices to exchange data. Although the electronic device 40 with various devices is shown in the figure, it should be understood that it is not required to implement or have all the devices shown. More or fewer devices may be implemented or have alternatively.

特别地,根据本发明的实施例,上文参考流程图描述的过程可以被实现为计算机软件程序。例如,本发明的实施例包括一种计算机程序产品,其包括承载在计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信装置409从网络上被下载和安装,或者从存储装置408被安装,或者从ROM 402被安装。在该计算机程序被处理装置401执行时,执行本发明实施例的方法中限定的上述功能。In particular, according to an embodiment of the present invention, the process described above with reference to the flowchart can be implemented as a computer software program. For example, an embodiment of the present invention includes a computer program product, which includes a computer program carried on a computer-readable medium, and the computer program includes a program code for executing the method shown in the flowchart. In such an embodiment, the computer program can be downloaded and installed from the network through the communication device 409, or installed from the storage device 408, or installed from the ROM 402. When the computer program is executed by the processing device 401, the above-mentioned functions defined in the method of the embodiment of the present invention are executed.

需要说明的是,本发明上述的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子可以包括但不限于:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本发明中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本发明中,计算机可读信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读信号介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:电线、光缆、RF(射频)等等,或者上述的任意合适的组合。It should be noted that the computer-readable medium of the present invention can be a computer-readable signal medium or a computer-readable storage medium or any combination of the above two. The computer-readable storage medium can be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device or device, or any combination of the above. More specific examples of computer-readable storage media can include, but are not limited to: an electrical connection with one or more wires, a portable computer disk, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the above. In the present invention, a computer-readable storage medium can be any tangible medium containing or storing a program that can be used by or in combination with an instruction execution system, device or device. In the present invention, a computer-readable signal medium can include a data signal propagated in a baseband or as part of a carrier wave, which carries a computer-readable program code. This propagated data signal can take a variety of forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the above. The computer readable signal medium may also be any computer readable medium other than a computer readable storage medium, which may send, propagate or transmit a program for use by or in conjunction with an instruction execution system, apparatus or device. The program code contained on the computer readable medium may be transmitted using any suitable medium, including but not limited to: wires, optical cables, RF (radio frequency), etc., or any suitable combination of the above.

上述计算机可读介质可以是上述电子设备中所包含的;也可以是单独存在,而未装配入该电子设备中。The computer-readable medium may be included in the electronic device, or may exist independently without being installed in the electronic device.

上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被该电子设备执行时,使得该电子设备:获取至少两个网际协议地址;向节点评价设备发送包括所述至少两个网际协议地址的节点评价请求,其中,所述节点评价设备从所述至少两个网际协议地址中,选取网际协议地址并返回;接收所述节点评价设备返回的网际协议地址;其中,所获取的网际协议地址指示内容分发网络中的边缘节点。The computer-readable medium carries one or more programs. When the one or more programs are executed by the electronic device, the electronic device: obtains at least two Internet Protocol addresses; sends a node evaluation request including the at least two Internet Protocol addresses to a node evaluation device, wherein the node evaluation device selects an Internet Protocol address from the at least two Internet Protocol addresses and returns it; receives the Internet Protocol address returned by the node evaluation device; wherein the obtained Internet Protocol address indicates an edge node in a content distribution network.

或者,上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被该电子设备执行时,使得该电子设备:接收包括至少两个网际协议地址的节点评价请求;从所述至少两个网际协议地址中,选取网际协议地址;返回选取出的网际协议地址;其中,接收到的网际协议地址指示内容分发网络中的边缘节点。Alternatively, the computer-readable medium carries one or more programs, and when the one or more programs are executed by the electronic device, the electronic device: receives a node evaluation request including at least two Internet Protocol addresses; selects an Internet Protocol address from the at least two Internet Protocol addresses; and returns the selected Internet Protocol address; wherein the received Internet Protocol address indicates an edge node in a content distribution network.

可以以一种或多种程序设计语言或其组合来编写用于执行本发明的操作的计算机程序代码,上述程序设计语言包括面向对象的程序设计语言—诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。Computer program code for performing the operations of the present invention may be written in one or more programming languages, or a combination thereof, including object-oriented programming languages, such as Java, Smalltalk, C++, and conventional procedural programming languages, such as "C" or similar programming languages. The program code may be executed entirely on the user's computer, partially on the user's computer, as a separate software package, partially on the user's computer and partially on a remote computer, or entirely on a remote computer or server. In cases involving a remote computer, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computer (e.g., through the Internet using an Internet service provider).

附图中的流程图和框图,图示了按照本发明各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flow chart and block diagram in the accompanying drawings illustrate the possible architecture, function and operation of the system, method and computer program product according to various embodiments of the present invention. In this regard, each square box in the flow chart or block diagram can represent a module, a program segment or a part of a code, and the module, the program segment or a part of the code contains one or more executable instructions for realizing the specified logical function. It should also be noted that in some alternative implementations, the functions marked in the square box can also occur in a sequence different from that marked in the accompanying drawings. For example, two square boxes represented in succession can actually be executed substantially in parallel, and they can sometimes be executed in the opposite order, depending on the functions involved. It should also be noted that each square box in the block diagram and/or flow chart, and the combination of the square boxes in the block diagram and/or flow chart can be implemented with a dedicated hardware-based system that performs the specified function or operation, or can be implemented with a combination of dedicated hardware and computer instructions.

描述于本发明实施例中所涉及到的单元可以通过软件的方式实现,也可以通过硬件的方式来实现。其中,单元的名称在某种情况下并不构成对该单元本身的限定,例如,第一获取单元还可以被描述为“获取至少两个网际协议地址的单元”。The units involved in the embodiments of the present invention may be implemented by software or hardware. The name of a unit does not limit the unit itself in some cases. For example, the first acquisition unit may also be described as a "unit for acquiring at least two Internet Protocol addresses".

应当理解,本发明的各部分可以用硬件、软件、固件或它们的组合来实现。It should be understood that various parts of the present invention can be implemented by hardware, software, firmware or a combination thereof.

以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以权利要求的保护范围为准。The above is only a specific embodiment of the present invention, but the protection scope of the present invention is not limited thereto. Any changes or substitutions that can be easily thought of by a person skilled in the art within the technical scope disclosed by the present invention should be included in the protection scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (3)

1. The blockchain private key keystore-based secure login method is characterized in that the blockchain private key keystore-based secure login method comprises the following steps:
Acquiring user login information, wherein the user login information comprises user biological identification information for uniquely identifying the user information;
acquiring unique identification information generated based on the user biological identification information according to the user login information;
decrypting the private key keystore stored with the private key according to the unique identification information to obtain the private key;
authenticating whether the private key and the corresponding public key are successfully paired;
if the pairing is successful, the user is logged in;
The generating method of keystore in the step of decrypting the private key keystore stored with the private key according to the unique identification information to obtain the private key includes:
acquiring user information, wherein the user information comprises user biological identification information;
encrypting the user biological identification information according to an encryption algorithm to generate unique identification information; the unique identification information is not stored, and the biological identification technology is called for obtaining when the unique identification information is used every time;
Encrypting the private key according to the unique identification information by combining the blockchain encryption method to generate a private key keystore; keystore is a re-encrypted version of the private key;
storing the private key keystore to a local memory and a server side;
The encryption algorithm in the step of encrypting the user biometric information according to an encryption algorithm to generate unique identification information includes a hash algorithm or an elliptic curve encryption algorithm;
The step of obtaining the user information further comprises the following steps:
generating a matched private key and a matched public key on a blockchain service according to the user information;
storing the public key to a server side; the private key is issued to the user;
The method for authenticating whether the private key and the corresponding public key are successfully paired comprises the following steps:
Generating a user signature string according to the private key encryption random character string;
Obtaining a public key paired with a private key, and generating a server signature string for the random character string according to the public key;
And comparing whether the user signature string is consistent with the server signature string.
2. An electronic device, the electronic device comprising:
At least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores instructions executable by the at least one processor to enable the at least one processor to perform the blockchain-based private key keystore secure login method of claim 1.
3. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the blockchain-based private key keystore secure login method of preceding claim 1.
CN202111178401.2A 2021-10-10 2021-10-10 Blockchain-based private key keystore secure login method, electronic device, storage medium Active CN113904850B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111178401.2A CN113904850B (en) 2021-10-10 2021-10-10 Blockchain-based private key keystore secure login method, electronic device, storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111178401.2A CN113904850B (en) 2021-10-10 2021-10-10 Blockchain-based private key keystore secure login method, electronic device, storage medium

Publications (2)

Publication Number Publication Date
CN113904850A CN113904850A (en) 2022-01-07
CN113904850B true CN113904850B (en) 2024-09-27

Family

ID=79190819

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111178401.2A Active CN113904850B (en) 2021-10-10 2021-10-10 Blockchain-based private key keystore secure login method, electronic device, storage medium

Country Status (1)

Country Link
CN (1) CN113904850B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115987499B (en) * 2022-12-20 2024-08-02 蚂蚁区块链科技(上海)有限公司 Method and system for generating private key of user
CN116232741A (en) * 2023-03-15 2023-06-06 蚂蚁区块链科技(上海)有限公司 Account key setting method, user equipment and system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113051341A (en) * 2019-12-27 2021-06-29 浙江金融资产交易中心股份有限公司 User data storage system and method based on multiple block chains

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104901967A (en) * 2015-06-09 2015-09-09 四川省宁潮科技有限公司 Registration method for trusted device
KR20190063796A (en) * 2017-11-30 2019-06-10 주식회사 베프스 Identification apparatus and method based on biometric data for blockchain system
CN111414599A (en) * 2020-02-26 2020-07-14 北京奇艺世纪科技有限公司 Identity authentication method, device, terminal, server and readable storage medium
CN111526021A (en) * 2020-04-10 2020-08-11 厦门慢雾科技有限公司 Block chain private key security management method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113051341A (en) * 2019-12-27 2021-06-29 浙江金融资产交易中心股份有限公司 User data storage system and method based on multiple block chains

Also Published As

Publication number Publication date
CN113904850A (en) 2022-01-07

Similar Documents

Publication Publication Date Title
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US10268809B2 (en) Multi-factor user authentication framework using asymmetric key
TWI724683B (en) Computer-implemented method for managing user key pairs, system for managing user key pairs, and apparatus for managing user key pairs
US20200274859A1 (en) User authentication system with self-signed certificate and identity verification with offline root certificate storage
TWI578749B (en) Methods and apparatus for migrating keys
WO2020073513A1 (en) Blockchain-based user authentication method and terminal device
US11556617B2 (en) Authentication translation
WO2021190197A1 (en) Method and apparatus for authenticating biometric payment device, computer device and storage medium
US11868457B2 (en) Device and method for authenticating user and obtaining user signature using user's biometrics
KR102284396B1 (en) Method for generating pki keys based on bioinformation on blockchain network and device for using them
US9313185B1 (en) Systems and methods for authenticating devices
CN107395589A (en) Finger print information acquisition methods and terminal
TWI724681B (en) Managing cryptographic keys based on identity information
CN113904850B (en) Blockchain-based private key keystore secure login method, electronic device, storage medium
US9755840B2 (en) Backup and invalidation of authentication credentials
CN117795515A (en) Data recovery for computing devices
USRE49968E1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN119922013A (en) Identity authentication method, device, storage medium and electronic device
KR20210039735A (en) Method and apparatus for user authentication
Syahreen et al. A Systematic Review on Multi-Factor Authentication Framework.
CN116015900B (en) Data self-storage and self-verification method, device, equipment and storage medium
Franco et al. A High-Level-of-Assurance EUDI Wallet with a Remote WSCD Supporting Biometrics and Passkeys
Qureshi et al. Enhancing Multifactor Authentication With Machine Learning: A Comprehensive Framework For Robust User Verification
CN117097508A (en) Method and device for cross-device security management of NFT (network File transfer protocol)
CN117675182A (en) Identity authentication method, system, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20250226

Address after: Unit 203, Unit 1, Building 1, No. 5 Keji West Road, High tech Zone, Shantou City, Guangdong Province, 515000

Patentee after: Shantou Pengda Information Technology Co.,Ltd.

Country or region after: China

Address before: 100123 Room 202, 2 / F, building F1, Dongyi International Media Industrial Park, No.8, Gaojing Cultural Park Road, Chaoyang District, Beijing

Patentee before: Puhua Yunchuang Technology (Beijing) Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right