Method and device for generating multi-signature wallet
A multi-signature and wallet technology, which is applied to instruments, payment systems, payment architectures, etc., can solve the problems of difficult application of multi-signature addresses, and achieve the effect of reducing management difficulty and improving ease of use.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0045]As can be seen from the above embodiments, the first embodiment of a method for generating a multi-signature wallet of the present application, the method includes: obtaining the number of participants of the multi-signature address; generating a public-private key pair of the initiator, and the public-private key The pair includes a public key and a private key; receive the public key of each participant; generate a multi-signature address based on each participant's public key and the initiator's public key, and send notification information to each participant's terminal, the The notification information includes the multi-signature address, the initiator's public key and the public keys of all participants; the participant's terminal receives the notification information, verifies the ownership of the participant's public key, and if the verification passes, the multi-signature The signature address is added to the multi-signature wallet. In the embodiment of the pre...
no. 4 example
[0053] As can be seen from the above embodiments, the fourth embodiment of a method for generating a multi-signature wallet of the present application, the third embodiment of a method for generating a multi-signature wallet, the step of verifying the ownership of the participant's public key Including: receiving the password input by the user, judging whether the password is the same as the local password; if they are the same, obtaining the private key of the participant, and generating the target public key according to the private key of the participant; judging whether the target public key is It is the same as the public key of the participant, if they are the same, the verification is passed. In the embodiment of the present application, the ownership of the public key of the participant is verified by the private key, which can ensure the security when the participant can operate on the multi-signature address.
[0054] In the fifth embodiment of a method for generatin...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


