Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key management method based on block chain

A key management and blockchain technology, applied in the field of blockchain-based key management, can solve the problems such as the sender and the receiver cannot receive information normally, unstable data reception, theft, etc., so as to reduce loss or theft. Possibility, security and more comprehensive access to records, the effect of transparency in key management

Pending Publication Date: 2021-11-12
佳乔(深圳)投资有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a blockchain-based key management method, which can effectively solve the problem that the current blockchain key management method proposed in the above background technology is confusing to the transmission mode, and it is easy for both the sender and the receiver to fail to receive the key after transmission. The required information, and the encryption method is inconsistent with the decryption method, the collection method is difficult, the data reception is unstable, and even the possible problem of theft occurs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Such as figure 1 As shown, the present invention provides a technical solution, a method for key management based on blockchain, comprising the following steps:

[0030] S1. Determine the sender and the receiver, determine the identity information of the two, and record them;

[0031] S2. The sender outputs the command. After the server receives the command, it encrypts, calculates and stores it with the receiver's public key, and then sends the ciphertext of the original text and the sender's signature;

[0032] S3. The ciphertext of the original text and the signature of the sender are transmitted to the receiver through the network, and the receiver selects the private key of the management terminal;

[0033] S4. The receiver decrypts the receiver's private key and uses the sender's private key for verification;

[0034] S5. After the verification is completed, the information is sent to the receiver at the same time, and the receiver interprets or stores the data ...

Embodiment 2

[0049] Such as figure 1 As shown, the present invention provides a technical solution, a method for key management based on blockchain, comprising the following steps:

[0050] S1. Determine the sender and the receiver, determine the identity information of the two, and record them;

[0051] S2. The sender outputs the command. After the server receives the command, it encrypts, calculates and stores it with the receiver's public key, and then sends the ciphertext of the original text and the sender's signature;

[0052] S3. The ciphertext of the original text and the signature of the sender are transmitted to the receiver through the network, and the receiver selects the private key of the management terminal;

[0053] S4. The receiver decrypts the receiver's private key and uses the sender's private key for verification;

[0054]S5. After the verification is completed, the information is sent to the receiver at the same time, and the receiver interprets or stores the data a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key management method based on a block chain, and the method comprises the following steps: S1, a sender and a receiver are determined, and the identity information of the sender and the receiver is determined and recorded; S2, the sender outputs an instruction, after a server receives the instruction, the public key of the receiver is used for encryption, calculation and storage, and then the ciphertext of the original text and the signature of the sender are sent; s3, the ciphertext of the original text and the signature of the sender are transmitted to a receiver through a network, and the receiver selects a private key of the management end; s4, the receiver decrypts the private key of the receiver and verifies the private key of the sender; s5, after verification is completed, the information is sent to the receivers at the same time, the receivers read or store the data after receiving the information, the data can be sent to the multiple receivers by determining the number of the senders, the senders can determine the uniqueness and the reading frequency of the data before sending. And the possibility of loss caused by forgetting to delete after data theft or multiple times of reading is reduced.

Description

technical field [0001] The invention relates to the technical field of blockchain key management, in particular to a blockchain-based key management method. Background technique [0002] Blockchain is a term in the field of information technology. In essence, it is a shared database in which the data or information stored has the characteristics of "unforgeable", "full trace", "traceable", "open and transparent", "collective Based on these characteristics, blockchain technology has laid a solid foundation of "trust", created a reliable "cooperation" mechanism, and has broad application prospects; [0003] However, the current blockchain key management method is confusing for the transmission method, and it is easy for the sender and the receiver to receive the required information after transmission, and the encryption method is inconsistent with the decryption method, which makes the collection method difficult and the data reception is not good. Stable phenomenon, even th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6218G06F21/64G06F2221/2107
Inventor 王保春张蛟鹏余洋莫恒
Owner 佳乔(深圳)投资有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products