Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for generating a cold wallet derived key

A technology for deriving keys and cold wallets, applied in the field of information security, can solve problems such as small scope, inability to meet, and failure to derive keys from cold wallets, and achieve the effect of improving the success rate

Active Publication Date: 2021-02-26
JIANGSU HENGBAO INTELLIGENT SYST TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the generation method of the cold wallet derived key, because the bip39 / bip44 and bip32 rules are set for the elliptic curve algorithm, and there are many kinds of key algorithms used in digital currency at present, some key algorithms are not suitable for the derived key , for example, the private key has special requirements. For example, for the ed25519 key algorithm, the key algorithm requires that the sixth bit of the 32nd byte of the private key must be 0. Cold wallet derivation key derivation, the 6th bit of the 32nd byte of the private key in the derived cold wallet derivation key may not be 0, which makes the cold wallet derivation key derivation fail
Therefore, the existing methods for generating cold wallet derived keys based on bip39 / bip44 and bip32 rules can only be applied to elliptic curve algorithms that have no special requirements for derived keys. Unconventional curve algorithm with requirements, the success rate of the generated cold wallet derived key is low, so that the scope of this method can be used in a small range, and it cannot meet the needs of digital currency for multiple security algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for generating a cold wallet derived key
  • A method and device for generating a cold wallet derived key
  • A method and device for generating a cold wallet derived key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and device for generating a cold wallet derived key, wherein the method for generating a cold wallet derived key includes: deriving entropy based on mnemonics to obtain the derived entropy; encoding the entropy, Perform a hash operation on the encoded entropy to obtain a seed; encode the seed, based on the encoded seed and the data generated by the preset rules, use the preset key algorithm to perform operations, and obtain the key algorithm that meets the requirements of the key algorithm root key; generate the cold wallet based on the key index preset for the cold wallet derived key, the root key, the root chain code, and the preset length of the cold wallet derived key Derived keys can improve the success rate of generating cold wallet derived keys.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method and device for generating a cold wallet derived key. Background technique [0002] Cold wallets applied to digital currency use mnemonics and key derivation methods for key management, generate root keys based on bip39 / bip44 and bip32 rules, mnemonics, and elliptic curve algorithms, and derive different Subkeys under the path. [0003] However, the generation method of the cold wallet derived key, because the bip39 / bip44 and bip32 rules are set for the elliptic curve algorithm, and there are many kinds of key algorithms used in digital currency at present, some key algorithms are not suitable for the derived key , for example, the private key has special requirements. For example, for the ed25519 key algorithm, the key algorithm requires that the sixth bit of the 32nd byte of the private key must be 0. Cold wallet derivation key derivation, the six...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/14
CPCH04L9/0643H04L9/0861H04L9/14
Inventor 李勇
Owner JIANGSU HENGBAO INTELLIGENT SYST TECH CO LTD