A new type of hardware wallet with dismantling and self-destruction

A hardware and wallet technology, applied in the field of digital currency, can solve problems such as theft of private keys, interference of hardware wallets, memory tampering, etc., to achieve a wide monitoring range, improve security, and meet the effects of security protection

Active Publication Date: 2022-04-08
武汉卓目科技有限公司
View PDF21 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Hardware wallets generally use flash as a container for storing private keys. There is a risk that the private key may be obtained by disassembling the phone and directly reading the contents of the storage, that is, the private key is stolen from the local
In addition, in the face of special changes in the external environment, such as changes in voltage, temperature, frequency, etc., hardware wallets may be disturbed or memory tampered, causing security issues
At present, the common hardware wallets on the market include: Ledger, Trezor, keepKey, Kushen, etc. These hardware wallets do not have anti-demolition and self-destruction functions, and cannot prevent the private key in the hardware wallet from being stolen locally.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A new type of hardware wallet with dismantling and self-destruction
  • A new type of hardware wallet with dismantling and self-destruction
  • A new type of hardware wallet with dismantling and self-destruction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] see Figure 1 to Figure 3 , this embodiment discloses a new hardware wallet with self-destruction after dismantling, including a battery module, a control module, a fingerprint module, a button module, an OLED module, a safety monitoring module, a memory safety protection module, a storage module, a safety module, an application modules, communication modules, the battery module is used to supply power to all modules of the hardware wallet, and the fingerprint module, button module, OLED module, storage module, security module, application module, and communication module are respectively connected with the control module to realize the function of the hardware wallet The safety monitoring module and the memory safety protection module are respectively connected to the control module, and the safety monitoring module is used to monitor various types of attacks such as external physics and the environment, and transmit the monitored signals to the control module, The con...

Embodiment 2

[0030] The novel hardware wallet with dismantling and self-destruction of the present invention also includes an alarm module, which is connected to a control module, and the control module is used to control the alarm module to give an abnormal alarm prompt. Other technical features of this embodiment are the same as those of Embodiment 1.

[0031] The patent of the present invention mainly protects the storage module. For example, after the hardware wallet is disassembled, the hardware wallet of the present invention avoids this problem by dismantling and self-destructing the technical solution, that is, erasing the encrypted content in the storage module.

[0032] The working principle of the present invention is: an anti-demolition thimble is installed between the circuit board and the shell of the hardware wallet, and the anti-demolition thimble connects the voltage, clock and other signals on the circuit board through the shell, and the MCU monitors the change of the volt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a new hardware wallet with self-destruction after dismantling, including a power supply module, a control module, a safety monitoring module, a memory safety protection module, a storage module, a safety module, an application module, and a communication module. The hardware wallet supplies power, and the storage module, security module, application module, and communication module are respectively connected to the control module to realize the function of the hardware wallet; the security monitoring module is used to monitor various types of attacks and transmit the detected signals to the control module , the control module is used to judge whether the hardware wallet is under attack according to the signal detected by the security monitoring module. Clear the area in which key information and account information are saved. It improves the security and reliability of existing hardware wallets.

Description

technical field [0001] The invention relates to the field of digital currency, in particular to a novel hardware wallet with self-destruction when disassembled. Background technique [0002] Digital currency is an electronic form of alternative currency, such as the popular Bitcoin, Litecoin and PPCoin. These digital currencies rely on cryptography and verification technology. Each currency holder needs to keep at least one pair of private key and public key, which is the proof of personal digital assets. Mastering the private key is equivalent to mastering a person's bank account. Once the private key is stolen, all the property corresponding to the private key will be lost. In the field of digital currency, the importance of private keys is self-evident. [0003] The hardware wallet is a container for storing the private key. The private key is stored locally and the signature generated by the private key is provided externally, thus effectively avoiding the exposure of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/10G06Q20/36G06Q20/38
CPCG06Q20/105G06Q20/367G06Q20/3829
Inventor 周严杜飞飞毛立祥雷雨
Owner 武汉卓目科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products