Bidding method based on hierarchical deterministic cryptography
A cryptographic and deterministic technology, applied in the network field, it can solve the problem that the private key cannot be cracked by any public key, and achieve the effect of proper generation and storage, improving security transmission and ensuring security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] First, the third-party notary office uses a key generation tool based on HD technology to generate the root private key k, specifically including three steps:
[0039] Step 1: The third-party notary uses a key generation tool to randomly generate a mnemonic. Here we use BIP39Mnemonic. The BIP39 standard is to solve the demand for mnemonic by randomly generating 12-24 easy-to-remember words , the word sequence creates a random seed as the seed of BIP32 through the PBKDF2 and HMAC-SHA512 functions, and the steps are as follows:
[0040] First generate a random sequence (entropy) with a length of 128-256 bits (bits), then take the first n bits after the entropy hash as the checksum (n=entropy length / 32), take the random sequence + checksum, The obtained result is cut every 11 bits, and then each 11-bit byte is matched with a word in the thesaurus, and the final result is the mnemonic string.
[0041]For example, the mnemonic string we got is: "length energy hip enough set...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com