A daemon wallet block chain private key storage and encryption method

An encryption method and blockchain technology, applied in the field of master wallet blockchain private key storage and encryption, can solve problems such as theft of blockchain assets, and achieve the effect of avoiding data insecurity and loss

Inactive Publication Date: 2019-03-08
上海欢昶网络科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It may lead to the theft o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A daemon wallet block chain private key storage and encryption method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0026] Example 1: Please refer to figure 1 , A method for storing and encrypting the private key of the master wallet blockchain. The master wallet includes a hot wallet and a hardware wallet. The encryption method specifically includes the following steps:

[0027] A. The user opens the hardware package and enters the pin code;

[0028] B. The system generates random seeds and BIP mnemonics; and uses AES and user Pin code encryption, while the BIP mnemonics use utf8 encoding,

[0029] C. The hot wallet initiates a transaction, and the hot wallet obtains the data NeedSignData that needs to be signed;

[0030] D. The hot wallet generates a QR code according to NeedSignData;

[0031] E. Scan this QR code with hardware wallet;

[0032] F. The user enters the Pin code in the hardware wallet;

[0033] G, DEAES decoding to obtain mnemonic words;

[0034] H. The hardware wallet obtains the private key according to the Path information in the QR code, uses the private key to sign NeedSignData to ...

Example Embodiment

[0037] In Embodiment 2, on the basis of Embodiment 1, after the transaction is completed, the hardware wallet will write off the memory. Eventually ends the transaction process. This helps to release memory and speed up processing.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a daemon wallet block chain private key storage and encryption method, which belongs to the technical field of regional chains and comprises the following steps that A, a useropens a hardware packet and inputs a pin code; B, the system generates random seeds and BIP assistant words; C, the hot wallet initiates a transaction, and the hot wallet obtains data NeedSagnData needing to be signed; D, the hot wallet generates a two-dimensional code; E, the hardware wallet scans the two-dimensional code. The method has the beneficial effects that 1, the assistant word algorithmis random enough, so that data insecurity caused by pseudo-random is avoided; 2, the private key is generated by the BIP, so that the security of other private keys can be ensured even if a certain currency of private key is cracked; 3, the whole private key use process is not networked, so that a hacker is prevented from stealing the private key; 4, the BIP storage is encrypted by adopting AES and a user Pin code, so that the private key can be prevented from being cracked even if the hardware wallet is lost; 5, the data can be backed up/recovered, and the loss caused by hardware wallet lossis avoided.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a method for storing and encrypting private keys of a master wallet block chain. Background technique [0002] The rapid development of blockchain technology has made digital currency gradually come into the public's sight. At the end of 2017, this craze reached its peak. With the birth of various digital currencies, in order to facilitate users to record addresses and private keys, there are Some wallet applications do not synchronize all block data, and the private key is stored locally. Because the private key will touch the network, there is a serious security risk. [0003] The 360 ​​security team found an incorrect encrypted storage vulnerability in a well-known foreign hot wallet APP. The user created a new wallet and stored the wallet file unencrypted locally in the system. Attackers can read the stored wallet file and use reverse analysis techniques. , can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/06G06Q20/10G06Q20/36G06Q20/38G06Q40/04
CPCG06Q20/065G06Q20/105G06Q20/367G06Q20/3829G06Q40/04
Inventor 杨帆
Owner 上海欢昶网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products