CN112001717A - Method, system and storage medium for calculating encryption currency of digital television - Google Patents

Method, system and storage medium for calculating encryption currency of digital television Download PDF

Info

Publication number
CN112001717A
CN112001717A CN202011160736.7A CN202011160736A CN112001717A CN 112001717 A CN112001717 A CN 112001717A CN 202011160736 A CN202011160736 A CN 202011160736A CN 112001717 A CN112001717 A CN 112001717A
Authority
CN
China
Prior art keywords
public key
top box
key
sub
card number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011160736.7A
Other languages
Chinese (zh)
Inventor
杨钦
吴卫国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Telecast Technology Co ltd
Original Assignee
Sichuan Telecast Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Telecast Technology Co ltd filed Critical Sichuan Telecast Technology Co ltd
Priority to CN202011160736.7A priority Critical patent/CN112001717A/en
Publication of CN112001717A publication Critical patent/CN112001717A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/443OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB

Abstract

The invention discloses a method for calculating encryption currency of a digital television, which comprises the following steps: acquiring a word lexicon, and randomly selecting words in the word lexicon to generate a mnemonic word sequence; converting the mnemonic word sequence into seeds according to a conversion rule; encrypting the seed to generate a root private key and a root public key; generating a sub public key library according to the root public key, and randomly selecting a sub public key from the sub public key library; generating a corresponding grandchild public key according to the child public key; selecting a set-top box card number range, presetting the set-top box card number, finding out a corresponding unique set-top box card number according to the grandchild public key serial number, and performing payment operation; after the grandchild public key is used, a new child public key is randomly selected from the child public key library until the corresponding set-top box card number is matched. The invention also discloses a cryptocurrency calculation system of the digital television and a storage medium which stores the cryptocurrency calculation system and can be loaded by the processor and executes the method.

Description

Method, system and storage medium for calculating encryption currency of digital television
Technical Field
The invention relates to the field of cryptocurrency, in particular to a cryptocurrency calculation method, a cryptocurrency calculation system and a storage medium of a digital television.
Background
The digital television charging needs to correspond specific charging to a set top box or an intelligent card, so that a condition receiving system knows how to authorize the set top box and the decentralized and anonymous characteristics of encryption currency, the payment of the encryption currency is difficult to correspond to a payer in reality, the encryption currency, such as bit currency payment, is a string of characters, encrypted and hidden, generally speaking, the user cannot track who pays but only knows the payment from a certain address, and therefore the payment of the encryption currency is difficult to be hooked with the set top box corresponding to the payment.
Disclosure of Invention
Aiming at the problems, the invention provides a method, a system and a storage medium for calculating the cryptocurrency of a digital television, which are provided with a hook for conveniently and simply hooking the set top box corresponding to the cryptocurrency and payment.
The technical scheme of the invention is as follows:
in one aspect, the invention provides a method for calculating cryptocurrency of a digital television, which comprises the following steps:
step 1: acquiring a word lexicon, and randomly selecting words in the word lexicon to generate a mnemonic word sequence;
step 2: converting the mnemonic word sequence into seeds according to a conversion rule;
and step 3: encrypting the seed to generate a root private key and a root public key;
and 4, step 4: generating a sub public key library according to the root public key, and randomly selecting a sub public key from the sub public key library;
and 5: generating a corresponding grandchild public key according to the child public key;
step 6: selecting a set-top box card number range, presetting the set-top box card number, finding out a corresponding unique set-top box card number according to the grandchild public key serial number, and performing payment operation;
and 7: and after the grandchild public key is used, randomly selecting a new child public key from the child public key library, and repeating the steps 4 to 6 to match the corresponding set-top box card number.
The working principle of the technical scheme is as follows:
the technical scheme designs a wallet similar to an HD wallet for charging.
From the mnemonic lexicon (generally 2048 selected words, which are single words for Chinese), a group, for example 15, is randomly selected: the face-facing lead damage is bent and steamed to call and cover the peaceful sleep drift estimate, namely the mnemonic word sequence; calculating a set of random number sequences, i.e. seeds, from the set of mnemonics using a function, such as a function like HMAC-SHA 512; calculating a group of public keys and a group of private keys from the seeds (random number sequences) by using an algorithm, wherein the two groups of keys are root key pairs; according to the algorithm defined in BIP32, for a certain set of parent public keys, then it is certain to calculate its nth set of child keys; each set top box has an independent serial number, and when the set top boxes leave a factory, each set top box is endowed with an independent random serial number which is an integer of a power of 31 less than 2; calculating a sub public key library according to the serial numbers of all the set-top boxes (namely the serial number library of the set-top boxes) from the root public key, and determining a sub secret key (a set-top box public key) corresponding to each set-top box according to the serial numbers; calculating a sub-private key library according to the serial numbers of all the set-top boxes (namely the serial number library of the set-top boxes) from the root private key, and determining a sub-private key (a set-top private key) corresponding to each set-top box according to the serial numbers; when the set-top box leaves a factory, writing a public and private key pair of the set-top box; during transaction, a server (a charging party) randomly selects an integer of a 31-power party smaller than 2 as a serial number of a transaction key, and calculates the transaction key for all set top boxes, namely a transaction key bank of the transaction, wherein the calculation method is that a public key and a private key of each set top box are used as parent keys, and the nth group (n is the serial number of the transaction key) of the public key and the private key of each set top box is calculated; the server broadcasts the address of the transaction and the transaction key sequence number; after the set-top box receives the transaction address and the transaction key serial number, the transaction key is calculated according to the stored set-top box key and the transaction serial number, and payment is finished; after the server receives the payment information, traversing the transaction key bank, namely comparing the key in the transaction information with a group of keys in the transaction key bank, and finding out the serial number of the set top box completing the transaction; thus, the server obtains all information of the transaction and can authorize the set-top box.
The method comprises the steps of generating a mnemonic word sequence BIP39 mnemonic character, converting the mnemonic word sequence into a seed BIP39 seed by using PBKDF2, wherein PBKDF2 is simply to repeatedly calculate salt-added Hash encryption for a plurality of times, the times are selectable, if the time required for calculating once is 1 microsecond, 1 million times of calculation is required to be 1 second, if a rainbow table required for attacking a password has 1 million pieces, the time required for establishing the corresponding rainbow table is 115 days, and the cost is enough for most attackers to forget. Selecting a mnemonic word sequence from a mnemonic word library, calculating a group of seeds according to the mnemonic word sequence, and calculating a pair of public and private keys, namely a root key pair, according to the seeds; taking the root public key as a parent key, a determined sub-key space, namely 32-power sub-keys of 2 can be calculated, wherein the first half is a common sub-key, namely a key bank used by us; the second half is a hard sub-key which is temporarily not used; mapping the serial number of the set-top box to a sub-key space, namely, one serial number of the set-top box corresponds to one sub-key; during transaction, the child key corresponding to the set-top box is used as a parent key, a key bank of the parent key, namely a grandchild key bank, is calculated, and one group of key banks is randomly selected as a transaction key, so that the transaction initiated by the set-top box can be tracked in each transaction.
The root private key BIP32 root key and the root public key are generated using the encryption method HMAC-SHA 512. The root public key is generated into a sub public key according to BIP32, wherein the node layout is set by BIP44, BIP43 adds an expansion m/purpose '/' of sub index identification purpose to a BIP32 tree structure, BIP44 adds multi-currency on the basis of BIP43 and BIP32, a plurality of addresses can be derived through HD wallet, the bitcoin of a main network and a test network can be managed simultaneously, BIP44 proposes a 5-layer path proposal as follows: the definition of m/purpose '/core _ type '/account '/change/address _ index, BIP32 is HD wallet, and a system can generate a tree structure from a single seed to store multiple sets of private and public keys, because all only need the seed, and can be easily backed up, transferred to other compatible devices, and layered rights control. BIP32 is a core proposal of HD wallet, generates a main private key through a seed, and then derives a great amount of sub private keys and addresses, and is designed through BIP32 to remember a mnemonic word sequence and reconstruct the whole key library, according to BIP32, 31-power ordinary sub keys of 2 and hard sub keys with the same quantity can be generated from a group of root keys to strengthen the sub private keys, the root private key and the root public key generate ordinary sub keys and hard sub keys, 31-power ordinary sub keys of the former 2 are hard sub keys, the latter half are hard sub keys, the sub private keys can be derived according to a father public key, or the son public keys and the son private keys of the father private key, so that the algorithm does not need the participation of the private key when deriving the son public keys, and the security is improved. The parent key is the key used to derive the child keys, the grandchild key can be regarded as the transaction key, the common key is the key that we generally use, the hard child key is defined in BIP32, and a group of parent keys can be calculated to generate the 32 nd power child keys of 2, in this embodiment, the first half is used as the child key library.
In practice, a range, such as serial numbers 80000000 to 90000000, is selected as a corresponding card number, each set top box is endowed with a unique card number for addressing the range, each grandchild public key serial number corresponds to a set top box card number, the server calculates a corresponding grandchild public key library and a corresponding charging address library according to the card number range, the grandchild public key library is regenerated after each use, and after one group of grandchild public keys are used, a new group of grandchild public keys are randomly selected to generate a new grandchild public key library.
The current valid sub-public key and the charging rate are broadcasted, and due to the fact that each broadcast channel is different, each time broadcast, selecting a plurality of sub public keys from the sub public key library according to the number of the broadcast channels, wherein each sub public key corresponds to one channel to be broadcast, after the set-top box receives the effective sub public keys, the set-top box generates a grandchild public key base of the charge according to the valid child public keys, the set-top box calculates the corresponding grandchild public key according to the card number of the set-top box, then, according to the grandchild public key, calculating out the corresponding charging link, generating two-dimension code and displaying, the user scans the two-dimension code to pay, after the server receives, finding out the card number of the local set-top box according to the grandchild public key in the received payment address, finding out the paid set-top box, finally calculating the authorization information according to the card number and the money amount, sending the authorization information to the conditional access system, and authorizing the set-top box through the conditional access system.
In a further technical scheme, a method for randomly selecting words in the word lexicon to generate a mnemonic word sequence comprises the following steps: the word thesaurus has 2048 words, and 12 words are randomly selected in the word thesaurus to generate the mnemonic word sequence.
The method for randomly selecting the words in the word library to generate the mnemonic word sequence solves the technical problem that the seeds are not recorded easily when the seeds are a string of long random numbers due to the fact that the mnemonic word sequence is not available in the prior art.
In a further technical scheme, the mnemonic word sequence is converted into seeds according to a conversion rule, and a pseudorandom function is applied to derive the conversion rule of the key, so that the mnemonic word sequence is converted into the seeds.
The transformation rule of the key is derived by applying a pseudorandom function, so that the technical problem that a string of seeds is long and cannot be well recorded and has potential safety hazards in the prior art is solved.
In a further technical scheme, a sub public key library is generated according to the root public key, and a method for randomly selecting one sub public key in the sub public key library is as follows: the root public key generates a 32 th power sub-key of 2; randomly selecting a segment from the 31 th power sub-key of the first 2 as a sub-public key library.
A section of the first 31 th power sub-key is randomly selected as a sub-public key library, the total number of the sub-keys can be 2 32 th power, the first 2 th power 31 st power is a common sub-key, and the second half is a hard sub-key. In a further technical scheme, the method for finding out the corresponding unique set-top box card number according to the grandchild public key sequence number is as follows: the server calculates a corresponding grandchild public key library and a corresponding charging address library according to the card number range; the charging address library comprises charging rates; the set-top box calculates the corresponding grandchild public key sequence number and charging link according to the charging rate and the child public key; and finding out the corresponding set-top box card number according to the corresponding grandchild public key serial number.
And finding the corresponding set-top box card number according to the corresponding grandchild public key serial number, thereby solving the technical problem that the encrypted currency payment is difficult to be hooked with the set-top box corresponding to the payment in the prior art.
In a further technical solution, the method of performing payment operations is as follows: and generating a two-dimensional code according to the charging link, and scanning the two-dimensional code by a user to pay.
And generating a two-dimensional code according to the charging link, and scanning the two-dimensional code by a user to pay, thereby solving the technical problem that the program is complicated and troublesome when the user pays the fee of the digital television set-top box in the prior art.
In a further technical scheme, after a user scans a two-dimensional code to pay, a server receives payment information, the server determines a charging address according to the payment information, determines a card number corresponding to the set top box according to the charging address, calculates authorization information according to the card number and the payment information, sends the authorization information to a conditional access system, and authorizes the set top box through the conditional access system.
And calculating authorization information according to the card number and the payment information, sending the authorization information to a conditional access system, and authorizing the set top box through the conditional access system, thereby solving the technical problem that the encrypted currency payment in the prior art is difficult to correspond to a payer in reality.
In another aspect, the present invention provides a cryptocurrency calculation system for a digital television, the system comprising: acquisition unit, conversion unit, encryption unit, screening unit and matching unit, wherein: the acquisition unit is used for acquiring a word bank and acquiring mnemonic word sequences in the word bank; the conversion unit is used for converting the mnemonic word series into seeds and generating corresponding grandchild public keys according to the child public keys; the encryption unit is used for encrypting the seeds to generate a root private key and a root public key; the screening unit is used for generating the root public key into a sub public key library and selecting a sub public key from the sub public key library; and the matching unit is used for matching the corresponding set top box card number according to the grandchild public key serial number.
A cryptocurrency calculation system of a digital television solves the technical problem that the cryptocurrency payment is difficult to be hooked with a set top box corresponding to the payment in the prior art.
In a further aspect, the system further comprises: the authorization unit is used for authorizing the set top box through the conditional access system; and the storage unit is used for storing the calculation program of the encryption currency, storing the range of the card number of the set-top box, storing the charging address library, storing the two-dimensional code generated by the charging link and storing the payment information and the authorization information.
The authorization unit and the storage solve the technical problems of authorizing the set top box and storing all related information through the conditional access system in the prior art.
In another aspect, the present invention provides a computer readable storage medium storing a program capable of being loaded by a processor and executing the above method.
The invention has the beneficial effects that: 1. When the seed is a long string of random numbers, the recording is convenient;
2. the encryption currency algorithm in the technology has safety at the same time;
3. the encrypted currency payment is easier to be hooked with a set top box corresponding to the payment, and the encrypted currency payment is easier to correspond to a payer in reality;
4. the program is convenient and quick when the user pays the fee of the digital television set-top box.
Drawings
Fig. 1 is a flowchart of a cryptocurrency calculation method of a digital television according to an embodiment of the present invention;
fig. 2 is a flowchart of a cryptocurrency calculation system of a digital television according to an embodiment of the present invention.
Description of reference numerals:
10. a collection unit; 11. a conversion unit; 12. an encryption unit; 20. a screening unit; 30. a matching unit; 40. an authorization unit; 50. and a memory unit.
Detailed Description
The embodiments of the present invention will be further described with reference to the accompanying drawings.
Example (b):
as shown in fig. 1, a cryptocurrency calculation method for a digital tv includes the following steps:
step 1: acquiring a word lexicon, and randomly selecting words in the word lexicon to generate a mnemonic word sequence;
step 2: converting the mnemonic word sequence into seeds according to a conversion rule;
and step 3: encrypting the seed to generate a root private key and a root public key;
and 4, step 4: generating a sub public key library according to the root public key, and randomly selecting a sub public key from the sub public key library;
and 5: generating a corresponding grandchild public key according to the child public key;
step 6: selecting a set-top box card number range, presetting the set-top box card number, finding out a corresponding unique set-top box card number according to the grandchild public key serial number, and performing payment operation;
and 7: and after the grandchild public key is used, randomly selecting a new child public key from the child public key library, and repeating the steps 4 to 6 to match the corresponding set-top box card number.
The working principle of the technical scheme is as follows:
the technical scheme designs a wallet similar to an HD wallet for charging. From the mnemonic lexicon (generally 2048 selected words, which are single words for Chinese), a group, for example 15, is randomly selected: the face-facing lead damage is bent and steamed to call and cover the peaceful sleep drift estimate, namely the mnemonic word sequence; calculating a set of random number sequences, i.e. seeds, from the set of mnemonics using a function, such as a function like HMAC-SHA 512; calculating a group of public keys and a group of private keys from the seeds (random number sequences) by using an algorithm, wherein the two groups of keys are root key pairs; according to the algorithm defined in BIP32, for a certain set of parent public keys, then it is certain to calculate its nth set of child keys; each set top box has an independent serial number, and when the set top boxes leave a factory, each set top box is endowed with an independent random serial number which is an integer of a power of 31 less than 2; calculating a sub public key library according to the serial numbers of all the set-top boxes (namely the serial number library of the set-top boxes) from the root public key, and determining a sub secret key (a set-top box public key) corresponding to each set-top box according to the serial numbers; calculating a sub-private key library according to the serial numbers of all the set-top boxes (namely the serial number library of the set-top boxes) from the root private key, and determining a sub-private key (a set-top private key) corresponding to each set-top box according to the serial numbers; when the set-top box leaves a factory, writing a public and private key pair of the set-top box; when in transaction, the server (charging party) randomly selects an integer of 31 times smaller than 2 as the serial number of the transaction key, and calculates the transaction key for all the set-top boxes, namely the transaction key bank of the transaction,
the calculation method is that the public key and the private key of each set-top box are used as father keys, and the nth (n is a transaction key serial number) group of child keys are calculated; the server broadcasts the address of the transaction and the transaction key sequence number; after the set-top box receives the transaction address and the transaction key serial number, the transaction key is calculated according to the stored set-top box key and the transaction serial number, and payment is finished; after the server receives the payment information, traversing the transaction key bank, namely comparing the key in the transaction information with a group of keys in the transaction key bank, and finding out the serial number of the set top box completing the transaction; thus, the server obtains all information of the transaction and can authorize the set-top box.
In the technical scheme, a mnemonic word sequence BIP39 mnemonic symbol is firstly generated, the mnemonic word sequence is converted into a seed BIP39 seed by using PBKDF2, PBKDF2 simply means that salt-added Hash encryption is repeatedly calculated for multiple times, the times are selectable, if the time required for calculating once is 1 microsecond, 1 million times of calculation needs 1 second, if a rainbow table required for attacking a password has 1 million pieces, the time required for establishing the corresponding rainbow table is 115 days, and the cost is enough for most attackers to forget.
The mnemonic word sequence is converted into seeds according to a conversion rule, and from memory to sowing, a user may decide to protect their memory with a password. If no passphrase exists, then the null string "" is used. To create a binary seed from the mnemonics, we used the pbkdf2 function and the mnemonic sentence (utf-8nfkd) as the password, the string "mnemonic" + pass phrase (again, utf-8nfkd) as the salt iteration count set to 2048, and the HMAC-SHA512 as the pseudorandom function. The derived key is 512 bits (64 bytes) in length. This seed may later generate a deterministic wallet using BIP-0032 or a similar method. The conversion of the mnemonic sentence into a binary seed is completely independent of the generation of the sentence. This results in a rather simple code, the sentence structure is not limited and the client is free to implement its own word list and even the whole sentence generator, thereby providing flexibility of the word list for error detection or other purposes. Although mnemonics other than the algorithm described in the "generate mnemonics" section may be used, it is not recommended that the software use the word list to calculate a checksum for the mnemonic sentence and issue a warning if not valid. The described method also provides plausible denials, since each passphrase will produce a valid seed (and thus a definitive wallet), but only the correct one will produce the required wallet. Selecting a mnemonic word sequence from a mnemonic word library, calculating a group of seeds according to the mnemonic word sequence, and calculating a pair of public and private keys, namely a root key pair, according to the seeds; taking the root public key as a parent key, a determined sub-key space, namely 32-power sub-keys of 2 can be calculated, wherein the first half is a common sub-key, namely a key bank used by us; the second half is a hard sub-key which is temporarily not used; mapping the serial number of the set-top box to a sub-key space, namely, one serial number of the set-top box corresponds to one sub-key; during transaction, the child key corresponding to the set-top box is used as a parent key, a key bank of the parent key, namely a grandchild key bank, is calculated, and one group of key banks is randomly selected as a transaction key, so that the transaction initiated by the set-top box can be tracked in each transaction.
The root private key BIP32 root key and the root public key are generated using the encryption method HMAC-SHA 512. BIP32 is defined as an HD wallet, and is a system that generates a tree structure from a single seed to store multiple sets of private and public keys. Because only the seed is needed, backup, transfer to other compatible devices, and layered rights control can be facilitated. The root public key is generated into a sub public key according to BIP32, wherein the node layout is set by BIP44, BIP43 adds an expansion m/purpose '/' of sub index identification purpose to a BIP32 tree structure, BIP44 adds multi-currency on the basis of BIP43 and BIP32, a plurality of addresses can be derived through HD wallet, the bitcoin of a main network and a test network can be managed simultaneously, BIP44 proposes a 5-layer path proposal as follows: m/purpose '/core _ type '/account '/change/address _ index, BIP32 is the core proposal of HD wallet, generates the main private key by seed, then derives a great deal of sub-private keys and addresses, and the purpose of design through BIP32 is to remember mnemonic word sequences, reconstruct the whole key library, according to BIP32, a group of seeds (seeds, random numbers) can be obtained according to a certain algorithm from a group of root keys to generate a common subkey of 31 powers of 2 and a same number of hard subkeys, a root private key and a root public key to generate a common subkey and a hard subkey, the common subkey of 31 powers of the first 2 is a common subkey, the hard subkey of the second half is a hard subkey, the whole key system is based on a mnemonic word sequence, then, according to the algorithm defined in BIP32, a set of public and private keys is obtained, which is the root key, and the child keys are derived from the root key layer by layer, and the parent keys are derived from the child keys by the next layer. The child public key can be derived according to the parent public key, or the child public key and the child private key can be derived according to the parent private key, and the child private key can be derived only according to the parent private key, so that the algorithm does not need the participation of the private key when deriving the child public key, and the safety is improved. The parent key is the key used to derive the child keys, the grandchild key can be regarded as the transaction key, the common key is the key that we generally use, the hard child key is defined in BIP32, and a group of parent keys can be calculated to generate the 32 nd power child keys of 2, in this embodiment, the first half is used as the child key library.
In practice, a range, such as serial numbers 80000000 to 90000000, is selected as a corresponding card number, each set top box is endowed with a unique card number for addressing the range, each grandchild public key serial number corresponds to a set top box card number, the server calculates a corresponding grandchild public key library and a corresponding charging address library according to the card number range, the grandchild public key library is regenerated after each use, and after one group of grandchild public keys are used, a new group of grandchild public keys are randomly selected to generate a new grandchild public key library.
The current valid sub-public key and the charging rate are broadcasted, and due to the fact that each broadcast channel is different, each time broadcast, selecting a plurality of sub public keys from the sub public key library according to the number of the broadcast channels, wherein each sub public key corresponds to one channel to be broadcast, after the set-top box receives the effective sub public keys, the set-top box generates a grandchild public key base of the charge according to the valid child public keys, the set-top box calculates the corresponding grandchild public key according to the card number of the set-top box, then, according to the grandchild public key, calculating out the corresponding charging link, generating two-dimension code and displaying, the user scans the two-dimension code to pay, after the server receives, finding out the card number of the local set-top box according to the grandchild public key in the received payment address, finding out the paid set-top box, finally calculating the authorization information according to the card number and the money amount, sending the authorization information to the conditional access system, and authorizing the set-top box through the conditional access system.
In another embodiment, the method for obtaining the word lexicon in step 1 and randomly selecting the words in the word lexicon to generate the mnemonic word sequence comprises the following steps:
the word thesaurus has 2048 words, and 12 words are randomly selected in the word thesaurus to generate the mnemonic word sequence.
In this embodiment, after the method for randomly selecting words in the word lexicon to generate the mnemonic word sequence is converted into the mnemonic word sequence, the mnemonic word sequence is convenient to store and record, so that the problem that the seed is not easy to record when the seed is a string of long random numbers due to no mnemonic word sequence is solved.
In another embodiment, the conversion rule in step 2 is:
applying a pseudorandom function to derive a transformation rule for the key such that the sequence of mnemonics is transformed into a seed.
The transformation rule of deriving the key by applying a pseudo-random function can well record when a string of seeds is too long to record and ensure the safety during recording, the mnemonic word sequence uses PBKDF2, PBKDF2 applies a pseudo-random function to derive the key, and the length of the derived key is essentially unlimited.
In another embodiment, the step 4 generates a sub public key library according to the root public key, and a method for randomly selecting one sub public key from the sub public key library includes:
the root public key generates a 32 th power sub-key of 2;
randomly selecting a segment from the 31 th power sub-key of the first 2 as a sub-public key library.
A section of the first 31 th power sub-key is randomly selected as a sub-public key base, the total number of the sub-keys can be 2 32 th power, the first 2 st 31 th power is a common sub-key, and the second half is a hard sub-key.
In another embodiment, the method for selecting the range of the number of the set-top box card in step 6, presetting the number of the set-top box card, and finding the corresponding unique number of the set-top box card according to the grandchild public key number includes the following steps:
the server calculates a corresponding grandchild public key library and a corresponding charging address library according to the card number range;
the charging address library comprises charging rates;
the set-top box calculates the corresponding grandchild public key sequence number and charging link according to the charging rate and the child public key;
and finding out the corresponding set-top box card number according to the corresponding grandchild public key serial number.
And finding the corresponding set-top box card number according to the corresponding grandchild public key serial number, wherein one grandchild public key serial number corresponds to one unique set-top box card number, so that the encrypted currency payment is hooked by the set-top box corresponding to the payment.
In another embodiment, the method for performing the payment operation in step 6 is as follows:
and generating a two-dimensional code according to the charging link, and scanning the two-dimensional code by a user to pay.
The user scans the two-dimensional code to pay, and the technical problem that in the prior art, the program is complicated and troublesome when the user pays the fee of the digital television set top box is solved.
In another embodiment, the two-dimensional code is generated according to the charging link, and the method for the user to scan the two-dimensional code for payment is as follows:
after a user scans the two-dimensional code to pay, the server receives payment information, determines a charging address according to the payment information, determines a card number corresponding to the set top box according to the charging address, calculates authorization information according to the card number and the payment information and sends the authorization information to a condition receiving system;
and authorizing the set top box through the conditional access system.
And calculating authorization information according to the card number and the payment information, sending the authorization information to a conditional access system, authorizing the set top box through the conditional access system, and making the encrypted currency payment correspond to a payer in reality.
In another embodiment, as shown in fig. 2, the present embodiment discloses a cryptocurrency calculation system for a digital television, the system comprising: acquisition unit, conversion unit, encryption unit, screening unit and matching unit, wherein:
the acquisition unit is used for acquiring a word bank and acquiring mnemonic word sequences in the word bank;
the conversion unit is used for converting the mnemonic word series into seeds and generating corresponding grandchild public keys according to the child public keys;
the encryption unit is used for encrypting the seeds to generate a root private key and a root public key;
the screening unit is used for generating the root public key into a sub public key library and selecting a sub public key from the sub public key library;
and the matching unit is used for matching the corresponding set top box card number according to the grandchild public key serial number.
In another embodiment, a cryptocurrency calculation system for digital television, the system further comprising:
and the authorization unit is used for authorizing the set top box through the conditional access system.
And the storage unit is used for storing the calculation program of the encryption currency, storing the range of the card number of the set-top box, storing the charging address library, storing the two-dimensional code generated by the charging link and storing the payment information and the authorization information.
The above-mentioned embodiments only express the specific embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention.

Claims (10)

1. A cryptocurrency calculation method for a digital television is characterized by comprising the following steps:
step 1: acquiring a word lexicon, and randomly selecting words in the word lexicon to generate a mnemonic word sequence;
step 2: converting the mnemonic word sequence into seeds according to a conversion rule;
and step 3: encrypting the seed to generate a root private key and a root public key;
and 4, step 4: generating a sub public key library according to the root public key, and randomly selecting a sub public key from the sub public key library;
and 5: generating a corresponding grandchild public key according to the child public key;
step 6: selecting a set-top box card number range, presetting the set-top box card number, finding out a corresponding unique set-top box card number according to the grandchild public key serial number, and performing payment operation;
and 7: and after the grandchild public key is used, randomly selecting a new child public key from the child public key library, and repeating the steps 4 to 6 to match the corresponding set-top box card number.
2. The method for calculating the cryptocurrency of the digital television as claimed in claim 1, wherein the method for obtaining the word lexicon in the step 1 and randomly selecting the words in the word lexicon to generate the mnemonic word sequence comprises the following steps:
the word thesaurus has 2048 words, and 12 words are randomly selected in the word thesaurus to generate the mnemonic word sequence.
3. The method of claim 1, wherein the conversion rule in step 2 is:
applying a pseudorandom function to derive a transformation rule for the key such that the sequence of mnemonics is transformed into a seed.
4. The method for calculating the cryptocurrency of the digital television set as claimed in claim 1, wherein the method for generating the sub public key library according to the root public key in the step 4 is as follows:
the root public key generates a 32 th power sub-key of 2;
randomly selecting a segment from the 31 th power sub-key of the first 2 as a sub-public key library.
5. The method for calculating the cryptocurrency of the digital television as set forth in claim 1, wherein the method for selecting the range of the set-top box card number, presetting the set-top box card number and finding the corresponding unique set-top box card number according to the grandchild public key number in the step 6 is as follows:
the server calculates a corresponding grandchild public key library and a corresponding charging address library according to the card number range;
the charging address library comprises charging rates;
the set-top box calculates the corresponding grandchild public key sequence number and charging link according to the charging rate and the child public key;
and finding out the corresponding set-top box card number according to the corresponding grandchild public key serial number.
6. The cryptocurrency calculation method of digital tv as claimed in claim 1, wherein the payment operation in step 6 is performed by the following method:
and generating a two-dimensional code according to the charging link, and scanning the two-dimensional code by a user to pay.
7. The method of claim 6, wherein the two-dimensional code is generated according to the charging link, and the user scans the two-dimensional code to pay the account as follows:
after a user scans the two-dimensional code to pay, the server receives payment information, determines a charging address according to the payment information, determines a card number corresponding to the set top box according to the charging address, calculates authorization information according to the card number and the payment information and sends the authorization information to a condition receiving system;
and authorizing the set top box through the conditional access system.
8. A cryptocurrency calculation system for digital television, the system comprising: acquisition unit, conversion unit, encryption unit, screening unit and matching unit, wherein:
the acquisition unit is used for acquiring a word bank and acquiring mnemonic word sequences in the word bank;
the conversion unit is used for converting the mnemonic word series into seeds and generating corresponding grandchild public keys according to the child public keys;
the encryption unit is used for encrypting the seeds to generate a root private key and a root public key;
the screening unit is used for generating the root public key into a sub public key library and selecting the sub public key from the sub public key library;
and the matching unit is used for matching the corresponding set top box card number according to the grandchild public key sequence number.
9. The cryptocurrency calculation system of digital television according to claim 8, wherein said system further comprises:
the authorization unit is used for authorizing the set top box through the conditional access system;
the storage unit is used for storing a calculation program of the encryption currency, storing the range of the card number of the set-top box, storing a charging address library, storing a two-dimensional code generated by a charging link and storing payment information and authorization information.
10. A computer-readable storage medium storing a computer program which can be loaded by a processor and which executes the method according to any one of claims 1 to 7.
CN202011160736.7A 2020-10-27 2020-10-27 Method, system and storage medium for calculating encryption currency of digital television Pending CN112001717A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011160736.7A CN112001717A (en) 2020-10-27 2020-10-27 Method, system and storage medium for calculating encryption currency of digital television

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011160736.7A CN112001717A (en) 2020-10-27 2020-10-27 Method, system and storage medium for calculating encryption currency of digital television

Publications (1)

Publication Number Publication Date
CN112001717A true CN112001717A (en) 2020-11-27

Family

ID=73475219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011160736.7A Pending CN112001717A (en) 2020-10-27 2020-10-27 Method, system and storage medium for calculating encryption currency of digital television

Country Status (1)

Country Link
CN (1) CN112001717A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112989384A (en) * 2021-03-26 2021-06-18 重庆倍来电新能源有限公司 Block chain prediction machine network and data transmission method
CN114697019A (en) * 2022-02-24 2022-07-01 南京工程学院 User account privacy protection method and system

Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1272025A (en) * 1999-02-18 2000-11-01 松下电器产业株式会社 Electronic value flexible use system and method service device and record medium
CN101039182A (en) * 2007-03-07 2007-09-19 广东南方信息安全产业基地有限公司 Authentication system and method for issuing user identification certificate
US20080103982A1 (en) * 2006-06-19 2008-05-01 Ayman Hammad Terminal Data Encryption
CN101277191A (en) * 2007-03-30 2008-10-01 埃森哲全球服务有限公司 Non-repudiation for digital content delivery
CN101719250A (en) * 2009-12-10 2010-06-02 中国联合网络通信集团有限公司 Payment authentication method, platform and system
US20110296171A1 (en) * 2010-05-28 2011-12-01 Christina Fu Key recovery mechanism
CN102316378A (en) * 2011-09-23 2012-01-11 清华大学深圳研究生院 Digital copyright protection method based on set-top box and system
US20120082311A1 (en) * 2000-11-02 2012-04-05 Oleg Rashkovskiy Content protection using block reordering
CN102611943A (en) * 2012-02-24 2012-07-25 福建鑫诺通讯技术有限公司 Method for realizing user payment by applying additional SIM card to set-top box
CN202496036U (en) * 2012-03-08 2012-10-17 佛山市南海科西亚数码电气有限公司 Set-top box with payment function
US8966269B2 (en) * 2007-07-27 2015-02-24 Microsoft Corporation Integrity protected smart card transaction
CN106533675A (en) * 2016-12-19 2017-03-22 北京洋浦伟业科技发展有限公司 Digital signature method and system
CN107453862A (en) * 2017-05-15 2017-12-08 杭州复杂美科技有限公司 Private key generation storage and the scheme used
CN108229962A (en) * 2018-01-04 2018-06-29 众安信息技术服务有限公司 Right management method and system based on block chain
CN109088902A (en) * 2018-11-05 2018-12-25 江苏恒宝智能系统技术有限公司 Register method and device, authentication method and device
CN109523267A (en) * 2018-10-30 2019-03-26 苏宁易购集团股份有限公司 A kind of verification method, the apparatus and system of the transaction data based on block chain
CN109547218A (en) * 2019-01-18 2019-03-29 北京工业大学 It is a kind of improve BIP agreement alliance's chain node code key distribution and standby system
CN109660359A (en) * 2019-01-22 2019-04-19 上海易酷信息技术服务有限公司 Generate the method, equipment and the method for generating the credible address of HD wallet of HD wallet business card
CN109816362A (en) * 2019-01-28 2019-05-28 杭州复杂美科技有限公司 Red packet processing method, equipment and storage medium
CN109961276A (en) * 2019-02-27 2019-07-02 深圳市朗科科技股份有限公司 Digital cash wallet, method of commerce, transaction system and computer storage medium
CN110490589A (en) * 2019-08-30 2019-11-22 新明华区块链技术(深圳)有限公司 Hardware wallet creation method, device and hardware wallet
CN110838912A (en) * 2019-11-18 2020-02-25 深圳前海微众银行股份有限公司 Key management method, device, equipment and computer medium based on block chain
CN110874726A (en) * 2019-11-20 2020-03-10 上海思赞博微信息科技有限公司 TPM-based digital currency security protection method
CN110930145A (en) * 2020-02-04 2020-03-27 江苏恒宝智能系统技术有限公司 Cold wallet generation method, transaction information processing method, device and storage medium
CN111507713A (en) * 2020-04-09 2020-08-07 链博(成都)科技有限公司 Asset and data integrated management method, system and terminal based on block chain
CN111800262A (en) * 2020-07-01 2020-10-20 北京金山云网络技术有限公司 Digital asset processing method and device and electronic equipment

Patent Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1272025A (en) * 1999-02-18 2000-11-01 松下电器产业株式会社 Electronic value flexible use system and method service device and record medium
US20120082311A1 (en) * 2000-11-02 2012-04-05 Oleg Rashkovskiy Content protection using block reordering
US20080103982A1 (en) * 2006-06-19 2008-05-01 Ayman Hammad Terminal Data Encryption
CN101039182A (en) * 2007-03-07 2007-09-19 广东南方信息安全产业基地有限公司 Authentication system and method for issuing user identification certificate
CN101277191A (en) * 2007-03-30 2008-10-01 埃森哲全球服务有限公司 Non-repudiation for digital content delivery
US8966269B2 (en) * 2007-07-27 2015-02-24 Microsoft Corporation Integrity protected smart card transaction
CN101719250A (en) * 2009-12-10 2010-06-02 中国联合网络通信集团有限公司 Payment authentication method, platform and system
US20110296171A1 (en) * 2010-05-28 2011-12-01 Christina Fu Key recovery mechanism
CN102316378A (en) * 2011-09-23 2012-01-11 清华大学深圳研究生院 Digital copyright protection method based on set-top box and system
CN102611943A (en) * 2012-02-24 2012-07-25 福建鑫诺通讯技术有限公司 Method for realizing user payment by applying additional SIM card to set-top box
CN202496036U (en) * 2012-03-08 2012-10-17 佛山市南海科西亚数码电气有限公司 Set-top box with payment function
CN106533675A (en) * 2016-12-19 2017-03-22 北京洋浦伟业科技发展有限公司 Digital signature method and system
CN107453862A (en) * 2017-05-15 2017-12-08 杭州复杂美科技有限公司 Private key generation storage and the scheme used
CN108229962A (en) * 2018-01-04 2018-06-29 众安信息技术服务有限公司 Right management method and system based on block chain
CN109523267A (en) * 2018-10-30 2019-03-26 苏宁易购集团股份有限公司 A kind of verification method, the apparatus and system of the transaction data based on block chain
CN109088902A (en) * 2018-11-05 2018-12-25 江苏恒宝智能系统技术有限公司 Register method and device, authentication method and device
CN109547218A (en) * 2019-01-18 2019-03-29 北京工业大学 It is a kind of improve BIP agreement alliance's chain node code key distribution and standby system
CN109660359A (en) * 2019-01-22 2019-04-19 上海易酷信息技术服务有限公司 Generate the method, equipment and the method for generating the credible address of HD wallet of HD wallet business card
CN109816362A (en) * 2019-01-28 2019-05-28 杭州复杂美科技有限公司 Red packet processing method, equipment and storage medium
CN109961276A (en) * 2019-02-27 2019-07-02 深圳市朗科科技股份有限公司 Digital cash wallet, method of commerce, transaction system and computer storage medium
CN110490589A (en) * 2019-08-30 2019-11-22 新明华区块链技术(深圳)有限公司 Hardware wallet creation method, device and hardware wallet
CN110838912A (en) * 2019-11-18 2020-02-25 深圳前海微众银行股份有限公司 Key management method, device, equipment and computer medium based on block chain
CN110874726A (en) * 2019-11-20 2020-03-10 上海思赞博微信息科技有限公司 TPM-based digital currency security protection method
CN110930145A (en) * 2020-02-04 2020-03-27 江苏恒宝智能系统技术有限公司 Cold wallet generation method, transaction information processing method, device and storage medium
CN111507713A (en) * 2020-04-09 2020-08-07 链博(成都)科技有限公司 Asset and data integrated management method, system and terminal based on block chain
CN111800262A (en) * 2020-07-01 2020-10-20 北京金山云网络技术有限公司 Digital asset processing method and device and electronic equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112989384A (en) * 2021-03-26 2021-06-18 重庆倍来电新能源有限公司 Block chain prediction machine network and data transmission method
CN114697019A (en) * 2022-02-24 2022-07-01 南京工程学院 User account privacy protection method and system
CN114697019B (en) * 2022-02-24 2023-12-15 南京工程学院 User account privacy protection method and system

Similar Documents

Publication Publication Date Title
US11818269B2 (en) Computer-implemented system and method providing a decentralised protocol for the recovery of cryptographic assets
US7739733B2 (en) Storing digital secrets in a vault
CN100576196C (en) Content enciphering method, system and utilize this encryption method that the method for content is provided by network
KR20230157929A (en) Transfer cryptocurrency from a remote access restricted wallet
CN102123143B (en) Method for storing data in network safely
CN101022337A (en) Network identification card realizing method
CN106656907A (en) Authentication method, apparatus, terminal device and system
CN101847296A (en) Integrated circuit, encrypt communication apparatus, system and method and information processing method
CN101803270A (en) Method and system for encryption of data
CN112001717A (en) Method, system and storage medium for calculating encryption currency of digital television
CN111047305A (en) Private key storage and mnemonic method for encrypted digital currency wallet based on digital watermarking technology
CN113037486B (en) Power distribution automation information encryption method based on quantum reinforcement
CN103559454A (en) Data protection system and method
CN110046511A (en) Leaking data method, apparatus, equipment and storage medium are prevented based on alliance's chain
CN1741074B (en) Method for preventing bank credit cards from unauthorized use
CN107155113A (en) The method and server of a kind of protection barrage information
JP5289476B2 (en) Communication device and key calculation device
Torki et al. Blockchain for steganography: advantages, new algorithms and open challenges
KR20200001178A (en) Digital wallet operation method for applying Mnemonic code
JP2021175184A5 (en)
CN111596890A (en) Block chain random number seed generation method, equipment and medium based on distributed protocol
CN109936530B (en) Secret key sharing method based on cloud outsourcing and access control system thereof
CN100486157C (en) Distribution type data encryption method
CN113868450A (en) Remote sensing image safety retrieval method based on block chain
CN112150142B (en) Digital currency generation method and device based on quantum random numbers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination