Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for generating seeds and device thereof

A seed algorithm and seed technology, applied in the Internet field, can solve problems such as reducing seed security

Inactive Publication Date: 2019-01-08
SHANGHAI EKOOL INFORMATION TECH SERVICES CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the mnemonic password selected by the user has certain regularity. After the third party obtains the mnemonic word stored in plain text, it can use the key dictionary for collision. Existing high-performance computers and cloud computing have extremely strong collision capabilities. Hundreds of thousands or even faster collisions per second can be done, reducing seed security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating seeds and device thereof
  • Method for generating seeds and device thereof
  • Method for generating seeds and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] The seed generation method provided by the embodiment of the present invention can be applied to the application scenario of ensuring seed security in the digital asset security link, for example: the seed generation device obtains the algorithm key, and generates the target seed according to the algorithm key and the seed algorithm group algorithm sequence, and then obtain the input seed generation data, and finally input the seed generation data into t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a method for generating seeds and a device thereof. The method comprises the following steps: acquiring an algorithm key, generating a target seed algorithm sequence according to the algorithm key and a seed algorithm group, obtaining input seed generation data, and finally inputting the seed generation data into the target seed algorithm sequence to generate seeds corresponding to the seed generation data. In the concrete realization, the seed algorithm is generated by seed selection algorithm, the seed selection algorithm inputs the algorithm key, calculates the turn, the target seed algorithm group, outputs the target seed algorithm which the current computation turn adopts, all the computation turns of the target seed algorithm are combined intothe target seed algorithm sequence. By adopting the invention, the seeds are generated by the target seed algorithm sequence, the computational complexity of the seeds collided out by the third partythrough the seed generation data can be increased, and the safety of the seeds can be further improved.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a seed generating and restoring method and equipment thereof. Background technique [0002] In the field of Internet technology, asymmetric algorithms are used for digital signatures to ensure the integrity of transmitted information, determine the identity of the sender, and prevent denial of information and information-based transactions. During this process, the public key of the asymmetric algorithm can be disclosed to the outside world, and the private key must be kept by the person himself, and must not be leaked or lost. Therefore, it is particularly important to generate, back up and manage the key securely. In the prior art, the seeds are generated and backed up by generating data (mnemonic words and mnemonic word passwords) through the seeds, and subkeys for different purposes are generated through the seeds. For example, in the existing digital currency, the trans...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L9/0869H04L9/0894H04L9/0863
Inventor 孔燕斌
Owner SHANGHAI EKOOL INFORMATION TECH SERVICES CO LTD