Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A self-destructing hardware wallet

A wallet and hardware technology, applied in the field of digital currency, can solve the problems of private key theft, hardware wallet interference, memory tampering, etc., to achieve a wide range of monitoring, meet security protection, and improve security.

Active Publication Date: 2022-04-08
武汉卓目科技有限公司
View PDF20 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Hardware wallets generally use ram as a container for storing private keys, and there is a risk that the private key may be obtained by disassembling the phone and directly reading the contents of the memory, that is, the private key is stolen from the local
In addition, in the face of special changes in the external environment, such as changes in voltage, temperature, frequency, etc., hardware wallets may be disturbed or memory tampered, causing security issues
At present, the common hardware wallets on the market include: Ledger, Trezor, keepKey, Kushen, etc. These hardware wallets do not have anti-demolition and self-destruction functions, and cannot prevent the private key in the hardware wallet from being stolen locally.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A self-destructing hardware wallet
  • A self-destructing hardware wallet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] see figure 1 and figure 2 , this embodiment discloses a self-destruction hardware wallet, including a battery module, a control module, a safety monitoring module, a memory power-off control module, a storage module, a security module, an application module, and a communication module. The entire hardware wallet is powered, and the storage module, security module, application module, and communication module are respectively connected with the control module to realize the function of the hardware wallet; the safety monitoring module and the memory power-off control module are respectively connected with the control module, and the safety monitoring The module is used to monitor various types of attacks, and transmits the detected signals to the control module, and the control module is used to judge whether the hardware wallet is attacked according to the signals detected by the security monitoring module. As the hardware wallet of the private key storage, if it is c...

Embodiment 2

[0030] The self-destruct hardware wallet of the present invention also includes an alarm module connected to a control module, and the control module is used to control the alarm module to give an abnormal alarm prompt. Other technical features of this embodiment are the same as those of Embodiment 1.

[0031] The patent of the present invention mainly protects the storage module. For example, after the hardware wallet is disassembled, the hardware wallet of the present invention avoids this problem through the technical solution of dismantling and self-destructing, that is, the trigger control module controls the memory power-off control module. Disconnect the power supply of the ram, the ram will be powered off, and the encrypted content in the ram will be automatically erased.

[0032] The working principle of the present invention is: an anti-demolition thimble is installed between the circuit board and the shell of the hardware wallet, and the anti-demolition thimble conn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a self-destruction hardware wallet, which includes a power supply module, a control module, a safety monitoring module, a storage module, a safety module, an application module, and a communication module. The storage module, the safety module, the application module, and the communication module are respectively connected with The control module is connected to realize the function of the hardware wallet; the security monitoring module is used to monitor various types of attacks, and the monitored signal is transmitted to the control module, and the control module is used to judge whether the hardware wallet is based on the signal detected by the security monitoring module. Under attack, use the ram with uninterrupted power supply as the memory. If it is confirmed that the hardware wallet is under attack, the control module is used to control the memory power-off control module to disconnect the power supply of the ram, control the power-off of the ram, and automatically erase the memory in the ram. Key information, account information. It improves the security and reliability of existing hardware wallets.

Description

technical field [0001] The invention relates to the field of digital currency, in particular to a self-destruction hardware wallet. Background technique [0002] Digital currency is an electronic form of alternative currency, such as the popular Bitcoin, Litecoin and PPCoin. These digital currencies rely on cryptography and verification technology. Each currency holder needs to keep at least one pair of private key and public key, which is the proof of personal digital assets. Mastering the private key is equivalent to mastering a person's bank account. Once the private key is stolen, all the property corresponding to the private key will be lost. In the field of digital currency, the importance of private keys is self-evident. [0003] The hardware wallet is a container for storing the private key. The private key is stored locally and the signature generated by the private key is provided externally, thus effectively avoiding the exposure of the private key in the networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/06G06Q20/38G06Q20/40H04L9/00H04L9/08
CPCG06Q20/065G06Q20/3829G06Q20/40145H04L9/0897H04L9/002H04L2209/56
Inventor 周严毛立祥杜飞飞雷雨
Owner 武汉卓目科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products