Unlock instant, AI-driven research and patent intelligence for your innovation.

Wallet encryption storage method, signature method, computer equipment and storage medium

A computer equipment, encrypted storage technology, applied in the Internet field, can solve problems such as asset loss

Active Publication Date: 2021-08-06
HANGZHOU FUZAMEI TECH CO LTD
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The problem with the above solution is that when the computer equipment storing the encrypted sensitive data is hacked, the intruder can steal the encrypted sensitive data, and then steal / defraud the user key, crack the user key according to the user’s private information, etc. The stolen data is decrypted, resulting in the risk of sensitive data such as private keys or mnemonics being stolen and cracked, resulting in asset loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wallet encryption storage method, signature method, computer equipment and storage medium
  • Wallet encryption storage method, signature method, computer equipment and storage medium
  • Wallet encryption storage method, signature method, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0027] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0028] figure 1 It is a flow chart of a wallet encrypted storage method provided by an embodiment of the present invention.

[0029] Such as figure 1 As shown, in this embodiment, the present invention provides a wallet encrypted storage method, the computer device executing the method is config...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a wallet encryption storage method, a signature method, computer equipment and a storage medium, and the method comprises the steps: a wallet application obtains a user key in response to an account creation instruction, and sends the user key and the account creation instruction to a first TA in a TEE; the first TA responds to the account creation command, generates a first private key, and a first public key, a first address and a first mnemonic word corresponding to the first private key, and returns the first public key and the first address to the wallet application; the first TA generates a trusted storage key according to the user key and the HUK of the computer equipment; the first TA generates a file encryption key, encrypts the first private key and the first mnemonic word according to the file encryption key, and generates and stores encrypted private key information; and the first TA encrypts the file encryption key according to the trusted storage key, and generates and stores encryption key information. According to the invention, asset loss caused by stealing of wallet data is avoided.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular to a wallet encryption storage method, signature method, computer equipment and storage medium. Background technique [0002] Current blockchain wallets store sensitive data such as private keys or mnemonic words by encrypting these sensitive data with the user key and storing them on the hard disk. [0003] The problem with the above solution is that when the computer equipment storing the encrypted sensitive data is hacked, the intruder can steal the encrypted sensitive data, and then steal / defraud the user key, crack the user key according to the user’s private information, etc. The stolen data is decrypted, resulting in the risk of sensitive data such as private keys or mnemonics being stolen and cracked, resulting in asset loss. Contents of the invention [0004] In view of the above-mentioned defects or deficiencies in the prior art, it is desired to provide ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60H04L9/08H04L9/32
CPCG06F21/602H04L9/0861H04L9/3247G06F2221/2107
Inventor 李邦柱王志文吴思进
Owner HANGZHOU FUZAMEI TECH CO LTD