Unlock instant, AI-driven research and patent intelligence for your innovation.

Offline interception-free interaction with a cryptocurrency network using a network-disabled device

A technology that enables network and network, applied in the field of virtual wallet, can solve the problem of not solving transaction data signature private key and so on

Pending Publication Date: 2021-08-24
NGRAVE IO NV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] This known method, while useful in key creation, does not solve the problem of using the generated private key to sign transaction data without exposing said private key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Offline interception-free interaction with a cryptocurrency network using a network-disabled device
  • Offline interception-free interaction with a cryptocurrency network using a network-disabled device
  • Offline interception-free interaction with a cryptocurrency network using a network-disabled device

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0122] Example 1: Generating an encryption key pair using a network-disabled device

[0123] In Example 1, an operation method for generating an encryption key pair is exemplified. In this example, an implementation of a network-disabled electronic device is used, where the lower side of the device includes a light sensor as an environmental sensor, a camera sensor as a biometric sensor, and a fingerprint reader, and the upper side also includes a The first screen, the upper side of the device includes a second screen that displays the public key and variable output. figure 1 and figure 2 This embodiment is illustrated.

[0124] Step 1 - Activating the electronic device that disables the network

[0125] After turning on a network-disabled electronic device using the power switch, the device must be activated. In order to activate the device, users need to press the fingerprint reader for 2 seconds. This press triggers the light sensor and fingerprint reader. This data ...

example 2

[0143] Example 2: Transferring funds from a secure cryptographic key pair to a third party's public key

[0144] Step 1 - Create a transaction signing request

[0145] In a first step, a transaction is established on a network-enabled device and the user then signs the transaction to generate a transaction signing request.

[0146] Step 2 - Transmit transaction signing request

[0147] Subsequently, the transaction signing request is wirelessly transmitted to the network-disabled device using a QR code generated on the screen of the network-enabled device. Scan that QR code with the camera sensor on your network-disabled device. In the next step, the user is able to verify the data embedded in the scanned QR code to avoid mistakes.

[0148] Step 3 - Sign the transaction signing request

[0149] After verifying the transaction signing request, the user is able to cryptographically sign the transaction signing request using the network-disabled device using a private key sto...

example 3

[0152] Example 3: Preferred way to create an input seed

[0153] can be done, for example, by Figure 7 to Figure 12 The method according to the current example is executed on a processor included in the network-disabled device shown in .

[0154] According to the current example, a seed is generated using a pseudo-random number generator preprogrammed on the processor of the network-disabled device. The pseudorandom number generator is set to generate 256 bits of random data. Hereinafter, this one seed will be referred to as "first seed".

[0155] According to the present example, three of the one or more seeds used to generate the encryption key pair are true random numbers or true random vectors generated using the image capture device. To obtain the three seeds, three snapshots (ie, digital images) are taken with an image capture device. According to the current example, one of the one or more seeds used to generate the encryption key pair is a true random number or a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for the fully offline interception-free interaction with a cryptocurrency network using a network-disabled device, the method comprises: generating a by the cryptocurrency network acceptable cryptographic key pair on the network-disabled device, from one or more seeds; wherein one or more of the seeds used for the generation of a cryptographic key-pair, are generated using one or more environmental sensors, biometric sensors, or a combination thereof.

Description

technical field [0001] The present disclosure generally relates to virtual wallets for storing and performing transactions using cryptocurrencies. More specifically, the present disclosure relates to a method of completely offline, interception-free interaction with a cryptocurrency network using a network-disabled device, which overcomes problems in the prior art and simplifies existing methods and provides enhanced security. Background technique [0002] Many modern economies are based primarily on transactions involving money. Electronic currency transactions have become more common in recent years. Most electronic transaction functions use government-backed currencies; however, in recent years a number of virtual currencies have emerged that provide an alternative to government-regulated currencies. Such virtual currencies are not issued by a central agency such as the US Treasury. Instead, virtual currencies are regulated by cryptographic methods of governing and con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06Q20/36
CPCH04L9/0866H04L2209/56G06Q20/065G06Q20/3829G06Q20/3674G06Q20/40145G06Q2220/00H04L9/50G06Q20/0658G06Q20/3825H04L9/0825H04L9/3247
Inventor E·万纳姆R·梅尔X·亨德里克斯J·梅博世
Owner NGRAVE IO NV