CN112001717A - Method, system and storage medium for calculating encryption currency of digital television - Google Patents
Method, system and storage medium for calculating encryption currency of digital television Download PDFInfo
- Publication number
- CN112001717A CN112001717A CN202011160736.7A CN202011160736A CN112001717A CN 112001717 A CN112001717 A CN 112001717A CN 202011160736 A CN202011160736 A CN 202011160736A CN 112001717 A CN112001717 A CN 112001717A
- Authority
- CN
- China
- Prior art keywords
- public key
- top box
- key
- sub
- card number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/443—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
Abstract
The invention discloses a method for calculating encryption currency of a digital television, which comprises the following steps: acquiring a word lexicon, and randomly selecting words in the word lexicon to generate a mnemonic word sequence; converting the mnemonic word sequence into seeds according to a conversion rule; encrypting the seed to generate a root private key and a root public key; generating a sub public key library according to the root public key, and randomly selecting a sub public key from the sub public key library; generating a corresponding grandchild public key according to the child public key; selecting a set-top box card number range, presetting the set-top box card number, finding out a corresponding unique set-top box card number according to the grandchild public key serial number, and performing payment operation; after the grandchild public key is used, a new child public key is randomly selected from the child public key library until the corresponding set-top box card number is matched. The invention also discloses a cryptocurrency calculation system of the digital television and a storage medium which stores the cryptocurrency calculation system and can be loaded by the processor and executes the method.
Description
Technical Field
The invention relates to the field of cryptocurrency, in particular to a cryptocurrency calculation method, a cryptocurrency calculation system and a storage medium of a digital television.
Background
The digital television charging needs to correspond specific charging to a set top box or an intelligent card, so that a condition receiving system knows how to authorize the set top box and the decentralized and anonymous characteristics of encryption currency, the payment of the encryption currency is difficult to correspond to a payer in reality, the encryption currency, such as bit currency payment, is a string of characters, encrypted and hidden, generally speaking, the user cannot track who pays but only knows the payment from a certain address, and therefore the payment of the encryption currency is difficult to be hooked with the set top box corresponding to the payment.
Disclosure of Invention
Aiming at the problems, the invention provides a method, a system and a storage medium for calculating the cryptocurrency of a digital television, which are provided with a hook for conveniently and simply hooking the set top box corresponding to the cryptocurrency and payment.
The technical scheme of the invention is as follows:
in one aspect, the invention provides a method for calculating cryptocurrency of a digital television, which comprises the following steps:
step 1: acquiring a word lexicon, and randomly selecting words in the word lexicon to generate a mnemonic word sequence;
step 2: converting the mnemonic word sequence into seeds according to a conversion rule;
and step 3: encrypting the seed to generate a root private key and a root public key;
and 4, step 4: generating a sub public key library according to the root public key, and randomly selecting a sub public key from the sub public key library;
and 5: generating a corresponding grandchild public key according to the child public key;
step 6: selecting a set-top box card number range, presetting the set-top box card number, finding out a corresponding unique set-top box card number according to the grandchild public key serial number, and performing payment operation;
and 7: and after the grandchild public key is used, randomly selecting a new child public key from the child public key library, and repeating the steps 4 to 6 to match the corresponding set-top box card number.
The working principle of the technical scheme is as follows:
the technical scheme designs a wallet similar to an HD wallet for charging.
From the mnemonic lexicon (generally 2048 selected words, which are single words for Chinese), a group, for example 15, is randomly selected: the face-facing lead damage is bent and steamed to call and cover the peaceful sleep drift estimate, namely the mnemonic word sequence; calculating a set of random number sequences, i.e. seeds, from the set of mnemonics using a function, such as a function like HMAC-SHA 512; calculating a group of public keys and a group of private keys from the seeds (random number sequences) by using an algorithm, wherein the two groups of keys are root key pairs; according to the algorithm defined in BIP32, for a certain set of parent public keys, then it is certain to calculate its nth set of child keys; each set top box has an independent serial number, and when the set top boxes leave a factory, each set top box is endowed with an independent random serial number which is an integer of a power of 31 less than 2; calculating a sub public key library according to the serial numbers of all the set-top boxes (namely the serial number library of the set-top boxes) from the root public key, and determining a sub secret key (a set-top box public key) corresponding to each set-top box according to the serial numbers; calculating a sub-private key library according to the serial numbers of all the set-top boxes (namely the serial number library of the set-top boxes) from the root private key, and determining a sub-private key (a set-top private key) corresponding to each set-top box according to the serial numbers; when the set-top box leaves a factory, writing a public and private key pair of the set-top box; during transaction, a server (a charging party) randomly selects an integer of a 31-power party smaller than 2 as a serial number of a transaction key, and calculates the transaction key for all set top boxes, namely a transaction key bank of the transaction, wherein the calculation method is that a public key and a private key of each set top box are used as parent keys, and the nth group (n is the serial number of the transaction key) of the public key and the private key of each set top box is calculated; the server broadcasts the address of the transaction and the transaction key sequence number; after the set-top box receives the transaction address and the transaction key serial number, the transaction key is calculated according to the stored set-top box key and the transaction serial number, and payment is finished; after the server receives the payment information, traversing the transaction key bank, namely comparing the key in the transaction information with a group of keys in the transaction key bank, and finding out the serial number of the set top box completing the transaction; thus, the server obtains all information of the transaction and can authorize the set-top box.
The method comprises the steps of generating a mnemonic word sequence BIP39 mnemonic character, converting the mnemonic word sequence into a seed BIP39 seed by using PBKDF2, wherein PBKDF2 is simply to repeatedly calculate salt-added Hash encryption for a plurality of times, the times are selectable, if the time required for calculating once is 1 microsecond, 1 million times of calculation is required to be 1 second, if a rainbow table required for attacking a password has 1 million pieces, the time required for establishing the corresponding rainbow table is 115 days, and the cost is enough for most attackers to forget. Selecting a mnemonic word sequence from a mnemonic word library, calculating a group of seeds according to the mnemonic word sequence, and calculating a pair of public and private keys, namely a root key pair, according to the seeds; taking the root public key as a parent key, a determined sub-key space, namely 32-power sub-keys of 2 can be calculated, wherein the first half is a common sub-key, namely a key bank used by us; the second half is a hard sub-key which is temporarily not used; mapping the serial number of the set-top box to a sub-key space, namely, one serial number of the set-top box corresponds to one sub-key; during transaction, the child key corresponding to the set-top box is used as a parent key, a key bank of the parent key, namely a grandchild key bank, is calculated, and one group of key banks is randomly selected as a transaction key, so that the transaction initiated by the set-top box can be tracked in each transaction.
The root private key BIP32 root key and the root public key are generated using the encryption method HMAC-SHA 512. The root public key is generated into a sub public key according to BIP32, wherein the node layout is set by BIP44, BIP43 adds an expansion m/purpose '/' of sub index identification purpose to a BIP32 tree structure, BIP44 adds multi-currency on the basis of BIP43 and BIP32, a plurality of addresses can be derived through HD wallet, the bitcoin of a main network and a test network can be managed simultaneously, BIP44 proposes a 5-layer path proposal as follows: the definition of m/purpose '/core _ type '/account '/change/address _ index, BIP32 is HD wallet, and a system can generate a tree structure from a single seed to store multiple sets of private and public keys, because all only need the seed, and can be easily backed up, transferred to other compatible devices, and layered rights control. BIP32 is a core proposal of HD wallet, generates a main private key through a seed, and then derives a great amount of sub private keys and addresses, and is designed through BIP32 to remember a mnemonic word sequence and reconstruct the whole key library, according to BIP32, 31-power ordinary sub keys of 2 and hard sub keys with the same quantity can be generated from a group of root keys to strengthen the sub private keys, the root private key and the root public key generate ordinary sub keys and hard sub keys, 31-power ordinary sub keys of the former 2 are hard sub keys, the latter half are hard sub keys, the sub private keys can be derived according to a father public key, or the son public keys and the son private keys of the father private key, so that the algorithm does not need the participation of the private key when deriving the son public keys, and the security is improved. The parent key is the key used to derive the child keys, the grandchild key can be regarded as the transaction key, the common key is the key that we generally use, the hard child key is defined in BIP32, and a group of parent keys can be calculated to generate the 32 nd power child keys of 2, in this embodiment, the first half is used as the child key library.
In practice, a range, such as serial numbers 80000000 to 90000000, is selected as a corresponding card number, each set top box is endowed with a unique card number for addressing the range, each grandchild public key serial number corresponds to a set top box card number, the server calculates a corresponding grandchild public key library and a corresponding charging address library according to the card number range, the grandchild public key library is regenerated after each use, and after one group of grandchild public keys are used, a new group of grandchild public keys are randomly selected to generate a new grandchild public key library.
The current valid sub-public key and the charging rate are broadcasted, and due to the fact that each broadcast channel is different, each time broadcast, selecting a plurality of sub public keys from the sub public key library according to the number of the broadcast channels, wherein each sub public key corresponds to one channel to be broadcast, after the set-top box receives the effective sub public keys, the set-top box generates a grandchild public key base of the charge according to the valid child public keys, the set-top box calculates the corresponding grandchild public key according to the card number of the set-top box, then, according to the grandchild public key, calculating out the corresponding charging link, generating two-dimension code and displaying, the user scans the two-dimension code to pay, after the server receives, finding out the card number of the local set-top box according to the grandchild public key in the received payment address, finding out the paid set-top box, finally calculating the authorization information according to the card number and the money amount, sending the authorization information to the conditional access system, and authorizing the set-top box through the conditional access system.
In a further technical scheme, a method for randomly selecting words in the word lexicon to generate a mnemonic word sequence comprises the following steps: the word thesaurus has 2048 words, and 12 words are randomly selected in the word thesaurus to generate the mnemonic word sequence.
The method for randomly selecting the words in the word library to generate the mnemonic word sequence solves the technical problem that the seeds are not recorded easily when the seeds are a string of long random numbers due to the fact that the mnemonic word sequence is not available in the prior art.
In a further technical scheme, the mnemonic word sequence is converted into seeds according to a conversion rule, and a pseudorandom function is applied to derive the conversion rule of the key, so that the mnemonic word sequence is converted into the seeds.
The transformation rule of the key is derived by applying a pseudorandom function, so that the technical problem that a string of seeds is long and cannot be well recorded and has potential safety hazards in the prior art is solved.
In a further technical scheme, a sub public key library is generated according to the root public key, and a method for randomly selecting one sub public key in the sub public key library is as follows: the root public key generates a 32 th power sub-key of 2; randomly selecting a segment from the 31 th power sub-key of the first 2 as a sub-public key library.
A section of the first 31 th power sub-key is randomly selected as a sub-public key library, the total number of the sub-keys can be 2 32 th power, the first 2 th power 31 st power is a common sub-key, and the second half is a hard sub-key. In a further technical scheme, the method for finding out the corresponding unique set-top box card number according to the grandchild public key sequence number is as follows: the server calculates a corresponding grandchild public key library and a corresponding charging address library according to the card number range; the charging address library comprises charging rates; the set-top box calculates the corresponding grandchild public key sequence number and charging link according to the charging rate and the child public key; and finding out the corresponding set-top box card number according to the corresponding grandchild public key serial number.
And finding the corresponding set-top box card number according to the corresponding grandchild public key serial number, thereby solving the technical problem that the encrypted currency payment is difficult to be hooked with the set-top box corresponding to the payment in the prior art.
In a further technical solution, the method of performing payment operations is as follows: and generating a two-dimensional code according to the charging link, and scanning the two-dimensional code by a user to pay.
And generating a two-dimensional code according to the charging link, and scanning the two-dimensional code by a user to pay, thereby solving the technical problem that the program is complicated and troublesome when the user pays the fee of the digital television set-top box in the prior art.
In a further technical scheme, after a user scans a two-dimensional code to pay, a server receives payment information, the server determines a charging address according to the payment information, determines a card number corresponding to the set top box according to the charging address, calculates authorization information according to the card number and the payment information, sends the authorization information to a conditional access system, and authorizes the set top box through the conditional access system.
And calculating authorization information according to the card number and the payment information, sending the authorization information to a conditional access system, and authorizing the set top box through the conditional access system, thereby solving the technical problem that the encrypted currency payment in the prior art is difficult to correspond to a payer in reality.
In another aspect, the present invention provides a cryptocurrency calculation system for a digital television, the system comprising: acquisition unit, conversion unit, encryption unit, screening unit and matching unit, wherein: the acquisition unit is used for acquiring a word bank and acquiring mnemonic word sequences in the word bank; the conversion unit is used for converting the mnemonic word series into seeds and generating corresponding grandchild public keys according to the child public keys; the encryption unit is used for encrypting the seeds to generate a root private key and a root public key; the screening unit is used for generating the root public key into a sub public key library and selecting a sub public key from the sub public key library; and the matching unit is used for matching the corresponding set top box card number according to the grandchild public key serial number.
A cryptocurrency calculation system of a digital television solves the technical problem that the cryptocurrency payment is difficult to be hooked with a set top box corresponding to the payment in the prior art.
In a further aspect, the system further comprises: the authorization unit is used for authorizing the set top box through the conditional access system; and the storage unit is used for storing the calculation program of the encryption currency, storing the range of the card number of the set-top box, storing the charging address library, storing the two-dimensional code generated by the charging link and storing the payment information and the authorization information.
The authorization unit and the storage solve the technical problems of authorizing the set top box and storing all related information through the conditional access system in the prior art.
In another aspect, the present invention provides a computer readable storage medium storing a program capable of being loaded by a processor and executing the above method.
The invention has the beneficial effects that: 1. When the seed is a long string of random numbers, the recording is convenient;
2. the encryption currency algorithm in the technology has safety at the same time;
3. the encrypted currency payment is easier to be hooked with a set top box corresponding to the payment, and the encrypted currency payment is easier to correspond to a payer in reality;
4. the program is convenient and quick when the user pays the fee of the digital television set-top box.
Drawings
Fig. 1 is a flowchart of a cryptocurrency calculation method of a digital television according to an embodiment of the present invention;
fig. 2 is a flowchart of a cryptocurrency calculation system of a digital television according to an embodiment of the present invention.
Description of reference numerals:
10. a collection unit; 11. a conversion unit; 12. an encryption unit; 20. a screening unit; 30. a matching unit; 40. an authorization unit; 50. and a memory unit.
Detailed Description
The embodiments of the present invention will be further described with reference to the accompanying drawings.
Example (b):
as shown in fig. 1, a cryptocurrency calculation method for a digital tv includes the following steps:
step 1: acquiring a word lexicon, and randomly selecting words in the word lexicon to generate a mnemonic word sequence;
step 2: converting the mnemonic word sequence into seeds according to a conversion rule;
and step 3: encrypting the seed to generate a root private key and a root public key;
and 4, step 4: generating a sub public key library according to the root public key, and randomly selecting a sub public key from the sub public key library;
and 5: generating a corresponding grandchild public key according to the child public key;
step 6: selecting a set-top box card number range, presetting the set-top box card number, finding out a corresponding unique set-top box card number according to the grandchild public key serial number, and performing payment operation;
and 7: and after the grandchild public key is used, randomly selecting a new child public key from the child public key library, and repeating the steps 4 to 6 to match the corresponding set-top box card number.
The working principle of the technical scheme is as follows:
the technical scheme designs a wallet similar to an HD wallet for charging. From the mnemonic lexicon (generally 2048 selected words, which are single words for Chinese), a group, for example 15, is randomly selected: the face-facing lead damage is bent and steamed to call and cover the peaceful sleep drift estimate, namely the mnemonic word sequence; calculating a set of random number sequences, i.e. seeds, from the set of mnemonics using a function, such as a function like HMAC-SHA 512; calculating a group of public keys and a group of private keys from the seeds (random number sequences) by using an algorithm, wherein the two groups of keys are root key pairs; according to the algorithm defined in BIP32, for a certain set of parent public keys, then it is certain to calculate its nth set of child keys; each set top box has an independent serial number, and when the set top boxes leave a factory, each set top box is endowed with an independent random serial number which is an integer of a power of 31 less than 2; calculating a sub public key library according to the serial numbers of all the set-top boxes (namely the serial number library of the set-top boxes) from the root public key, and determining a sub secret key (a set-top box public key) corresponding to each set-top box according to the serial numbers; calculating a sub-private key library according to the serial numbers of all the set-top boxes (namely the serial number library of the set-top boxes) from the root private key, and determining a sub-private key (a set-top private key) corresponding to each set-top box according to the serial numbers; when the set-top box leaves a factory, writing a public and private key pair of the set-top box; when in transaction, the server (charging party) randomly selects an integer of 31 times smaller than 2 as the serial number of the transaction key, and calculates the transaction key for all the set-top boxes, namely the transaction key bank of the transaction,
the calculation method is that the public key and the private key of each set-top box are used as father keys, and the nth (n is a transaction key serial number) group of child keys are calculated; the server broadcasts the address of the transaction and the transaction key sequence number; after the set-top box receives the transaction address and the transaction key serial number, the transaction key is calculated according to the stored set-top box key and the transaction serial number, and payment is finished; after the server receives the payment information, traversing the transaction key bank, namely comparing the key in the transaction information with a group of keys in the transaction key bank, and finding out the serial number of the set top box completing the transaction; thus, the server obtains all information of the transaction and can authorize the set-top box.
In the technical scheme, a mnemonic word sequence BIP39 mnemonic symbol is firstly generated, the mnemonic word sequence is converted into a seed BIP39 seed by using PBKDF2, PBKDF2 simply means that salt-added Hash encryption is repeatedly calculated for multiple times, the times are selectable, if the time required for calculating once is 1 microsecond, 1 million times of calculation needs 1 second, if a rainbow table required for attacking a password has 1 million pieces, the time required for establishing the corresponding rainbow table is 115 days, and the cost is enough for most attackers to forget.
The mnemonic word sequence is converted into seeds according to a conversion rule, and from memory to sowing, a user may decide to protect their memory with a password. If no passphrase exists, then the null string "" is used. To create a binary seed from the mnemonics, we used the pbkdf2 function and the mnemonic sentence (utf-8nfkd) as the password, the string "mnemonic" + pass phrase (again, utf-8nfkd) as the salt iteration count set to 2048, and the HMAC-SHA512 as the pseudorandom function. The derived key is 512 bits (64 bytes) in length. This seed may later generate a deterministic wallet using BIP-0032 or a similar method. The conversion of the mnemonic sentence into a binary seed is completely independent of the generation of the sentence. This results in a rather simple code, the sentence structure is not limited and the client is free to implement its own word list and even the whole sentence generator, thereby providing flexibility of the word list for error detection or other purposes. Although mnemonics other than the algorithm described in the "generate mnemonics" section may be used, it is not recommended that the software use the word list to calculate a checksum for the mnemonic sentence and issue a warning if not valid. The described method also provides plausible denials, since each passphrase will produce a valid seed (and thus a definitive wallet), but only the correct one will produce the required wallet. Selecting a mnemonic word sequence from a mnemonic word library, calculating a group of seeds according to the mnemonic word sequence, and calculating a pair of public and private keys, namely a root key pair, according to the seeds; taking the root public key as a parent key, a determined sub-key space, namely 32-power sub-keys of 2 can be calculated, wherein the first half is a common sub-key, namely a key bank used by us; the second half is a hard sub-key which is temporarily not used; mapping the serial number of the set-top box to a sub-key space, namely, one serial number of the set-top box corresponds to one sub-key; during transaction, the child key corresponding to the set-top box is used as a parent key, a key bank of the parent key, namely a grandchild key bank, is calculated, and one group of key banks is randomly selected as a transaction key, so that the transaction initiated by the set-top box can be tracked in each transaction.
The root private key BIP32 root key and the root public key are generated using the encryption method HMAC-SHA 512. BIP32 is defined as an HD wallet, and is a system that generates a tree structure from a single seed to store multiple sets of private and public keys. Because only the seed is needed, backup, transfer to other compatible devices, and layered rights control can be facilitated. The root public key is generated into a sub public key according to BIP32, wherein the node layout is set by BIP44, BIP43 adds an expansion m/purpose '/' of sub index identification purpose to a BIP32 tree structure, BIP44 adds multi-currency on the basis of BIP43 and BIP32, a plurality of addresses can be derived through HD wallet, the bitcoin of a main network and a test network can be managed simultaneously, BIP44 proposes a 5-layer path proposal as follows: m/purpose '/core _ type '/account '/change/address _ index, BIP32 is the core proposal of HD wallet, generates the main private key by seed, then derives a great deal of sub-private keys and addresses, and the purpose of design through BIP32 is to remember mnemonic word sequences, reconstruct the whole key library, according to BIP32, a group of seeds (seeds, random numbers) can be obtained according to a certain algorithm from a group of root keys to generate a common subkey of 31 powers of 2 and a same number of hard subkeys, a root private key and a root public key to generate a common subkey and a hard subkey, the common subkey of 31 powers of the first 2 is a common subkey, the hard subkey of the second half is a hard subkey, the whole key system is based on a mnemonic word sequence, then, according to the algorithm defined in BIP32, a set of public and private keys is obtained, which is the root key, and the child keys are derived from the root key layer by layer, and the parent keys are derived from the child keys by the next layer. The child public key can be derived according to the parent public key, or the child public key and the child private key can be derived according to the parent private key, and the child private key can be derived only according to the parent private key, so that the algorithm does not need the participation of the private key when deriving the child public key, and the safety is improved. The parent key is the key used to derive the child keys, the grandchild key can be regarded as the transaction key, the common key is the key that we generally use, the hard child key is defined in BIP32, and a group of parent keys can be calculated to generate the 32 nd power child keys of 2, in this embodiment, the first half is used as the child key library.
In practice, a range, such as serial numbers 80000000 to 90000000, is selected as a corresponding card number, each set top box is endowed with a unique card number for addressing the range, each grandchild public key serial number corresponds to a set top box card number, the server calculates a corresponding grandchild public key library and a corresponding charging address library according to the card number range, the grandchild public key library is regenerated after each use, and after one group of grandchild public keys are used, a new group of grandchild public keys are randomly selected to generate a new grandchild public key library.
The current valid sub-public key and the charging rate are broadcasted, and due to the fact that each broadcast channel is different, each time broadcast, selecting a plurality of sub public keys from the sub public key library according to the number of the broadcast channels, wherein each sub public key corresponds to one channel to be broadcast, after the set-top box receives the effective sub public keys, the set-top box generates a grandchild public key base of the charge according to the valid child public keys, the set-top box calculates the corresponding grandchild public key according to the card number of the set-top box, then, according to the grandchild public key, calculating out the corresponding charging link, generating two-dimension code and displaying, the user scans the two-dimension code to pay, after the server receives, finding out the card number of the local set-top box according to the grandchild public key in the received payment address, finding out the paid set-top box, finally calculating the authorization information according to the card number and the money amount, sending the authorization information to the conditional access system, and authorizing the set-top box through the conditional access system.
In another embodiment, the method for obtaining the word lexicon in step 1 and randomly selecting the words in the word lexicon to generate the mnemonic word sequence comprises the following steps:
the word thesaurus has 2048 words, and 12 words are randomly selected in the word thesaurus to generate the mnemonic word sequence.
In this embodiment, after the method for randomly selecting words in the word lexicon to generate the mnemonic word sequence is converted into the mnemonic word sequence, the mnemonic word sequence is convenient to store and record, so that the problem that the seed is not easy to record when the seed is a string of long random numbers due to no mnemonic word sequence is solved.
In another embodiment, the conversion rule in step 2 is:
applying a pseudorandom function to derive a transformation rule for the key such that the sequence of mnemonics is transformed into a seed.
The transformation rule of deriving the key by applying a pseudo-random function can well record when a string of seeds is too long to record and ensure the safety during recording, the mnemonic word sequence uses PBKDF2, PBKDF2 applies a pseudo-random function to derive the key, and the length of the derived key is essentially unlimited.
In another embodiment, the step 4 generates a sub public key library according to the root public key, and a method for randomly selecting one sub public key from the sub public key library includes:
the root public key generates a 32 th power sub-key of 2;
randomly selecting a segment from the 31 th power sub-key of the first 2 as a sub-public key library.
A section of the first 31 th power sub-key is randomly selected as a sub-public key base, the total number of the sub-keys can be 2 32 th power, the first 2 st 31 th power is a common sub-key, and the second half is a hard sub-key.
In another embodiment, the method for selecting the range of the number of the set-top box card in step 6, presetting the number of the set-top box card, and finding the corresponding unique number of the set-top box card according to the grandchild public key number includes the following steps:
the server calculates a corresponding grandchild public key library and a corresponding charging address library according to the card number range;
the charging address library comprises charging rates;
the set-top box calculates the corresponding grandchild public key sequence number and charging link according to the charging rate and the child public key;
and finding out the corresponding set-top box card number according to the corresponding grandchild public key serial number.
And finding the corresponding set-top box card number according to the corresponding grandchild public key serial number, wherein one grandchild public key serial number corresponds to one unique set-top box card number, so that the encrypted currency payment is hooked by the set-top box corresponding to the payment.
In another embodiment, the method for performing the payment operation in step 6 is as follows:
and generating a two-dimensional code according to the charging link, and scanning the two-dimensional code by a user to pay.
The user scans the two-dimensional code to pay, and the technical problem that in the prior art, the program is complicated and troublesome when the user pays the fee of the digital television set top box is solved.
In another embodiment, the two-dimensional code is generated according to the charging link, and the method for the user to scan the two-dimensional code for payment is as follows:
after a user scans the two-dimensional code to pay, the server receives payment information, determines a charging address according to the payment information, determines a card number corresponding to the set top box according to the charging address, calculates authorization information according to the card number and the payment information and sends the authorization information to a condition receiving system;
and authorizing the set top box through the conditional access system.
And calculating authorization information according to the card number and the payment information, sending the authorization information to a conditional access system, authorizing the set top box through the conditional access system, and making the encrypted currency payment correspond to a payer in reality.
In another embodiment, as shown in fig. 2, the present embodiment discloses a cryptocurrency calculation system for a digital television, the system comprising: acquisition unit, conversion unit, encryption unit, screening unit and matching unit, wherein:
the acquisition unit is used for acquiring a word bank and acquiring mnemonic word sequences in the word bank;
the conversion unit is used for converting the mnemonic word series into seeds and generating corresponding grandchild public keys according to the child public keys;
the encryption unit is used for encrypting the seeds to generate a root private key and a root public key;
the screening unit is used for generating the root public key into a sub public key library and selecting a sub public key from the sub public key library;
and the matching unit is used for matching the corresponding set top box card number according to the grandchild public key serial number.
In another embodiment, a cryptocurrency calculation system for digital television, the system further comprising:
and the authorization unit is used for authorizing the set top box through the conditional access system.
And the storage unit is used for storing the calculation program of the encryption currency, storing the range of the card number of the set-top box, storing the charging address library, storing the two-dimensional code generated by the charging link and storing the payment information and the authorization information.
The above-mentioned embodiments only express the specific embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention.
Claims (10)
1. A cryptocurrency calculation method for a digital television is characterized by comprising the following steps:
step 1: acquiring a word lexicon, and randomly selecting words in the word lexicon to generate a mnemonic word sequence;
step 2: converting the mnemonic word sequence into seeds according to a conversion rule;
and step 3: encrypting the seed to generate a root private key and a root public key;
and 4, step 4: generating a sub public key library according to the root public key, and randomly selecting a sub public key from the sub public key library;
and 5: generating a corresponding grandchild public key according to the child public key;
step 6: selecting a set-top box card number range, presetting the set-top box card number, finding out a corresponding unique set-top box card number according to the grandchild public key serial number, and performing payment operation;
and 7: and after the grandchild public key is used, randomly selecting a new child public key from the child public key library, and repeating the steps 4 to 6 to match the corresponding set-top box card number.
2. The method for calculating the cryptocurrency of the digital television as claimed in claim 1, wherein the method for obtaining the word lexicon in the step 1 and randomly selecting the words in the word lexicon to generate the mnemonic word sequence comprises the following steps:
the word thesaurus has 2048 words, and 12 words are randomly selected in the word thesaurus to generate the mnemonic word sequence.
3. The method of claim 1, wherein the conversion rule in step 2 is:
applying a pseudorandom function to derive a transformation rule for the key such that the sequence of mnemonics is transformed into a seed.
4. The method for calculating the cryptocurrency of the digital television set as claimed in claim 1, wherein the method for generating the sub public key library according to the root public key in the step 4 is as follows:
the root public key generates a 32 th power sub-key of 2;
randomly selecting a segment from the 31 th power sub-key of the first 2 as a sub-public key library.
5. The method for calculating the cryptocurrency of the digital television as set forth in claim 1, wherein the method for selecting the range of the set-top box card number, presetting the set-top box card number and finding the corresponding unique set-top box card number according to the grandchild public key number in the step 6 is as follows:
the server calculates a corresponding grandchild public key library and a corresponding charging address library according to the card number range;
the charging address library comprises charging rates;
the set-top box calculates the corresponding grandchild public key sequence number and charging link according to the charging rate and the child public key;
and finding out the corresponding set-top box card number according to the corresponding grandchild public key serial number.
6. The cryptocurrency calculation method of digital tv as claimed in claim 1, wherein the payment operation in step 6 is performed by the following method:
and generating a two-dimensional code according to the charging link, and scanning the two-dimensional code by a user to pay.
7. The method of claim 6, wherein the two-dimensional code is generated according to the charging link, and the user scans the two-dimensional code to pay the account as follows:
after a user scans the two-dimensional code to pay, the server receives payment information, determines a charging address according to the payment information, determines a card number corresponding to the set top box according to the charging address, calculates authorization information according to the card number and the payment information and sends the authorization information to a condition receiving system;
and authorizing the set top box through the conditional access system.
8. A cryptocurrency calculation system for digital television, the system comprising: acquisition unit, conversion unit, encryption unit, screening unit and matching unit, wherein:
the acquisition unit is used for acquiring a word bank and acquiring mnemonic word sequences in the word bank;
the conversion unit is used for converting the mnemonic word series into seeds and generating corresponding grandchild public keys according to the child public keys;
the encryption unit is used for encrypting the seeds to generate a root private key and a root public key;
the screening unit is used for generating the root public key into a sub public key library and selecting the sub public key from the sub public key library;
and the matching unit is used for matching the corresponding set top box card number according to the grandchild public key sequence number.
9. The cryptocurrency calculation system of digital television according to claim 8, wherein said system further comprises:
the authorization unit is used for authorizing the set top box through the conditional access system;
the storage unit is used for storing a calculation program of the encryption currency, storing the range of the card number of the set-top box, storing a charging address library, storing a two-dimensional code generated by a charging link and storing payment information and authorization information.
10. A computer-readable storage medium storing a computer program which can be loaded by a processor and which executes the method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011160736.7A CN112001717A (en) | 2020-10-27 | 2020-10-27 | Method, system and storage medium for calculating encryption currency of digital television |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011160736.7A CN112001717A (en) | 2020-10-27 | 2020-10-27 | Method, system and storage medium for calculating encryption currency of digital television |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112001717A true CN112001717A (en) | 2020-11-27 |
Family
ID=73475219
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011160736.7A Pending CN112001717A (en) | 2020-10-27 | 2020-10-27 | Method, system and storage medium for calculating encryption currency of digital television |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112001717A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112989384A (en) * | 2021-03-26 | 2021-06-18 | 重庆倍来电新能源有限公司 | Block chain prediction machine network and data transmission method |
CN114697019A (en) * | 2022-02-24 | 2022-07-01 | 南京工程学院 | User account privacy protection method and system |
Citations (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1272025A (en) * | 1999-02-18 | 2000-11-01 | 松下电器产业株式会社 | Electronic value flexible use system and method service device and record medium |
CN101039182A (en) * | 2007-03-07 | 2007-09-19 | 广东南方信息安全产业基地有限公司 | Authentication system and method for issuing user identification certificate |
US20080103982A1 (en) * | 2006-06-19 | 2008-05-01 | Ayman Hammad | Terminal Data Encryption |
CN101277191A (en) * | 2007-03-30 | 2008-10-01 | 埃森哲全球服务有限公司 | Non-repudiation for digital content delivery |
CN101719250A (en) * | 2009-12-10 | 2010-06-02 | 中国联合网络通信集团有限公司 | Payment authentication method, platform and system |
US20110296171A1 (en) * | 2010-05-28 | 2011-12-01 | Christina Fu | Key recovery mechanism |
CN102316378A (en) * | 2011-09-23 | 2012-01-11 | 清华大学深圳研究生院 | Digital copyright protection method based on set-top box and system |
US20120082311A1 (en) * | 2000-11-02 | 2012-04-05 | Oleg Rashkovskiy | Content protection using block reordering |
CN102611943A (en) * | 2012-02-24 | 2012-07-25 | 福建鑫诺通讯技术有限公司 | Method for realizing user payment by applying additional SIM card to set-top box |
CN202496036U (en) * | 2012-03-08 | 2012-10-17 | 佛山市南海科西亚数码电气有限公司 | Set-top box with payment function |
US8966269B2 (en) * | 2007-07-27 | 2015-02-24 | Microsoft Corporation | Integrity protected smart card transaction |
CN106533675A (en) * | 2016-12-19 | 2017-03-22 | 北京洋浦伟业科技发展有限公司 | Digital signature method and system |
CN107453862A (en) * | 2017-05-15 | 2017-12-08 | 杭州复杂美科技有限公司 | Private key generation storage and the scheme used |
CN108229962A (en) * | 2018-01-04 | 2018-06-29 | 众安信息技术服务有限公司 | Right management method and system based on block chain |
CN109088902A (en) * | 2018-11-05 | 2018-12-25 | 江苏恒宝智能系统技术有限公司 | Register method and device, authentication method and device |
CN109523267A (en) * | 2018-10-30 | 2019-03-26 | 苏宁易购集团股份有限公司 | A kind of verification method, the apparatus and system of the transaction data based on block chain |
CN109547218A (en) * | 2019-01-18 | 2019-03-29 | 北京工业大学 | It is a kind of improve BIP agreement alliance's chain node code key distribution and standby system |
CN109660359A (en) * | 2019-01-22 | 2019-04-19 | 上海易酷信息技术服务有限公司 | Generate the method, equipment and the method for generating the credible address of HD wallet of HD wallet business card |
CN109816362A (en) * | 2019-01-28 | 2019-05-28 | 杭州复杂美科技有限公司 | Red packet processing method, equipment and storage medium |
CN109961276A (en) * | 2019-02-27 | 2019-07-02 | 深圳市朗科科技股份有限公司 | Digital cash wallet, method of commerce, transaction system and computer storage medium |
CN110490589A (en) * | 2019-08-30 | 2019-11-22 | 新明华区块链技术(深圳)有限公司 | Hardware wallet creation method, device and hardware wallet |
CN110838912A (en) * | 2019-11-18 | 2020-02-25 | 深圳前海微众银行股份有限公司 | Key management method, device, equipment and computer medium based on block chain |
CN110874726A (en) * | 2019-11-20 | 2020-03-10 | 上海思赞博微信息科技有限公司 | TPM-based digital currency security protection method |
CN110930145A (en) * | 2020-02-04 | 2020-03-27 | 江苏恒宝智能系统技术有限公司 | Cold wallet generation method, transaction information processing method, device and storage medium |
CN111507713A (en) * | 2020-04-09 | 2020-08-07 | 链博(成都)科技有限公司 | Asset and data integrated management method, system and terminal based on block chain |
CN111800262A (en) * | 2020-07-01 | 2020-10-20 | 北京金山云网络技术有限公司 | Digital asset processing method and device and electronic equipment |
-
2020
- 2020-10-27 CN CN202011160736.7A patent/CN112001717A/en active Pending
Patent Citations (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1272025A (en) * | 1999-02-18 | 2000-11-01 | 松下电器产业株式会社 | Electronic value flexible use system and method service device and record medium |
US20120082311A1 (en) * | 2000-11-02 | 2012-04-05 | Oleg Rashkovskiy | Content protection using block reordering |
US20080103982A1 (en) * | 2006-06-19 | 2008-05-01 | Ayman Hammad | Terminal Data Encryption |
CN101039182A (en) * | 2007-03-07 | 2007-09-19 | 广东南方信息安全产业基地有限公司 | Authentication system and method for issuing user identification certificate |
CN101277191A (en) * | 2007-03-30 | 2008-10-01 | 埃森哲全球服务有限公司 | Non-repudiation for digital content delivery |
US8966269B2 (en) * | 2007-07-27 | 2015-02-24 | Microsoft Corporation | Integrity protected smart card transaction |
CN101719250A (en) * | 2009-12-10 | 2010-06-02 | 中国联合网络通信集团有限公司 | Payment authentication method, platform and system |
US20110296171A1 (en) * | 2010-05-28 | 2011-12-01 | Christina Fu | Key recovery mechanism |
CN102316378A (en) * | 2011-09-23 | 2012-01-11 | 清华大学深圳研究生院 | Digital copyright protection method based on set-top box and system |
CN102611943A (en) * | 2012-02-24 | 2012-07-25 | 福建鑫诺通讯技术有限公司 | Method for realizing user payment by applying additional SIM card to set-top box |
CN202496036U (en) * | 2012-03-08 | 2012-10-17 | 佛山市南海科西亚数码电气有限公司 | Set-top box with payment function |
CN106533675A (en) * | 2016-12-19 | 2017-03-22 | 北京洋浦伟业科技发展有限公司 | Digital signature method and system |
CN107453862A (en) * | 2017-05-15 | 2017-12-08 | 杭州复杂美科技有限公司 | Private key generation storage and the scheme used |
CN108229962A (en) * | 2018-01-04 | 2018-06-29 | 众安信息技术服务有限公司 | Right management method and system based on block chain |
CN109523267A (en) * | 2018-10-30 | 2019-03-26 | 苏宁易购集团股份有限公司 | A kind of verification method, the apparatus and system of the transaction data based on block chain |
CN109088902A (en) * | 2018-11-05 | 2018-12-25 | 江苏恒宝智能系统技术有限公司 | Register method and device, authentication method and device |
CN109547218A (en) * | 2019-01-18 | 2019-03-29 | 北京工业大学 | It is a kind of improve BIP agreement alliance's chain node code key distribution and standby system |
CN109660359A (en) * | 2019-01-22 | 2019-04-19 | 上海易酷信息技术服务有限公司 | Generate the method, equipment and the method for generating the credible address of HD wallet of HD wallet business card |
CN109816362A (en) * | 2019-01-28 | 2019-05-28 | 杭州复杂美科技有限公司 | Red packet processing method, equipment and storage medium |
CN109961276A (en) * | 2019-02-27 | 2019-07-02 | 深圳市朗科科技股份有限公司 | Digital cash wallet, method of commerce, transaction system and computer storage medium |
CN110490589A (en) * | 2019-08-30 | 2019-11-22 | 新明华区块链技术(深圳)有限公司 | Hardware wallet creation method, device and hardware wallet |
CN110838912A (en) * | 2019-11-18 | 2020-02-25 | 深圳前海微众银行股份有限公司 | Key management method, device, equipment and computer medium based on block chain |
CN110874726A (en) * | 2019-11-20 | 2020-03-10 | 上海思赞博微信息科技有限公司 | TPM-based digital currency security protection method |
CN110930145A (en) * | 2020-02-04 | 2020-03-27 | 江苏恒宝智能系统技术有限公司 | Cold wallet generation method, transaction information processing method, device and storage medium |
CN111507713A (en) * | 2020-04-09 | 2020-08-07 | 链博(成都)科技有限公司 | Asset and data integrated management method, system and terminal based on block chain |
CN111800262A (en) * | 2020-07-01 | 2020-10-20 | 北京金山云网络技术有限公司 | Digital asset processing method and device and electronic equipment |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112989384A (en) * | 2021-03-26 | 2021-06-18 | 重庆倍来电新能源有限公司 | Block chain prediction machine network and data transmission method |
CN114697019A (en) * | 2022-02-24 | 2022-07-01 | 南京工程学院 | User account privacy protection method and system |
CN114697019B (en) * | 2022-02-24 | 2023-12-15 | 南京工程学院 | User account privacy protection method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11818269B2 (en) | Computer-implemented system and method providing a decentralised protocol for the recovery of cryptographic assets | |
US7739733B2 (en) | Storing digital secrets in a vault | |
CN100576196C (en) | Content enciphering method, system and utilize this encryption method that the method for content is provided by network | |
KR20230157929A (en) | Transfer cryptocurrency from a remote access restricted wallet | |
CN102123143B (en) | Method for storing data in network safely | |
CN101022337A (en) | Network identification card realizing method | |
CN106656907A (en) | Authentication method, apparatus, terminal device and system | |
CN101847296A (en) | Integrated circuit, encrypt communication apparatus, system and method and information processing method | |
CN101803270A (en) | Method and system for encryption of data | |
CN112001717A (en) | Method, system and storage medium for calculating encryption currency of digital television | |
CN111047305A (en) | Private key storage and mnemonic method for encrypted digital currency wallet based on digital watermarking technology | |
CN113037486B (en) | Power distribution automation information encryption method based on quantum reinforcement | |
CN103559454A (en) | Data protection system and method | |
CN110046511A (en) | Leaking data method, apparatus, equipment and storage medium are prevented based on alliance's chain | |
CN1741074B (en) | Method for preventing bank credit cards from unauthorized use | |
CN107155113A (en) | The method and server of a kind of protection barrage information | |
JP5289476B2 (en) | Communication device and key calculation device | |
Torki et al. | Blockchain for steganography: advantages, new algorithms and open challenges | |
KR20200001178A (en) | Digital wallet operation method for applying Mnemonic code | |
JP2021175184A5 (en) | ||
CN111596890A (en) | Block chain random number seed generation method, equipment and medium based on distributed protocol | |
CN109936530B (en) | Secret key sharing method based on cloud outsourcing and access control system thereof | |
CN100486157C (en) | Distribution type data encryption method | |
CN113868450A (en) | Remote sensing image safety retrieval method based on block chain | |
CN112150142B (en) | Digital currency generation method and device based on quantum random numbers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |