CN112950207A - Intelligent terminal and method for improving data transmission safety - Google Patents

Intelligent terminal and method for improving data transmission safety Download PDF

Info

Publication number
CN112950207A
CN112950207A CN202110325720.5A CN202110325720A CN112950207A CN 112950207 A CN112950207 A CN 112950207A CN 202110325720 A CN202110325720 A CN 202110325720A CN 112950207 A CN112950207 A CN 112950207A
Authority
CN
China
Prior art keywords
words
key
mnemonic
public key
word
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110325720.5A
Other languages
Chinese (zh)
Inventor
惠富会
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Beilaidian New Energy Co ltd
Original Assignee
Chongqing Beilaidian New Energy Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Beilaidian New Energy Co ltd filed Critical Chongqing Beilaidian New Energy Co ltd
Priority to CN202110325720.5A priority Critical patent/CN112950207A/en
Publication of CN112950207A publication Critical patent/CN112950207A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/237Lexical tools
    • G06F40/242Dictionaries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes

Abstract

The invention discloses an intelligent terminal and a method for improving data transmission security, which comprises the following steps of S1: selecting words from a daily common word bank to construct an intelligent auxiliary mnemonic word bank; s2: selecting n words from the constructed intelligent auxiliary mnemonic word stock to form a word group to generate m mnemonic words; s3: enhancing the mnemonic words by adopting a key stretching function to obtain a root key so as to generate a private key; s4: and generating a public key by using an elliptic curve algorithm and storing the public key in the online wallet. The invention establishes the intelligent auxiliary mnemonic word lexicon by selecting words, then selects words from the established intelligent auxiliary mnemonic word lexicon to construct mnemonic words, then deduces a secret key by the mnemonic words, and stores the secret key in the online wallet as identity authentication, the money of the user still exists in the offline wallet, and the offline wallet carries out transaction after the identity authentication in the online wallet passes, thereby reducing the complexity of the identity authentication before the transaction and also improving the safety of the online transaction.

Description

Intelligent terminal and method for improving data transmission safety
Technical Field
The invention relates to the technical field of block chains, in particular to an intelligent terminal and a method for improving data transmission safety.
Background
With the development of the technology, the block chain technology is mature day by day, and the matched intelligent terminal is also developed vigorously. The intelligent terminal is mainly used for financial transactions, and the main safety problem is how to prevent and detect attacks such as secondary payment behaviors, selfish mining and the like and whether good fault-tolerant capability exists.
The selfish mining method is a theoretical attack method threatening the security and fairness of the bitcoin system, and obtains higher relative benefit by adopting a proper strategy to release the blocks generated by the selfish mining method; in addition, Eclipse attacks the network communication of the control target object to form a network partition and block transaction propagation; the Sybil attack affects system security by producing large numbers of meaningless nodes. Therefore, the security of the blockchain intelligent terminal needs to be considered.
The prior art adopts an off-line wallet, and money in an account is off-line, so that the wallet is only used on line during transaction, which is safe under the condition of less transaction times, but is not suitable for online large-scale transaction, and the time for identity authentication of each off-line wallet is long. With the maturity and application of the blockchain technology, online transactions can be scaled, and great examination is brought to the security of the online wallet.
Disclosure of Invention
Aiming at the problem that the security of data transmission from an intelligent terminal to a block chain platform is low in the prior art, the invention provides an intelligent terminal and a method for improving the security of data transmission.
In order to achieve the purpose, the invention provides the following technical scheme:
a method for improving data transmission security specifically comprises the following steps:
s1: selecting words from the dictionary to construct an intelligent auxiliary mnemonic word library;
s2: selecting n words from the constructed intelligent auxiliary mnemonic word stock to form a word group to generate m mnemonic words;
s3: enhancing the mnemonic words by adopting a key stretching function to obtain a root key so as to generate a private key;
s4: generating a public key by using an elliptic curve algorithm and storing the public key in the online wallet;
s5: the intelligent terminal collects external data, signs the external data by using the generated private key and the public key, and sends the signed external data to the block chain platform after the intelligent terminal and the block chain platform pass authentication.
Preferably, the words are selected according to the following requirements:
the first four letters clearly identify words, namely, words with different first 4 letters are selected;
similar vocabularies are avoided, and the same letters between words cannot exceed 80 percent, otherwise misspelling is easily caused;
the words are encoded in UTF-8 using a normalized form compatibility decomposition;
the word lists are ordered in the order of alphabet, so that the searching efficiency is improved;
the dictionary tree is used for realizing the storage of the intelligent auxiliary mnemonic word lexicon, and the compression and the query are convenient.
Preferably, the number of the selected words is 2048.
Preferably, the mnemonic word generation step is as follows:
selecting n words from the constructed intelligent auxiliary mnemonic word library to generate a first sequence with the length of L;
calculating a hash value of the first sequence by adopting a hash algorithm, and taking the first K bits of the hash value as a check code of the first sequence, wherein K is L/32;
combining the first sequence and the check code to obtain a second sequence, namely the first sequence and the check code;
and dividing the second sequence into m groups to obtain m binary numbers, wherein m is (L + K)/11, and querying a word list defined by the BIP39 protocol by using each binary number to obtain m mnemonics.
Preferably, the S3 includes:
s3-1: adopting a PBKDF2 function, taking mnemonics and salt as input parameters, and then repeatedly operating to finally generate a root key;
s3-2: and calculating the root key by adopting an irreversible HMAC-SHA512 algorithm to obtain a 512-bit hash string, wherein the first 256 bits of the hash string are the private key.
Preferably, the salt includes a constant string and a password.
Preferably, the public key is generated by elliptic curve cryptography: K-K x G, where K represents a public key, i.e., a point of an elliptic curve; k represents a private key randomly generated for the user; g is indicated as the base point of the elliptic curve.
The invention also provides an intelligent terminal, which comprises a data acquisition module, a communication module, a secret key generation module, a storage module and a controller, wherein,
the data acquisition module is used for acquiring external data; the communication module is used for establishing communication connection with the block chain platform; the key generation module comprises a wallet address generation unit, a private key generation unit and a public key generation unit; the storage module is used for storing external data, a wallet address, a public key and a private key; the controller is configured to sign the external data using a public key and a private key.
Preferably, the key generation module includes a wallet address generation unit, a private key generation unit, and a public key generation unit.
In summary, due to the adoption of the technical scheme, compared with the prior art, the invention at least has the following beneficial effects:
the invention establishes the intelligent auxiliary mnemonic word lexicon by selecting words, then selects words from the established intelligent auxiliary mnemonic word lexicon to construct mnemonic words, then deduces a secret key by the mnemonic words, and stores the secret key in the online wallet as identity authentication, the money of the user still exists in the offline wallet, and the offline wallet carries out transaction after the identity authentication in the online wallet passes, thereby reducing the complexity of the identity authentication before the transaction and also improving the safety of the online transaction.
Meanwhile, a distributed method is adopted to generate a key to replace a central key, each device has an independent key and can perform identification and authentication with the block chain platform, namely, data acquired by the intelligent terminal can be directly transmitted to the block chain platform, malicious modification of a third party is avoided, and the safety of data transmission is improved.
Description of the drawings:
fig. 1 is a schematic diagram of a method for improving data transmission security according to an exemplary embodiment of the present invention.
Fig. 2 is a schematic diagram of an intelligent terminal according to an exemplary embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to examples and embodiments. It should be understood that the scope of the above-described subject matter is not limited to the following examples, and any techniques implemented based on the disclosure of the present invention are within the scope of the present invention.
In the description of the present invention, it is to be understood that the terms "longitudinal", "lateral", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are used merely for convenience of description and for simplicity of description, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed in a particular orientation, and be operated, and thus, are not to be construed as limiting the present invention.
As shown in fig. 1, the present invention provides a method for improving data transmission security, which specifically includes the following steps:
s1: and selecting a certain number of words from the daily common word lexicon to construct an intelligent auxiliary mnemonic word lexicon.
In the embodiment, 2048 English words are selected from the daily commonly used word bank, the English words are stored in the word bank partition in the modes of files, character array micro databases and the like, and the capacity and the service life of the embedded flash chip are considered at the same time to perform partition processing so as to construct the intelligent auxiliary memory-aid word bank.
The selected English word meets the following requirements:
1) the first four letters can clearly identify words, namely, words with different first 4 letters are selected; for example: the first 4 letters of the arch and the arch are the same, so that the selection requirement is not met.
2) Similar vocabularies are avoided, so that misspelling caused by misremembering words is avoided; for example, "woman" and "women", "build" and "build", i.e. words with letter identity less than 80% are selected;
3) the word list may contain native characters but requires encoding in UTF-8 using normalized form compatibility decomposition (NFKD).
4) The word list is ordered in alphabetical order to raise the searching efficiency.
5) The dictionary tree is used for realizing high-performance storage of the mnemonic word lexicon, and compression and query are facilitated.
S2: and selecting n words from the constructed intelligent auxiliary mnemonic word stock to form a word group to generate a mnemonic word, and displaying the word group to a user.
In this embodiment, n (preferably 6 to 12) words are selected from the constructed intelligent auxiliary mnemonic word lexicon to form a phrase, so as to generate a wallet of the intelligent terminal, and the wallet is displayed to the user in an interface mode. For the convenience of carrying, copying and memorizing, a small intelligent hardware display screen can be used for displaying, such as a liquid crystal display screen with the size of 128mm by 64 mm.
The mnemonic word generation steps are as follows:
5) selecting n words from the constructed intelligent assisted mnemonic word lexicon generates a first sequence with the length L, and L is preferably a multiple of 32 (one letter is one length).
6) Calculating a hash value of the first sequence by using a hash algorithm (for example, SHA256 algorithm), and taking the first K bits of the hash value as a check code of the first sequence (K ═ L/32);
7) combining the first sequence and the check code to obtain a second sequence, namely the first sequence and the check code;
8) dividing the second sequence into m groups to obtain m binary numbers, wherein m is (L + K)/11, and each 11 letters form one group; and then, querying a word list defined by the BIP39/BIP44BIP84 protocol by each binary number to obtain m mnemonics, and forming the wallet of the intelligent terminal.
S3: and enhancing the mnemonic words by adopting a key stretching function to obtain a root key, further generating a private key, and storing the private key in the storage module.
In this embodiment, the mnemonic words are from word lists defined by the sequence BIP39 protocol with a length of 128 to 256 bits,
s3-1: the existing key stretching function (PBKDF2 function) is adopted, mnemonics and salt are used as input parameters, and then operation is repeatedly carried out to finally generate the root key.
The PBKDF2 function parameters are as follows: 1) the mnemonic words are used as encrypted plaintext; 2) the words and phrases helping memory and the password entering the computer service are used as salt, the salt consists of constant character strings and an optional password, different passwords can be used, and the PBKDF2 function generates a different root key under the condition that the same mnemonic word is used.
S3-2: the root key is calculated by adopting an irreversible HMAC-SHA512 algorithm to obtain a 512-bit hash string, wherein the left 256 bits of the hash string are private keys, and the right 256 bits of the hash string are main chain codes.
In this embodiment, the BIP32 standard defines the generation rule of the wallet, all the hierarchical keys in the wallet are derived from the root key generated by S3-1, and the derivation process is determined, so that all the private keys can be memorized only by backing up the root key.
The root key calculates a 512-bit hash string through an irreversible HMAC-SHA512 algorithm, wherein the left 256 bits of the hash string are private keys, and the right 256 bits of the hash string are main chain codes;
the generated private key and the main chain code in the step are added with an index number, and the index number is used as the input of the HMAC-SHA512 algorithm to continuously derive the private key and the main chain code of the next layer, so that the private key can be generated infinitely.
In this embodiment, different protocols may generate different keys, that is, a separate method is adopted instead of the key uniformly issued by the center, which ensures that a third party cannot modify data. And the generated private key is stored in a storage module to prevent malicious reading. In general, the private key is not allowed to be read and disclosed, and only a deletion operation can be performed.
S4: and generating a public key by using an elliptic curve algorithm and storing the public key in the off-line wallet.
In this embodiment, in order to prevent the public key from being maliciously modified or deleted, once deleted, the private key needs to be regenerated.
The elliptic curve is an elliptic curve for cryptography, such as the SECP256K1 algorithm, which contains a total of 6 parameters: (p, a, b, G, n, h).
(1) First a and b are parameters in the elliptic curve algorithm equation that determine the elliptic curve equation used by the algorithm. Wherein each of them is a-0, b-7;
(2) a parameter p. Since the cryptographically used elliptic curve is defined over a finite field, for this curve the finite field used is gf (p). The specific value of p is such that the curve lies over a finite field of prime order p.
(3) The parameter G is a point on the elliptic curve, called the base point. The base points G of the compressed form are:
G=02 79BE667E F9DCBBAC 55A06295 CE870B07 029BFCDB 2DCE28D9 59F2815B 16F81798
in uncompressed form is
G=04 79BE667E F9DCBBAC 55A06295 CE870B07 029BFCDB 2DCE28D9 59F2815B 16F81798 483ADA77 26A3C465 5DA4FBFC 0E1108A8 FD17B448 A6855419 9C47D08F FB10D4B8
(4) The parameter n is the smallest positive integer such that nxg equals 0, also called the order of G. Here, multiplication refers to multiplication defined on an elliptic curve, 0 refers to a zero point on the elliptic curve, and a specific value of n is:
n=FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE BAAEDCE6 AF48A03B BFD25E8C D0364141。
(5) the parameter h is 1, is the ratio of the order of the group of elliptic curves to the order of the subgroup generated by G, also called co-factor, and is a parameter used in designing the elliptic curve, and this parameter is mainly used in the specific implementation for safety reasons.
The public key is generated by an elliptic curve cryptography algorithm (K ═ K × G), where in the formula:
k: public key (public key is a point on the elliptic curve);
k: the private key is a 32-byte array (16-system string representation) generated in the previous section and is randomly generated by a user;
g: generating a point (base point) for one;
as in the above formula, a public key K is generated by multiplying a predetermined generation point G with a private key K as a starting point, and since the generation points G of all bitcoil users are the same constant, a certain public key K is generated from a certain private key K and is unidirectional.
The specific use mode of the public key and the private key is as follows:
if used for key exchange, the procedure is as follows (the following multiplication refers to multiplication of points on an elliptic curve):
1. generating a private key Ka, and multiplying the private key Ka by a base point G to obtain a public key Ka;
2. generating a private key Kb, and multiplying the private key Kb by a base point G to obtain a public key Kb;
3. calculating (xk, yk) ═ ka × Kb, wherein xk is a key obtained by exchanging;
4. the (xk, yk) ═ kb × Ka is calculated, and xk is the key obtained by the exchange, and obviously the obtained key is the same.
S5: the public key is calculated by adopting a one-way Hash encryption algorithm to generate public key Hash to obtain a 160-bit (20-byte) number, then 4 bytes are generated by operation, the public key Hash and a check code are utilized to assemble (namely, the check code is placed behind the public key Hash) into a new intermediate value, the value is encoded by a base58 algorithm, and the public key is generated into a wallet address which is stored in the online wallet and used as identity authentication information.
In this embodiment, the wallet address is a character string composed of numbers and letters, and can be publicly shared. Most wallet addresses are encoded by public keys via base58, hashing public key addresses from 512 bits to 160 bits. The wallet address can be recovered in a private key and public key mode. The wallet address can be accessed by the outside, and an API (application programming interface) is provided, so that the application is convenient.
In the invention, the online wallet only stores the wallet address, and the offline wallet stores money, so that the online wallet can read and authenticate data on line at any time, thereby reducing the time of identity authentication and improving the efficiency; meanwhile, under the combined action of the two wallets, the safety of online transaction is also improved.
The invention adopts a distributed method to independently generate the wallet address, the public key and the private key and store the wallet address, the public key and the private key off line/on line, and does not need any central institution to issue the public key and the private key, thereby improving the security.
S6: and acquiring external data by using an industrial protocol (such as modbaus, RS-232 and the like), signing the external data by using the generated private key and public key, and sending the signed external data to the blockchain platform.
In this embodiment, the external data includes current, voltage, power, temperature, humidity, and the like.
In the prior art, the block chain platform cannot directly identify external data of other devices, so the external data must be processed. For example, a person directly inputs external data on the blockchain platform or a third-party platform encrypts the external data (in java, c + +, and the like) and transmits the encrypted external data to the blockchain platform. The person or the third-party platform can modify the external data, so that the safety of the data is reduced. And the external data transmission signature (the signature key is also issued by a third party, namely, the signature key is issued in a central mode and cannot be generated autonomously) is transmitted to the non-blockchain platform, and then is transmitted to the blockchain platform after being processed by the third party, wherein the non-blockchain platform can also modify the data, so that the safety of the data is reduced.
In this embodiment, the external device and the blockchain platform that collect the external data are both generated by using the method described in S1-S5, so that the blockchain platform can directly use the wallet address verification algorithm to verify the public key and the private key of the external device, and data transmission can be performed after the verification is passed.
Based on the method, as shown in fig. 2, the invention further provides an intelligent terminal, which comprises a data acquisition module, a communication module, a key generation module, a storage module and a controller.
The data acquisition module is used for acquiring external data; the communication module is used for establishing communication connection with the block chain platform; the key generation module comprises a wallet address generation unit, a private key generation unit and a public key generation unit; the storage module is used for storing external data, a wallet address, a public key and a private key; the controller is configured to sign the external data using a public key and a private key.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (9)

1. A method for improving data transmission security is characterized by comprising the following steps:
s1: selecting words from the dictionary to construct an intelligent auxiliary mnemonic word library;
s2: selecting n words from the constructed intelligent auxiliary mnemonic word stock to form a word group to generate m mnemonic words;
s3: enhancing the mnemonic words by adopting a key stretching function to obtain a root key so as to generate a private key;
s4: generating a public key by using an elliptic curve algorithm and storing the public key in the online wallet;
s5: the intelligent terminal collects external data, signs the external data by using the generated private key and the public key, and sends the signed external data to the block chain platform after the intelligent terminal and the block chain platform pass authentication.
2. The method according to claim 1, wherein in S1, the words selected from the dictionary meet the following requirements:
1) selecting words with different first 4 letters;
2) selecting words with letter identity rate less than 80%;
3) encoding with UTF-8 using normalized form compatibility decomposition;
4) the word list is ordered according to the first letter of the word in alphabetical order;
5) a dictionary tree is used.
3. The method of claim 1, wherein the number of selected words is 2048.
4. The method of claim 1, wherein the mnemonic word is generated by:
1) selecting n words from the constructed intelligent auxiliary mnemonic word library to generate a first sequence with the length of L;
2) calculating a hash value of the first sequence by adopting a hash algorithm, and taking the first K bits of the hash value as a check code of the first sequence, wherein K is L/32;
3) combining the first sequence and the check code to obtain a second sequence, namely the first sequence and the check code;
4) and dividing the second sequence into m groups to obtain m binary numbers, wherein m is (L + K)/11, and querying a word list defined by the BIP39 protocol by using each binary number to obtain m mnemonics.
5. The method of claim 1, wherein the S3 comprises:
s3-1: adopting a PBKDF2 function, taking mnemonics and salt as input parameters, and then repeatedly operating to finally generate a root key;
s3-2: and calculating the root key by adopting an irreversible HMAC-SHA512 algorithm to obtain a 512-bit hash string, wherein the first 256 bits of the hash string are the private key.
6. The method of claim 5, wherein the salt comprises a constant string and a password.
7. The method of claim 1, wherein the public key is generated by elliptic curve cryptography: K-K x G, where K represents a public key, i.e., a point of an elliptic curve; k represents a private key randomly generated for the user; g is indicated as the base point of the elliptic curve.
8. An intelligent terminal is characterized by comprising a data acquisition module, a communication module, a secret key generation module, a storage module and a controller, wherein,
the data acquisition module is used for acquiring external data; the communication module is used for establishing communication connection with the block chain platform; the key generation module is used for generating a wallet address, a public key and a private key; the storage module is used for storing external data, a wallet address, a public key and a private key; the controller is configured to sign the external data using a public key and a private key.
9. The intelligent terminal according to claim 8, wherein the key generation module includes a wallet address generation unit, a private key generation unit, and a public key generation unit.
CN202110325720.5A 2021-03-26 2021-03-26 Intelligent terminal and method for improving data transmission safety Pending CN112950207A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110325720.5A CN112950207A (en) 2021-03-26 2021-03-26 Intelligent terminal and method for improving data transmission safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110325720.5A CN112950207A (en) 2021-03-26 2021-03-26 Intelligent terminal and method for improving data transmission safety

Publications (1)

Publication Number Publication Date
CN112950207A true CN112950207A (en) 2021-06-11

Family

ID=76226855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110325720.5A Pending CN112950207A (en) 2021-03-26 2021-03-26 Intelligent terminal and method for improving data transmission safety

Country Status (1)

Country Link
CN (1) CN112950207A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115412454A (en) * 2022-04-28 2022-11-29 深圳大学 Detection method, device and equipment for selfish mining behavior and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170180134A1 (en) * 2015-12-21 2017-06-22 Mastercard International Incorporated Method and system for blockchain variant using digital signatures
CN107464118A (en) * 2017-08-16 2017-12-12 济南浪潮高新科技投资发展有限公司 A kind of data trade method based on block chain intelligence contract
CN109863520A (en) * 2018-11-27 2019-06-07 区链通网络有限公司 Wallet System and wallet application method and storage medium based on block chain
US20200026834A1 (en) * 2018-07-23 2020-01-23 One Kosmos Inc. Blockchain identity safe and authentication system
CN111930852A (en) * 2020-09-29 2020-11-13 北京百度网讯科技有限公司 Data processing method, device and equipment based on block chain and storage medium
CN112073183A (en) * 2020-08-07 2020-12-11 深圳区块大陆科技有限公司 Block chain account generation method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170180134A1 (en) * 2015-12-21 2017-06-22 Mastercard International Incorporated Method and system for blockchain variant using digital signatures
CN107464118A (en) * 2017-08-16 2017-12-12 济南浪潮高新科技投资发展有限公司 A kind of data trade method based on block chain intelligence contract
US20200026834A1 (en) * 2018-07-23 2020-01-23 One Kosmos Inc. Blockchain identity safe and authentication system
CN109863520A (en) * 2018-11-27 2019-06-07 区链通网络有限公司 Wallet System and wallet application method and storage medium based on block chain
CN112073183A (en) * 2020-08-07 2020-12-11 深圳区块大陆科技有限公司 Block chain account generation method
CN111930852A (en) * 2020-09-29 2020-11-13 北京百度网讯科技有限公司 Data processing method, device and equipment based on block chain and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
谢跃书等: "《区块链 以太坊App钱包开发实战》", 31 January 2020, 北京:北京航空航天大学出版社, pages: 63 - 65 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115412454A (en) * 2022-04-28 2022-11-29 深圳大学 Detection method, device and equipment for selfish mining behavior and storage medium
CN115412454B (en) * 2022-04-28 2023-07-07 深圳大学 Detection method, device, equipment and storage medium for selfish mining behavior

Similar Documents

Publication Publication Date Title
CN109716375B (en) Block chain account processing method, device and storage medium
Dechand et al. An Empirical Study of Textual {Key-Fingerprint} Representations
CN110490589B (en) Hardware wallet creating method and device and hardware wallet
CN114640444B (en) Privacy protection set intersection acquisition method and device based on domestic cryptographic algorithm
CN111325535A (en) Block chain private key management method, system and storage medium based on elliptic curve migration
CN115017107A (en) Data retrieval method and device based on privacy protection, computer equipment and medium
CN116324778A (en) Updatable private collection intersections
CN110659470B (en) Authentication method and authentication system for off-line physical isolation
CN112950207A (en) Intelligent terminal and method for improving data transmission safety
CN112989384A (en) Block chain prediction machine network and data transmission method
CN114142996A (en) Searchable encryption method based on SM9 cryptographic algorithm
US20060192651A1 (en) Data transmit system and transmit methods by using n-dimensional information
CN104320247A (en) Shared key protection method based on elliptical curve and fingerprint fuzzy vault
CN116707766A (en) Quantum attack resistant digital signature method based on hash
CN111368317A (en) Computer data encryption system and method
CN1102776C (en) Dynamic electronic cipher system
CN114401116B (en) Trusted data transmission method based on HK-Means and security detection
CN1258157C (en) Card reader and a method for reading of cards
CN111475690B (en) Character string matching method and device, data detection method and server
CN110585727B (en) Resource acquisition method and device
US11275869B2 (en) Credit card and operating method therefor
Chakraborty et al. BSMFS: Blockchain assisted secure multi-keyword fuzzy search over encrypted data
CN111030823A (en) Ultra-lightweight multi-signature data processing method and system and Internet of things platform
Panja et al. An Efficient And Secure Fingerprint Based Authentication Scheme Using Elliptic Curve Cryptography.
CN113014397B (en) Quick and safe identity authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination