Trusted address generation method and system

A technology for address generation and trusted addresses, applied in digital data protection, computer security devices, structured data retrieval, etc., can solve problems such as technology and credit credibility, and achieve the effect of solving complexity and improving single use

Inactive Publication Date: 2021-05-11
专知利乎成都知识产权运营有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Rather than building on the basis of no credit, there is no fundamental use of technology to solve the problem of credit credibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted address generation method and system
  • Trusted address generation method and system
  • Trusted address generation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0131] The technical scheme adopted by the present invention is to supplement the selection object of the private key, the selection object is extensive, and the ECDSA-secp256k1, SHA-256 and other algorithms are used to increase the confidentiality, and 1xin is combined on the basis of the algorithm to make the private key in the process of generating the address Credibility is further increased, and the trusted address involves the corresponding system, and the smart contract is configured for the trusted address, and a distributed management system is provided for the management of the private key of the trusted address. The present invention provides a technical solution to the above problems. The specific implementation is as follows:

[0132] combined with figure 1 and Figure 5 A trusted address generation method is implemented, comprising the steps of:

[0133] Step 1. Select 1xin+32 random characters+immutable object as the private key;

[0134] Further immutable ob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a trusted address generation method and system. The trusted address generation method comprises the following steps: step 1, selecting 1xin+32-bit random characters + an immutable object as a private key; step 2, calculating a non-compressed public key corresponding to the private key by using an elliptic curve encryption algorithm (ECDSA-secp256k1); step 3, taking a result of the previous step, adding 1xin in the previous step, and calculating an SHA-256 hash value; and step 4, taking a result of the previous step, adding 1xin, calculating an SHA-256 Hash value and the like to generate the trusted address. According to the method, multiple purposes of the address are improved, the problem of address fraud is solved, and reliable technical support is provided for a next-generation block chain.

Description

technical field [0001] The invention relates to a method and system for generating a trusted address, which belongs to the field of block chain address generation and trusted transfer, and is mainly used for generating encrypted assets, encrypted certificates, encrypted commodity addresses and trusted transfers. Background technique [0002] The blockchain originated from Bitcoin. On November 1, 2008, a person who claimed to be Satoshi Nakamoto published the article "Bitcoin: A Peer-to-Peer Electronic Cash System", explaining that based on P2P network technology, The architectural concept of the electronic cash system, such as encryption technology, time stamp technology, blockchain technology, etc., marks the birth of Bitcoin. Two months later, the theory entered practice, and on January 3, 2009, the first genesis block with serial number 0 was born. On January 9, 2009, the block with serial number 1 appeared and connected with the genesis block with serial number 0 to for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/04G06F16/27G06F21/60G06F21/64
CPCG06F21/602G06F21/64G06Q40/04G06F16/27
Inventor 不公告发明人
Owner 专知利乎成都知识产权运营有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products