Private key storage and reading method and device and hardware device

A hardware device and private key technology, applied in the field of information security, can solve the problems of data structure differences, poor versatility, and inability to apply private key storage of other currencies, so as to achieve the effect of small calculation and improved protection strength

Active Publication Date: 2018-11-16
成都同创佳联科技有限公司
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a private key storage and reading method, device and hardware equipment to solve the problem that the existing private key storage scheme based on the Ethereum keystore file cannot be applied to other currencies due to the difference in data structure between digital currencies Private key storage, the problem of poor versatility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private key storage and reading method and device and hardware device
  • Private key storage and reading method and device and hardware device
  • Private key storage and reading method and device and hardware device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application. The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0083] see figure 1 , which is a flowchart of a method for storing a private key provided in an embodiment of the present application, the method includes:

[0084] Step 101. Obtain the U...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses a private key storage and reading method and device and a hardware device. According to the private key storage and reading method and device and the hardwaredevice, confusion is carried out on sensitive data comprising private key and the like according to universal unique identification code of the hardware device and user passwords and the like to obtain matrix data for storage and reading; according to the scheme, confusion is only carried out in the aspect of data storage, so that computation amount is small; data is not encrypted, so that users can integrate any encryption algorithm based on the scheme to enhance protection of the private key; and the scheme is not limited by the data structure, can be applied to private key storage of various currencies, and is high in university.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a private key storage and reading method, device and hardware equipment. Background technique [0002] The concept of Bitcoin was first proposed by Satoshi Nakamoto in 2009, and it is a digital currency based on a P2P network. Blockchain is an important concept associated with Bitcoin. In a narrow sense, the blockchain is a chained data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be tamper-proof and unforgeable distributed ledgers. Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, uses cryptography to ensure the security of data transmission and access, and uses automated scripts to A new distributed infrastructure and computing method for programming and mani...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0866H04L9/0869H04L9/0897H04L9/3226H04L9/3239H04L2209/56
Inventor 郭磊黄何
Owner 成都同创佳联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products