Offline interception-free interaction with a cryptocurrency network using a network-disabled device
A technology that enables network and network, applied in the field of virtual wallet, can solve the problem of not solving transaction data signature private key and so on
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0122] Example 1: Generating an encryption key pair using a network-disabled device
[0123] In Example 1, an operation method for generating an encryption key pair is exemplified. In this example, an implementation of a network-disabled electronic device is used, where the lower side of the device includes a light sensor as an environmental sensor, a camera sensor as a biometric sensor, and a fingerprint reader, and the upper side also includes a The first screen, the upper side of the device includes a second screen that displays the public key and variable output. figure 1 and figure 2 This embodiment is illustrated.
[0124] Step 1 - Activating the electronic device that disables the network
[0125] After turning on a network-disabled electronic device using the power switch, the device must be activated. In order to activate the device, users need to press the fingerprint reader for 2 seconds. This press triggers the light sensor and fingerprint reader. This data ...
example 2
[0143] Example 2: Transferring funds from a secure cryptographic key pair to a third party's public key
[0144] Step 1 - Create a transaction signing request
[0145] In a first step, a transaction is established on a network-enabled device and the user then signs the transaction to generate a transaction signing request.
[0146] Step 2 - Transmit transaction signing request
[0147] Subsequently, the transaction signing request is wirelessly transmitted to the network-disabled device using a QR code generated on the screen of the network-enabled device. Scan that QR code with the camera sensor on your network-disabled device. In the next step, the user is able to verify the data embedded in the scanned QR code to avoid mistakes.
[0148] Step 3 - Sign the transaction signing request
[0149] After verifying the transaction signing request, the user is able to cryptographically sign the transaction signing request using the network-disabled device using a private key sto...
example 3
[0152] Example 3: Preferred way to create an input seed
[0153] can be done, for example, by Figure 7 to Figure 12 The method according to the current example is executed on a processor included in the network-disabled device shown in .
[0154] According to the current example, a seed is generated using a pseudo-random number generator preprogrammed on the processor of the network-disabled device. The pseudorandom number generator is set to generate 256 bits of random data. Hereinafter, this one seed will be referred to as "first seed".
[0155] According to the present example, three of the one or more seeds used to generate the encryption key pair are true random numbers or true random vectors generated using the image capture device. To obtain the three seeds, three snapshots (ie, digital images) are taken with an image capture device. According to the current example, one of the one or more seeds used to generate the encryption key pair is a true random number or a ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


