Unlock instant, AI-driven research and patent intelligence for your innovation.

Seed key backup method and system and electronic equipment

A key and seed technology, applied in the field of information security, can solve the problems of seed key loss, seed key theft, difficult storage, etc., and achieve the effect of improving security, safe export and import

Active Publication Date: 2021-08-27
FEITIAN TECHNOLOGIES
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The former is extremely difficult to keep, such as moldy or lost paper, which will lead to the loss of the seed key, while the latter has the risk of the seed key being stolen or tampered with by malicious clients

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Seed key backup method and system and electronic equipment
  • Seed key backup method and system and electronic equipment
  • Seed key backup method and system and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] Embodiment 1 of the present invention provides a seed key backup method, which is suitable for a system including a client and a backup card, including the process of exporting the hardware device seed key ciphertext from the hardware device to the backup card, including the following steps :

[0054] Step S1: The client sends a request to the backup card to obtain the card device public key certificate and card temporary public key;

[0055] Step S2: The backup card generates and saves the first temporary key pair, uses the preset card device private key to sign the first temporary public key to obtain the first signature result, obtains the preset card device public key certificate, and sends it to the client Send a response including the card device public key certificate, the first temporary public key and the first signature result; the first temporary key pair includes the first temporary public key and the first temporary private key;

[0056] Step S3: The clien...

Embodiment 2

[0140] Embodiment 2 of the present invention provides a seed key backup method, including the process of exporting the hardware device seed key ciphertext from the hardware device to the backup card, such as figure 2 shown, including the following steps:

[0141] Step 201: the client sends a request to obtain the public key certificate of the card device to the backup card;

[0142] For example: the request to obtain the card device public key certificate is: 80 CA BF 21 06 A6 04 83 02 15 18;

[0143] Step 202: the backup card sends to the client a response to obtain the card device public key certificate including the card device public key certificate;

[0144] 例如:获取卡设备公钥证书响应具体为:BF2181DC7F2181D8931042584E46433230303532353030303031420D6A75626974657277616C6C65745F200D6A75626974657277616C6C65749501825F2504202005255F24042025052453007F4946B0410479704BDB2D3DA2E547EB6DE66E0073F6E61AE32076AF007973B5FA1DBE07E0EF38BD84D85F1FE1E1410FF743E659691B36361C76BEE2FAC44FD888257592

[0145] ...

Embodiment 3

[0204] Embodiment 3 of the present invention provides a method for seed key backup. In this embodiment, the process of importing the seed key ciphertext from the backup card to the hardware device is as follows: image 3 shown, including the following steps:

[0205] Step 301: the client sends a request to the hardware device to obtain the temporary public key of the hardware device;

[0206] For example: the request to obtain the temporary public key of the hardware device is specifically: 00F8010100;

[0207] Optionally, in this embodiment, when the hardware device receives the request from the client to obtain the temporary public key of the hardware device, it performs the following steps:

[0208] Step C1: the hardware device generates and saves a third temporary key pair; the third temporary key pair includes a third temporary public key and a third temporary private key;

[0209] Step C2: The hardware device uses the preset private key of the wallet device to sign the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a seed key backup method and system and electronic equipment, and belongs to the field of information security. The method comprises the steps that: a client obtains a card equipment public key certificate and a card temporary public key from a backup card, receives the card equipment public key certificate, a first temporary public key and a first signature result sent by the backup card, and sends a PIN code generation instruction to hardware equipment; the client sends a PIN code displayed by the hardware equipment input by the user, the card equipment public key certificate, the first temporary public key and the first signature result to the hardware equipment, receives a second data packet containing first ciphertext data sent by the hardware equipment, prompts the user to input the card PIN code, and sends the card PIN code input by the user to the backup card for verification; after after the PIN verification is passed, the client sends the second data packet to the backup card to enable the backup card to decrypt the first ciphertext data in the second data packet to obtain a hardware equipment seed key ciphertext. According to the invention, the security of backing up a seed key of hardware equipment is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a seed key backup method, electronic equipment and system. Background technique [0002] The hardware device stores the private key separately in a chip, which is isolated from the Internet, plug and play, so as to ensure that the private key is not stolen, thereby ensuring the security of the hardware device. The private key in the hardware device is generated by the seed key, so the user usually needs to back up the seed key separately, so that after the hardware device is damaged or lost, the private key can be restored by using the backed up seed key. In the prior art, the seed key is usually backed up on paper or saved after being acquired by the client through instructions. The former is extremely difficult to keep, such as moldy or lost paper, which will lead to the loss of the seed key, while the latter has the risk of the seed key being stolen or tampered with by mal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08G06F11/14
CPCG06F11/1448H04L9/0897H04L9/3226H04L9/3239H04L9/3247H04L9/3263
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More