CN111127019B - Method, system and device for backing up mnemonic words - Google Patents

Method, system and device for backing up mnemonic words Download PDF

Info

Publication number
CN111127019B
CN111127019B CN201911406278.8A CN201911406278A CN111127019B CN 111127019 B CN111127019 B CN 111127019B CN 201911406278 A CN201911406278 A CN 201911406278A CN 111127019 B CN111127019 B CN 111127019B
Authority
CN
China
Prior art keywords
backup
mnemonic word
mnemonic
strategy
factor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911406278.8A
Other languages
Chinese (zh)
Other versions
CN111127019A (en
Inventor
蔡光辉
陆道如
高岚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengbao Intelligent System Technology Co Ltd
Original Assignee
Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengbao Intelligent System Technology Co Ltd filed Critical Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority to CN201911406278.8A priority Critical patent/CN111127019B/en
Publication of CN111127019A publication Critical patent/CN111127019A/en
Application granted granted Critical
Publication of CN111127019B publication Critical patent/CN111127019B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a method, a system and a device for backing up mnemonic words, wherein the method comprises the following steps: the communication terminal completes authentication and selects a mnemonic word backup strategy and sends the mnemonic word backup strategy to the intelligent card; generating a second backup factor according to a backup strategy selected by a user, and encrypting the backup mnemonic words of the backup strategy of the previous mnemonic word together with the first backup factor generated by the smart card; and obtaining the target ciphertext backup mnemonic word and the check sum after judgment, and sending the target ciphertext backup mnemonic word and the check sum to the intelligent card for backup. The method can be used for backing up the mnemonic words with simple operation, safety, reliability and low risk.

Description

Method, system and device for backing up mnemonic words
Technical Field
The invention relates to the technical field of smart cards, in particular to a method, a system and a device for backing up mnemonics.
Background
The blockchain is a system gradually formed based on architecture concepts such as a P2P network technology, an encryption technology, a timestamp technology, a blockchain technology and the like. The blockchain technology is increasingly emphasized, wherein a block is a single storage unit and records all communication information of each block node within a certain time. Blockchain techniques are based on decentralization and trust is achieved through different participant interactions, ownership of their accounts being determined by digital keys, account addresses and digital signatures. The digital key is not actually stored in the network but is generated by the user and then stored in a file called a wallet or simply a database. The digital keys stored in the user's wallet are completely independent and can be generated and managed by the user's wallet program without reference to a blockchain or access to the network. The key implements features that include decentralized trust and control ownership authentication and a cryptographic proof-based security model. The block chain wallet generation method comprises the following steps: generating mnemonics and generating a private key of the deterministic wallet according to the mnemonics; generating a public key by the private key; then the public key generates a wallet address; once the mnemonic is determined, control is given to the generated wallet; the particularity and importance of the security of mnemonics in blockchain technology is seen.
The blockchain wallet is formed by generating a private key of the blockchain wallet through a specific algorithm, and the random sequence and the checksum correspond to words in the mnemonic word bank so as to be convenient for a user to memorize, so that the key of the blockchain wallet is the mnemonic word, and if the mnemonic word is lost, the blockchain wallet cannot be recovered. In the existing block chain technology, the current key backup has the following defects: when the wallet is created, the user needs to be prompted to accurately and unmistakably record the characteristics of each mnemonic word in sequence during the backup of the mnemonic words by handwriting, the operation is complicated, the storage is not easy, and the loss is easy; when the mnemonics and the private key are backed up to the smart card SIM at the same time, the SIM is used during each signature, the risk of SIM loss is high, and the block chain account loss is easily caused.
The traditional mode of storing the mnemonics by paper or manually memorizing leads the operation of the user for backing up the mnemonics to be complicated, has low reliability and safety from the aspects of physical safety and information safety, and increases the risk that the user loses the block chain wallet and assets. The mode of backing up the mnemonic words into the two-dimensional code only confirms whether the two-dimensional code exists on the computer or not by detecting whether a screen capture key exists or not, the generated backup two-dimensional code is easy to be snooped by other people, and the safety effect is not high. The backup of the mnemonic words through long-distance wireless communication brings the safety risk that the mnemonic words are intercepted and captured in the wireless communication due to the overlong communication distance.
Therefore, how to provide a backup mnemonic word scheme with simple operation, safety, reliability and low risk is a technical problem to be solved in the field.
Disclosure of Invention
An object of the present invention is to provide a method, a system, and a device for backing up mnemonics, which solve the technical problems of complicated operation, low security and reliability, and high risk of losing an account of a user who backs up mnemonics in the prior art.
In particular, the present invention provides a method for backing up mnemonics, comprising:
the communication terminal receives a safety authentication instruction, selects a mnemonic word backup strategy when authentication is completed and sends the mnemonic word backup strategy to the intelligent card;
receiving a first backup factor generated by the smart card according to the selected mnemonic word backup strategy;
generating a second backup factor according to a backup strategy selected by a user, wherein the second backup factor and the first backup factor jointly encrypt a backup mnemonic word generated by a previous mnemonic word backup strategy to obtain a temporary backup mnemonic word and a checksum; and when the selection times of the mnemonic word backup strategy reach or exceed a time threshold value, converting the temporary backup mnemonic words and the check sum into a target ciphertext backup mnemonic word and the check sum, and sending the target ciphertext backup mnemonic word and the check sum to the intelligent card.
Optionally, wherein the method further comprises:
receiving a security authentication instruction, and selecting a mnemonic word backup strategy to send to the smart card when authentication is completed;
receiving a first import factor generated by the smart card according to the selected mnemonic word backup strategy;
generating a second import factor according to a backup strategy selected by a user, and generating an authentication instruction to be sent to the smart card for authentication when the selection times of the mnemonic word backup strategy is judged to reach or exceed the time threshold;
receiving the target ciphertext backup mnemonic word and the check sum fed back after the smart card is successfully authenticated;
and reading and importing the mnemonic words to a recovery wallet when the selected mnemonic word backup strategy, the first import factor and the second import factor are used for completing the verification and decryption of the target ciphertext backup mnemonic words.
Optionally, wherein the method further comprises:
and using the selected mnemonic word backup strategy, the first lead-in factor and the second lead-in factor to make the target ciphertext backup mnemonic word and the verification and the decryption inconsistent, and locking the smart card when the reading times on the smart card reach or exceed a reading time threshold value.
Optionally, wherein the method further comprises:
and when the selected mnemonic word backup strategy, the first import factor and the second import factor are used for verifying and decrypting the target ciphertext mnemonic words in inconsistent mode, and the reading times on the intelligent card do not reach the reading time threshold value, different mnemonic word backup strategies are selected again, an authentication instruction is generated, and the authentication instruction is sent to the intelligent card for authentication.
Optionally, the receiving a security authentication instruction, and when the authentication is completed, selecting a mnemonic word backup policy and sending the mnemonic word backup policy to the smart card includes:
receiving a first safety certification instruction, and generating and displaying a second safety certification interface when the first safety certification instruction is consistent with the preset first safety certification data;
and receiving a second security authentication instruction, and generating a mnemonic word backup strategy according to a preset mnemonic word backup strategy and sending the mnemonic word backup strategy to the smart card when the second security authentication instruction is compared with the preset second security authentication data to be consistent.
Optionally, wherein the method further comprises:
and when the selection times of the mnemonic word backup strategy are judged to be not up to the encryption time threshold, different mnemonic word backup strategies are selected repeatedly, a first backup factor of the smart card end and a second backup factor of the communication terminal are obtained, and an authentication instruction is generated and sent to the smart card for authentication until the selection times of the backup strategy reach the number time threshold.
The invention also provides a system for backing up mnemonic words, which comprises: a communication terminal and a smart card; the communication terminal is connected with the intelligent card through short-distance wireless communication;
the communication terminal comprises: a memory aid word backup instruction processor and a memory aid word backup verification processor;
the smart card comprises: a backup factor generation processor and a mnemonic word backup processor; wherein the content of the first and second substances,
the mnemonic word backup instruction processor is connected with the mnemonic word backup verification processor, receives a safety certification instruction, selects a mnemonic word backup strategy when the certification is finished and sends the strategy to the intelligent card;
the mnemonic word backup verification processor is connected with the mnemonic word backup instruction processor and the mnemonic word restoration instruction processor, generates a second backup factor according to a backup strategy selected by a user, and encrypts the backup mnemonic word generated by a previous mnemonic word backup strategy by the second backup factor and the first backup factor together to obtain a temporary backup mnemonic word and a checksum; when the selection times of the mnemonic word backup strategy reach or exceed a time threshold value, converting the temporary backup mnemonic words and the check sum into a target ciphertext backup mnemonic word and the check sum, and sending the target ciphertext backup mnemonic word and the check sum to the smart card;
the backup factor generation processor is connected with the mnemonic word backup processor, generates a first backup factor according to the selected mnemonic word backup strategy and sends the first backup factor to the communication terminal;
and the mnemonic word backup processor is connected with the backup factor generation processor and the import factor generation processor and is used for receiving the target ciphertext mnemonic words and the check sum for backup.
Optionally, the communication terminal further includes: the mnemonic word restoring instruction processor is connected with the mnemonic word backup verification processor, receives a safety certification instruction, selects a mnemonic word backup strategy when the certification is finished and sends the strategy to the intelligent card;
receiving a first import factor generated by the smart card according to the selected mnemonic word backup strategy;
generating and generating a second import factor according to a backup strategy selected by a user, and generating an authentication instruction to be sent to the smart card for authentication when the selection times of the mnemonic word backup strategy is judged to reach or exceed the time threshold;
receiving the target ciphertext backup mnemonic word and the check sum fed back after the smart card is successfully authenticated;
and reading and importing the mnemonic words to a recovery wallet when the selected mnemonic word backup strategy, the first import factor and the second import factor are used for completing the verification and decryption of the target ciphertext backup mnemonic words.
In another aspect, the present invention provides an apparatus for backing up mnemonics, including: the system comprises a mnemonic word backup instruction module and a mnemonic word backup verification module;
the mnemonic word backup instruction module is connected with the mnemonic word backup verification module, receives a safety authentication instruction, selects a mnemonic word backup strategy when authentication is completed and sends the strategy to the smart card;
the mnemonic word backup verification module is connected with the mnemonic word backup instruction module and used for receiving a first backup factor generated by the intelligent card according to the selected mnemonic word backup strategy; generating a second backup factor according to a backup strategy selected by a user, and encrypting a backup mnemonic word generated by a previous mnemonic word backup strategy by the second backup factor and the first backup factor together to obtain a temporary backup mnemonic word and a checksum; and when the selection times of the mnemonic word backup strategy reach or exceed a time threshold value, converting the temporary backup mnemonic words and the check sum into a target ciphertext backup mnemonic word and the check sum, and sending the target ciphertext backup mnemonic word and the check sum to the intelligent card.
Optionally, wherein the apparatus further comprises: the mnemonic word restoration instruction module is connected with the mnemonic word backup verification module, receives a safety authentication instruction, selects a mnemonic word backup strategy when authentication is completed and sends the strategy to the smart card;
receiving a first import factor generated by the smart card according to the selected mnemonic word backup strategy;
generating a second import factor according to a backup strategy selected by a user, and generating an authentication instruction to be sent to the smart card for authentication when the selection times of the mnemonic word backup strategy is judged to reach or exceed the time threshold;
receiving the target ciphertext backup mnemonic word and the check sum fed back after the smart card is successfully authenticated;
and reading and importing the mnemonic words to a recovery wallet when the selected mnemonic word backup strategy, the first import factor and the second import factor are used for completing the verification and decryption of the target ciphertext backup mnemonic words.
The method, the system and the device for backing up the mnemonics take the intelligent card as a medium for storing the mnemonics, and the mnemonics of the block chain wallet are backed up on the intelligent card by the function, so that the possibility of intercepting the mnemonics in the wireless communication process is greatly reduced by ultra-short distance communication. In the backup and recovery process of the mnemonic words, both the communication terminal and the intelligent card adopt a multiple matching mode to encrypt and decrypt data, the communication terminal and the intelligent card can generate user participation factors in the backup and recovery process, and any single party cannot completely recover the mnemonic words, so that the safety coefficient of backup and recovery of the mnemonic words is greatly improved.
The communication terminal is used as a medium for reading and writing the smart card, so that safety mechanisms such as reading and writing control, authority control and the like are added, and a verification strategy and reading times are required to be set before the mnemonic words are written; after verification is successful, the mnemonic words can be read; if the verification is wrong and exceeds the set times, the card is automatically locked and destroyed; from the physical perspective, the smart card has obvious advantages compared with paper storage from the perspectives of moisture prevention, theft prevention, loss prevention, storage time and the like. And the user can select different backup strategies at the same security level through the pictures, so that the user can use the backup strategy more conveniently without losing the security level, and the user experience is improved.
Near field wireless communication is added on the communication terminal for reading and writing the smart card; in the wallet creating process of a user, the manual recording of mnemonic words is replaced by setting the operation steps of smart card verification, reading and writing times, backup of the mnemonic words and the like, and the efficiency of backup of the mnemonic words and the safety of the mnemonic words are improved to the greatest extent on the premise of not changing the main stream of the wallet creating process; when the mnemonic words need to be led in, the equipment can be used for checking and reading the mnemonic words through the short-distance wireless communication, and the wallet recovery is carried out on the equipment after the mnemonic words are successfully read. The conventional paper storage or manual memory mode of the mnemonic words is replaced by fully utilizing the conventional safety technical means, so that the convenience of backup of the mnemonic words is greatly improved; the reliability and the safety of the backup mnemonic words are improved from the aspects of physical safety and information safety, and the risk that a user loses a block chain wallet and assets is reduced.
The above and other objects, advantages and features of the present invention will become more apparent to those skilled in the art from the following detailed description of specific embodiments thereof, taken in conjunction with the accompanying drawings.
Drawings
Some specific embodiments of the invention will be described in detail hereinafter, by way of illustration and not limitation, with reference to the accompanying drawings. The same reference numbers in the drawings identify the same or similar elements or components. Those skilled in the art will appreciate that the drawings are not necessarily drawn to scale. In the drawings:
FIG. 1 is a flow diagram of a method of backing up mnemonics according to one embodiment of the invention;
FIG. 2 is a flowchart illustrating a method for backing up mnemonics according to a second embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for backing up mnemonics according to a third embodiment of the present invention;
FIG. 4 is a flowchart illustrating a method for backing up mnemonics according to a fourth embodiment of the present invention;
FIG. 5 is a flowchart illustrating a method for backing up mnemonics according to a fifth embodiment of the present invention;
FIG. 6 is a flowchart illustrating a method of backing up mnemonics according to a sixth embodiment of the present invention;
fig. 7 is a schematic flowchart of a mnemonic word backup in a method of backing up mnemonic words according to an embodiment of the present invention;
fig. 8 is a flowchart illustrating introduction of a mnemonic word in a method for backing up a mnemonic word according to an embodiment of the present invention;
FIG. 9 is a block diagram of a system for backing up mnemonics, according to one embodiment of the present invention;
FIG. 10 is a schematic diagram of a system for backing up mnemonics according to a second embodiment of the present invention;
fig. 11 is a schematic configuration diagram of a system for backing up mnemonics according to a third embodiment of the present invention;
fig. 12 is a schematic structural diagram of a system for backing up mnemonics according to a fourth embodiment of the present invention.
Detailed Description
Fig. 1 is a schematic flow chart of a method for backing up mnemonics in this embodiment, in which a smart card is widely used in the financial and social security industries, and the application security is undoubted; the mnemonic words consist of a plurality of words to form a private key in another form, the private key can be generated through the mnemonic words, one mnemonic word can generate infinite private keys, and therefore all wallet addresses under an account can be managed through one mnemonic word. The intelligent card is used as a medium for storing mnemonics, safety mechanisms such as read-write control, authority control and the like are added, and a password and reading times are required to be set before the mnemonics are written; when the mnemonic words need to be read, the passwords need to be verified and can be read after the passwords are successfully verified; if the password error occurs and exceeds the set times, the card is automatically destroyed; from the physical perspective, the smart card has obvious advantages compared with paper storage from the perspectives of moisture prevention, theft prevention, loss prevention, storage time and the like.
Specifically, the method comprises the following steps:
step 101, the communication terminal receives a security authentication instruction and selects a mnemonic word backup function when the authentication is completed, and selects a mnemonic word backup strategy and sends the mnemonic word backup strategy to the smart card.
The Communication terminal can be a Communication device such as a mobile phone and a PC, and can communicate with the backup smart card in a contact or non-contact NFC (near field Communication, NFC for short) manner to backup the mnemonic words, increase access authority control and frequency limitation, and improve the security of the mnemonic words. Alternatively, the communication terminal may perform policy recognition using a preset picture or the like that the user easily memorizes.
And 102, acquiring a backup strategy of the smart card according to the selected mnemonic words, generating a first backup factor and sending the first backup factor to the communication terminal.
The password and the password duration are input on the smart card, the first backup factor is generated according to the preset rule (for example, the password is 243587, the number is pressed for 2 seconds, the time is pressed for 4 seconds, the time is pressed for 3 seconds, each digital password and the corresponding time are transmitted into the algorithm to generate the first backup factor), and the first backup factor can also be generated according to the preset rule by utilizing the fingerprint and the fingerprint pressing time.
103, the communication terminal generates a second backup factor according to the backup strategy selected by the user, and encrypts the backup mnemonic words generated by the backup strategy of the previous mnemonic word together with the second backup factor and the first backup factor to obtain temporary backup mnemonic words and a check sum; and when the selection times of the mnemonic word backup strategy reach or exceed the time threshold value, converting the temporary backup mnemonic words and the check sum into a target ciphertext backup mnemonic word and the check sum, and sending the target ciphertext backup mnemonic word and the check sum to the intelligent card.
Each backup strategy encrypts the encrypted mnemonic words and the check value obtained after the encryption of the previous backup strategy. In the process of judging the selection times of the mnemonic word backup strategies, at least 3 backup strategies are required to be selected based on encryption rules, for example, continuous backup strategies cannot be similar, and a user can complete the selection process of the backup strategies at any time after the continuous backup strategies conform to the rules. The converted target ciphertext mnemonic word can be transmitted to the intelligent card after the ciphertext mnemonic word encrypted by the last backup strategy and the check sum are encrypted by using an encryption algorithm with all backup strategies as parameters, and all the backup strategies are written into the intelligent card as the authentication key of the intelligent card. When the user reads the data from the smart card, the mnemonic words and the check sum of the ciphertext can be acquired only after the user uses the backup strategy for authentication.
Optionally, in the method, a plurality of mnemonic word backup strategies may be preset, and different classifications may be set according to the contents of the mnemonic word backup strategies; or setting different types of mnemonic word backup strategies according to a preset classification strategy. The set backup strategies of the mnemonic words are not only simply changed, such as continuous change of numbers or letters; and randomly selecting different categories of mnemonic word backup strategies from different category strategy groups by using a random algorithm to serve as the selected adjacent mnemonic word backup strategies. Therefore, the continuous mnemonic word backup strategies of different classifications are not easy to crack, and the safety of backup mnemonic words of the intelligent card is improved.
Optionally, before the target ciphertext mnemonic word and the checksum are sent to the smart card, generating a smart card authentication key by using all backup strategies and safely sending the smart card authentication key to the smart card can be further set; the authentication key is used for authenticating the encrypted mnemonic words imported into the smart card: when the mnemonics need to be exported from the smart card subsequently, authentication is carried out according to the backup strategy and the secret key stored in the smart card, and only if the backup strategy group selected during backup is the same as the backup strategy group selected during backup, the backup and the check sum of the ciphertext mnemonics on the smart card can be accessed, so that the behavior of exporting the encrypted mnemonics maliciously can be effectively prevented.
And step 104, the intelligent card receives the target ciphertext backup mnemonic words and the check sum for backup.
And 105, the communication terminal receives a safety authentication instruction, and selects a mnemonic word backup strategy to send to the smart card when authentication is completed.
The communication terminal receives the safety authentication command, selects the mnemonic word backup strategy to send to the intelligent card when the authentication is finished
And 106, generating a first import factor by the smart card according to the selected mnemonic word backup strategy, and sending the first import factor to the communication terminal.
And step 107, the communication terminal generates a second import factor according to the backup strategy selected by the user, and generates an authentication instruction to be sent to the smart card for authentication when the selection times of the mnemonic word backup strategy reaches or exceeds a time threshold value. The communication terminal can decrypt in reverse direction according to the sequence of backup mnemonic words once after the user selects all the mnemonic word backup strategies.
And step 108, the intelligent card receives the authentication instruction, and sends the target ciphertext mnemonic word and the check sum to the communication terminal after the authentication is successful.
And step 109, the communication terminal reads and imports the mnemonic recovery wallet when the selected mnemonic backup strategy, the first import factor and the second import factor are used for backing up the mnemonic of the target ciphertext in reverse order according to the backup sequence and the verification and decryption are completed.
If the mnemonic words are read successfully, the wallet is recovered according to the read mnemonic words; if the mnemonic word fails to be read due to the reasons of non-connection, magnetic field interference and the like, the security authentication is required to be repeatedly carried out, and the mnemonic word is read. After the wallet is successfully recovered, the mnemonic words are successfully imported from the smart card; if the wallet fails to recover, the operations of security authentication, reading mnemonics and the like need to be repeated, so that the security of the mnemonics is improved, and the convenience of the user is greatly improved.
In some optional embodiments, as shown in fig. 2, which is a schematic flow chart of a second method for backing up mnemonics in this embodiment, different from that in fig. 1, when it is determined that the number of times of selection of a mnemonic word backup policy reaches or exceeds an encryption number threshold, the method converts a temporary backup mnemonics and a checksum into a target ciphertext backup mnemonics and a checksum, and sends the target ciphertext backup mnemonics and the checksum to a smart card, further includes:
and when the selection times of the mnemonic word backup strategy are judged not to reach the time threshold value, different mnemonic word backup strategies are repeatedly selected and sent to the intelligent card.
In some optional embodiments, as shown in fig. 3, which is a flowchart illustrating a third method for backing up mnemonics in this embodiment, different from fig. 1, the method includes that when the communication terminal uses the selected mnemonic backup policy, the first import factor, and the second import factor to backup the mnemonics in the target ciphertext and completes verification and decryption, the method reads and imports the mnemonics to restore the wallet, and further includes:
the communication terminal uses the selected mnemonic word backup strategy, the first lead-in factor and the second lead-in factor to backup the mnemonic words of the target ciphertext, the verification and the decryption are inconsistent, and when the reading times on the intelligent card reach or exceed the reading time threshold value, the intelligent card is locked.
In some optional embodiments, as shown in fig. 4, which is a flowchart illustrating a fourth method for backing up mnemonics in this embodiment, different from fig. 3, the method includes that the communication terminal uses the selected mnemonic backup policy, the first import factor, and the second import factor to check and decrypt the target ciphertext mnemonics in disagreement, and when the read number on the smart card reaches or exceeds the read number threshold, the smart card is locked, and the method further includes:
and the communication terminal uses the selected mnemonic word backup strategy, the first import factor and the second import factor to verify and decrypt the target ciphertext to be inconsistent, and when the reading times on the intelligent card do not reach the reading time threshold value, different mnemonic word backup strategies are selected again, an authentication instruction is generated and sent to the intelligent card for authentication.
In some optional embodiments, as shown in fig. 5, which is a schematic flow chart of a fifth method for backing up mnemonics in this embodiment, different from that in fig. 1, a communication terminal receives a security authentication instruction, and selects a mnemonics backup policy to send to a smart card when authentication is completed, where the method includes:
step 501, the communication terminal receives a first security authentication instruction, and generates and displays a second security authentication interface when the first security authentication instruction is consistent with a preset first security authentication data.
And 502, receiving a second security authentication instruction, generating a mnemonic word backup strategy according to the preset mnemonic word backup strategy and sending the mnemonic word backup strategy to the smart card when the second security authentication instruction is compared with the preset second security authentication data to be consistent.
In some optional embodiments, as shown in fig. 6, which is a flowchart illustrating a sixth method for backing up mnemonics in this embodiment, different from that in fig. 1, the communication terminal receives a second import factor, and decrypts the backup mnemonics of the previous mnemonics backup policy together with the first import factor; when the selection times of the mnemonic word backup strategy reach or exceed the encryption time threshold, generating a factor generation instruction and sending the factor generation instruction to the smart card, wherein the generation instruction comprises the following steps:
601, the communication terminal receives a second import factor and decrypts the backup mnemonic words of the previous mnemonic word backup strategy together with the first import factor; and when the selection times of the mnemonic word backup strategy reach or exceed the encryption time threshold, generating a factor generation instruction and sending the factor generation instruction to the smart card.
Step 602, when it is determined that the selection times of the mnemonic word backup strategy do not reach the encryption time threshold, continuing to select different mnemonic word backup strategies, and acquiring a first backup factor of the smart card terminal and a second backup factor of the communication terminal, and generating an authentication instruction to send to the smart card for authentication until the selection times of the backup strategy reach the number time threshold.
The authentication smart card needs to be omitted according to all selected backup strategies, and the ciphertext backup mnemonic words and the check sum on the smart card are acquired. And after the ciphertext backup mnemonic words are obtained, the communication terminal decrypts in sequence according to the selected backup strategy. For example, the policy selected when the user backs up is A, B, C, and the user selectable when the mnemonic words are restored may select the policy A, B, C to authenticate and obtain the ciphertext back-up mnemonic words, and then decrypt the ciphertext back-up mnemonic words according to the reverse order C, B, A. Or after the user directly selects C, B, A policy, the communication terminal performs smart card authentication in reverse order A, B, C to obtain ciphertext backup mnemonic words, and then decrypts according to C, B, A. After the final decryption is completed, the mnemonic words are imported into the communication terminal, and the mnemonic words are very important and cannot be decrypted on the smart card and then transmitted to the communication terminal.
In some optional embodiments, as shown in fig. 7, the method is a schematic flowchart of a mnemonic word backup in a method for backing up mnemonic words according to an application embodiment of this embodiment, and the method includes the following steps:
step 701, a user initiates entering a blockchain wallet from a mobile phone application program APP/computer through a first security authentication.
The wallet function of the access communication terminal needs first security authentication, such as a login password or a gesture of wallet software.
Step 702, the user selects the function of backup mnemonic words according to the display of the equipment, and the backup mnemonic words are connected to the smart card.
And step 703, the user enters a device mnemonic word backup or recovery interface through the second safety certification.
Entering the backup or restore function of the wallet software requires a second security authentication, which may be a password or a gesture, etc. additionally set. And entering a mnemonic function interface after the verification is passed.
Step 704, the communication terminal displays different mnemonic word backup strategies for the user to select (the mnemonic word backup strategy can be represented as a corresponding mth backup strategy by pictures).
The communication terminal may include: for example, a picture of an M grid is displayed on a mobile device, and after a user clicks one picture, a first backup factor obtained from a smart card and a second backup factor obtained from the mobile device are respectively obtained through a factor obtaining input box. And returning to an interface for displaying the palace lattice picture after the acquisition is successful, and enabling the user to continue to select the picture or directly click to finish the selection. Therefore, other people do not know how many times of encryption is carried out on the private information on the intelligent card, and the difficulty of cracking by other people is increased.
Step 705, obtaining the mth backup strategy of the smart card to obtain the first backup factor.
The first backup factor may be a password on the smart card, a password confirmation duration or a random number corresponding to the fingerprint, a fingerprint pressing time, etc.
Step 706, the user inputs the mth backup strategy on the communication terminal to obtain the second backup factor.
Optionally, the second backup factor may be a password or a gesture.
And 707, encrypting the m-1 (former) mnemonic word backup strategy by the first backup factor and the second backup factor to obtain an mth mnemonic word backup strategy and a checksum.
Step 708, judging whether the encryption frequency m reaches a preset encryption frequency threshold value N, whether the user continues to encrypt, and when the encryption frequency m does not reach the preset encryption frequency threshold value, the user continues to repeat the operations from step 704 to step 708.
And 709, when the encryption frequency m reaches a preset encryption frequency threshold value N, transmitting the mnemonic word backup strategy and the check sum checksum of the mth time to the smart card to complete the mnemonic word backup.
In some optional embodiments, as shown in fig. 8, the flowchart of the introduction of the mnemonic word in the method for backing up the mnemonic word according to an application embodiment of this embodiment is shown, and the method includes the following steps:
step 801, after the start, a user initiates to enter a blockchain wallet from a mobile phone application program APP/computer through a first security authentication.
Step 802, the user selects the function of "import mnemonic words" according to the prompt of the device, and connects to the smart card.
And step 803, the user enters the equipment mnemonic function interface by verifying the second security certificate.
And step 804, the communication terminal displays different mnemonic word backup strategy pictures for the user to select (the mnemonic word backup strategy pictures are expressed as corresponding mth backup strategies).
And 805, acquiring a first import factor obtained by the mth backup strategy of the smart card.
The first import factor can be a password on the smart card, password confirmation duration or a random number corresponding to the fingerprint, fingerprint pressing time and the like.
Step 806, the user inputs the second import factor obtained by the mth backup strategy on the communication terminal.
The second import factor may be a password or a gesture.
Step 807, judging whether the decryption frequency N reaches a preset encryption frequency threshold value N or not, and whether the user continues to decrypt; and if the decryption frequency N does not reach the preset encryption frequency threshold value N, returning to the step 804.
And 808, when the decryption time N reaches a preset encryption time threshold N, transmitting the mnemonic word backup strategy and the check sum checksum backed up for the mth time on the smart card to the communication terminal to finish the introduction of the mnemonic words.
And step 809, decrypting the mnemonic word backup strategy and judging the checksum in sequence by using the backup strategy selected by the user, the first import factor and the second import factor.
Step 810, judging whether the decryption mnemonic word backup strategy, the check sum and the checksum are consistent.
And step 811, when the decryption mnemonic word backup strategy and the check sum are consistent, resetting the check error times of the unreadable area on the smart card.
And 812, decrypting the mnemonic word backup strategy, judging whether the check sum is inconsistent, judging whether the error frequency of the unreadable area on the smart card reaches an upper limit, and returning to the step 804 if the error frequency of the unreadable area on the smart card does not reach the upper limit.
And step 813, locking the smart card when the error frequency of the unreadable area on the smart card reaches an upper limit.
In some alternative embodiments, as shown in fig. 9, fig. 9 is a schematic structural diagram of a system 900 for backing up mnemonics in this embodiment, and the apparatus can be used to implement the method for backing up mnemonics. Specifically, the system 900 includes: a communication terminal 901 and a smart card 902; the communication terminal 901 is connected to the smart card 902 by short-range wireless communication.
The communication terminal 901 includes: a mnemonic word backup instruction processor 903, a mnemonic word backup verification processor 904, a mnemonic word restoration instruction processor 905, a mnemonic word restoration verification processor 906 and a mnemonic word reading processor 907; a smart card 902, comprising: a backup factor generation processor 908, a mnemonic word backup processor 909, an import factor generation processor 910, and a backup mnemonic word import processor 911.
The mnemonic word backup instruction processor 903 is connected with the mnemonic word backup verification processor 904, receives a security authentication instruction, selects a mnemonic word backup strategy when authentication is completed, and sends the strategy to the smart card.
The mnemonic word backup verification processor 904 is connected with the mnemonic word backup instruction processor 903 and the mnemonic word restoration instruction processor 905, generates a second backup factor according to a backup strategy selected by a user, and encrypts the backup mnemonic words of the previous mnemonic word backup strategy by using the second backup factor and the first backup factor together to obtain temporary backup mnemonic words and a checksum; and when the selection times of the mnemonic word backup strategy reach or exceed the time threshold value, converting the temporary backup mnemonic words and the check sum into a target ciphertext backup mnemonic word and the check sum, and sending the target ciphertext backup mnemonic word and the check sum to the intelligent card.
And the mnemonic word restoring instruction processor 905 is connected with the mnemonic word backup verification processor 904 and the mnemonic word restoring verification processor 906, receives a safety authentication instruction, selects a mnemonic word backup strategy when authentication is completed, and sends the selected mnemonic word backup strategy to the smart card.
And the mnemonic word restoration verification processor 906 is connected with the mnemonic word restoration instruction processor 905 and the mnemonic word reading processor 907, generates a second import factor according to the backup strategy selected by the user, and generates an authentication instruction to be sent to the smart card for authentication when the selection times of the mnemonic word backup strategy reach or exceed the times threshold.
And the mnemonic word reading processor 907 is connected with the mnemonic word restoration verification processor 906, and reads and imports the mnemonic word recovery wallet when the backup of the mnemonic words and the verification and decryption of the target ciphertext are completed by using the selected mnemonic word backup strategy, the first import factor and the received second import factor.
The backup factor generation processor 908 is connected to the mnemonic word backup processor 909, and generates a first backup factor according to the selected mnemonic word backup policy, and transmits the generated first backup factor to the communication terminal.
The mnemonic word backup processor 909 is connected to the backup factor generation processor 908 and the import factor generation processor 910, and receives the target ciphertext backup mnemonic word and the checksum for backup.
The import factor generating processor 910 is connected to the mnemonic word backup processor 909 and the backup mnemonic word import processor 911, and generates a first import factor according to the selected mnemonic word backup policy, and transmits the first import factor to the communication terminal.
The backup mnemonic word importing processor 911 is connected to the mnemonic word backup processor 910, receives the authentication instruction, and sends the target ciphertext backup mnemonic word and the checksum to the communication terminal.
In some alternative embodiments, as shown in fig. 10, which is a schematic structural diagram of a system 1000 for backing up mnemonics of the second kind in this embodiment, unlike in fig. 9, the mnemonic word backup verification processor 904 includes: a mnemonic backup verification encryption unit 1001, a target ciphertext mnemonic conversion unit 1002 and a target ciphertext mnemonic re-processing unit 1003.
The mnemonic word backup verification encryption unit 1001 is connected with the target ciphertext mnemonic word conversion unit 1002, generates a second backup factor according to a backup strategy selected by a user, and encrypts the backup mnemonic words of a previous mnemonic word backup strategy by the second backup factor and the first backup factor to obtain temporary backup mnemonic words and a checksum.
And the target ciphertext mnemonic word conversion unit 1002 is connected with the mnemonic word backup verification encryption unit 1001 and the target ciphertext mnemonic word re-processing unit 1003, and is used for converting the temporary backup mnemonic word and the check sum into a target ciphertext backup mnemonic word and a check sum and sending the target ciphertext backup mnemonic word and the check sum to the smart card when the selection times of the mnemonic word backup strategy are judged to reach or exceed the times threshold value.
And the target ciphertext mnemonic word re-processing unit 1003 is connected with the target ciphertext mnemonic word conversion unit 1002, and when the selection times of the mnemonic word backup strategies are judged not to reach the times threshold value, different mnemonic word backup strategies are selected again and sent to the smart card.
In some alternative embodiments, as shown in fig. 11, which is a schematic structural diagram of a system 1100 for backing up mnemonics of the third kind in this embodiment, different from that in fig. 9, the mnemonic reading processor 907 includes: a wallet recovery processing unit 1101 and a smart card lock processing unit 1102.
The wallet recovery processing unit 1101 is connected to the smart card locking processing unit 1102, and reads and imports the mnemonic recovery wallet when the selected mnemonic backup policy, the first import factor, and the second import factor are used to complete the verification and decryption of the mnemonic backup of the target ciphertext.
And the smart card locking processing unit 1102 is connected with the wallet recovery processing unit 1101, and is used for locking the smart card when the selected mnemonic word backup strategy, the first import factor and the second import factor are inconsistent with the verification and decryption of the target ciphertext backup mnemonic words, and the reading times on the smart card reach or exceed the reading time threshold.
Optionally, the smart card lock processing unit 1102 may further include: the intelligent card verifies the locking unit of the super time and the intelligent card verifies the unit of the double verification, wherein, the intelligent card verifies the locking unit of the super time, link with verification unit of the intelligent card, the communication terminal uses the backup tactics of the selected mnemonic word, first lead-in factor and second lead-in factor to helping the mnemonic word of the goal cipher text and check and decipher the inconsistency, and when the read number reaches or exceeds the threshold value of the read number on the intelligent card, the intelligent card is locked.
And the smart card re-verification unit is connected with the smart card verification super-locking unit, the communication terminal uses the selected mnemonic word backup strategy, the first import factor and the second import factor to verify and decrypt the target ciphertext mnemonic words in inconsistent, and when the reading times on the smart card do not reach the reading time threshold value, different mnemonic word backup strategies are selected again, an authentication instruction is generated and sent to the smart card for authentication.
In some optional embodiments, as shown in fig. 12, which is a schematic structural diagram of a system 1200 for backing up mnemonics according to a fourth embodiment of the present invention, different from fig. 9, the mnemonic backup instruction processor 903 includes: a mnemonic word backup instruction processing unit 1201 and a mnemonic word backup strategy selecting unit 1202; wherein the content of the first and second substances,
and the mnemonic word backup instruction processing unit 1201 is connected with the mnemonic word backup strategy selection unit 1202, receives the first security authentication instruction, and generates and displays a second security authentication interface when the first security authentication instruction is consistent with the preset first security authentication data.
And the mnemonic word backup strategy selection unit 1202 is connected with the mnemonic word backup instruction processing unit 1201, receives a second security authentication instruction, generates a mnemonic word backup strategy according to a preset mnemonic word backup strategy when the second security authentication instruction is compared with preset second security authentication data to be consistent, and sends the generated mnemonic word backup strategy to the smart card.
In some optional embodiments, this embodiment further provides a device for backing up mnemonics, which may be applied to the communication terminal described above, and specifically, the device includes: a memory aid word backup instruction module and a memory aid word backup verification module.
Specifically, the mnemonic word backup instruction module is connected with the mnemonic word backup verification module, receives a security authentication instruction and the mnemonic word backup instruction, selects a mnemonic word backup strategy when authentication is completed, acquires a first backup factor of the smart card terminal and a second backup factor of the communication terminal, and generates an authentication instruction to be sent to the smart card for authentication until the selection times of the backup strategy reach a times threshold.
The mnemonic word backup verification module is connected with the mnemonic word backup instruction module and the mnemonic word restoration instruction module and used for receiving a first backup factor generated by the smart card according to the selected mnemonic word backup strategy; generating a second backup factor according to a backup strategy selected by a user, and encrypting the backup mnemonic word generated by the previous mnemonic word backup strategy by the second backup factor and the first backup factor together to obtain a temporary backup mnemonic word and a checksum; and when the selection times of the mnemonic word backup strategy reach or exceed the time threshold value, converting the temporary backup mnemonic words and the check sum into a target ciphertext backup mnemonic word and the check sum, and sending the target ciphertext backup mnemonic word and the check sum to the intelligent card.
In some optional embodiments, the apparatus for backing up mnemonics in this embodiment further includes: the mnemonic word restoration instruction module is connected with the mnemonic word backup verification module, receives a safety authentication instruction, selects a mnemonic word backup strategy when authentication is completed and sends the strategy to the intelligent card; and receiving a first import factor generated by the smart card according to the selected mnemonic word backup strategy.
Generating a second import factor according to the backup strategy selected by the user, and decrypting the backup mnemonics of the backup strategy of the previous mnemonics by the second backup factor and the first import factor; when the selection times of the mnemonic word backup strategy reach or exceed the time threshold value, generating an authentication instruction and sending the authentication instruction to the smart card; and receiving the target ciphertext backup mnemonic words and the check sum fed back by the intelligent card.
And reading and importing the mnemonic words to a mnemonic word recovery wallet when the selected mnemonic word backup strategy, the first import factor and the second import factor are used for backing up the mnemonic words of the target ciphertext and verifying and decrypting the mnemonic words.
In some optional embodiments, the module for verifying backup of mnemonics in the apparatus for backing up mnemonics in this embodiment includes: the system comprises a mnemonic word backup verification encryption unit, a target ciphertext mnemonic word conversion unit and a target ciphertext mnemonic word re-determination processing unit.
The mnemonic word backup verification encryption unit is connected with the target ciphertext mnemonic word conversion unit, generates a second backup factor according to a backup strategy selected by a user, and encrypts the backup mnemonic word of the previous mnemonic word backup strategy by the second backup factor and the first backup factor together to obtain a temporary backup mnemonic word and a check sum.
And the target ciphertext mnemonic word conversion unit is connected with the mnemonic word backup verification encryption unit and the target ciphertext mnemonic word re-processing unit, and is used for converting the temporary backup mnemonic words and the check sum into the target ciphertext backup mnemonic words and the check sum and sending the target ciphertext backup mnemonic words and the check sum to the intelligent card when the selection times of the mnemonic word backup strategy reach or exceed the times threshold value.
And the target ciphertext mnemonic word re-processing unit is connected with the target ciphertext mnemonic word conversion unit, and when the selection times of the mnemonic word backup strategy are judged to not reach the time threshold, different mnemonic word backup strategies are re-selected and sent to the intelligent card.
In some optional embodiments, the module for reading mnemonics in the apparatus for backing up mnemonics of this embodiment includes: a wallet restoring processing unit and an intelligent card locking processing unit.
The wallet recovery processing unit is connected with the intelligent card locking processing unit, and reads and imports the mnemonic word recovery wallet when the selected mnemonic word backup strategy, the first import factor and the second import factor are used for backing up the mnemonic words of the target ciphertext and completing the verification and decryption.
And the intelligent card locking processing unit is connected with the wallet recovery processing unit, and is used for locking the intelligent card when the backup strategy of the mnemonics, the first import factor and the second import factor are used for backing up the mnemonics of the target ciphertext and the verification and decryption are inconsistent, and the reading times on the intelligent card reach or exceed the reading time threshold value.
Optionally, the smart card lock processing unit may further include: the intelligent card verifies the locking unit of the super time and the intelligent card verifies the unit of the double verification, wherein, the intelligent card verifies the locking unit of the super time, link with verification unit of the intelligent card, the communication terminal uses the backup tactics of the selected mnemonic word, first lead-in factor and second lead-in factor to helping the mnemonic word of the goal cipher text and check and decipher the inconsistency, and when the read number reaches or exceeds the threshold value of the read number on the intelligent card, the intelligent card is locked.
And the smart card re-verification unit is connected with the smart card verification super-locking unit, the communication terminal uses the selected mnemonic word backup strategy, the first import factor and the second import factor to verify and decrypt the target ciphertext mnemonic words in inconsistent, and when the reading times on the smart card do not reach the reading time threshold value, different mnemonic word backup strategies are selected again, and an authentication instruction is generated and sent to the smart card.
In some optional embodiments, the mnemonic word backup instruction module in the apparatus for backing up mnemonic words in this embodiment includes: the mnemonic word backup command processing unit and the mnemonic word backup strategy selection unit; wherein the content of the first and second substances,
and the mnemonic word backup instruction processing unit is connected with the mnemonic word backup strategy selection unit, receives the first security authentication instruction, and generates and displays a second security authentication interface when the first security authentication instruction is consistent with the preset first security authentication data.
And the mnemonic word backup strategy selection unit is connected with the mnemonic word backup instruction processing unit, receives a second security authentication instruction, generates a mnemonic word backup strategy according to the preset mnemonic word backup strategy and sends the mnemonic word backup strategy to the intelligent card when the second security authentication instruction is compared with the preset second security authentication data in a consistent manner.
The scheme of the embodiment solves the problems that the requirements of the existing general encryption input passwords are long, the passwords cannot be simple and repeated, the combination of the alphabetic arrays and the like is complex, and the user can remember the passwords very difficultly, and improves the use experience of the user.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A method of backing up mnemonics, comprising:
the communication terminal receives a safety authentication instruction, selects a mnemonic word backup strategy when authentication is completed and sends the mnemonic word backup strategy to the intelligent card;
receiving a first backup factor generated by the smart card according to the selected mnemonic word backup strategy;
generating a second backup factor according to a backup strategy selected by a user, wherein the second backup factor and the first backup factor jointly encrypt a backup mnemonic word generated by a previous mnemonic word backup strategy to obtain a temporary backup mnemonic word and a checksum; and when the selection times of the mnemonic word backup strategy reach or exceed a time threshold value, converting the temporary backup mnemonic words and the check sum into a target ciphertext backup mnemonic word and the check sum, and sending the target ciphertext backup mnemonic word and the check sum to the intelligent card.
2. The method of backing up mnemonics according to claim 1, further comprising:
receiving a security authentication instruction, and selecting a mnemonic word backup strategy to send to the smart card when authentication is completed;
receiving a first import factor generated by the smart card according to the selected mnemonic word backup strategy;
generating a second import factor according to a backup strategy selected by a user, and generating an authentication instruction to be sent to the smart card for authentication when the selection times of the mnemonic word backup strategy is judged to reach or exceed the time threshold;
receiving the target ciphertext backup mnemonic word and the check sum fed back after the smart card is successfully authenticated;
and reading and importing the mnemonic words to a recovery wallet when the selected mnemonic word backup strategy, the first import factor and the second import factor are used for completing the verification and decryption of the target ciphertext backup mnemonic words.
3. The method of backing up mnemonics according to claim 2, further comprising:
and using the selected mnemonic word backup strategy, the first lead-in factor and the second lead-in factor to make the target ciphertext backup mnemonic word and the verification and the decryption inconsistent, and locking the smart card when the reading times on the smart card reach or exceed a reading time threshold value.
4. The method of backing up mnemonics according to claim 3, further comprising:
and when the selected mnemonic word backup strategy, the first import factor and the second import factor are used for verifying and decrypting the target ciphertext mnemonic words in inconsistent mode, and the reading times on the intelligent card do not reach the reading time threshold value, different mnemonic word backup strategies are selected again, an authentication instruction is generated, and the authentication instruction is sent to the intelligent card for authentication.
5. The method for backing up mnemonics according to any one of claims 1 to 4, wherein a security authentication instruction is received, a mnemonics backup strategy is selected and sent to the smart card when authentication is completed, and the method comprises the following steps:
receiving a first safety certification instruction, and generating and displaying a second safety certification interface when the first safety certification instruction is consistent with the preset first safety certification data;
and receiving a second security authentication instruction, and generating a mnemonic word backup strategy according to a preset mnemonic word backup strategy and sending the mnemonic word backup strategy to the smart card when the second security authentication instruction is compared with the preset second security authentication data to be consistent.
6. The method of backing up mnemonics according to claim 1 or 2, further comprising:
and when the selection times of the mnemonic word backup strategy are judged not to reach the encryption time threshold, different mnemonic word backup strategies are repeatedly selected, a first backup factor of the smart card end and a second backup factor of the communication terminal are obtained, and an authentication instruction is generated and sent to the smart card for authentication until the selection times of the backup strategy reach the encryption time threshold.
7. A system for backing up mnemonics, comprising: a communication terminal and a smart card; the communication terminal is connected with the intelligent card through short-distance wireless communication;
the communication terminal comprises: a memory aid word backup instruction processor and a memory aid word backup verification processor;
the smart card comprises: a backup factor generation processor and a mnemonic word backup processor; wherein the content of the first and second substances,
the mnemonic word backup instruction processor is connected with the mnemonic word backup verification processor, receives a safety certification instruction, selects a mnemonic word backup strategy when the certification is finished and sends the strategy to the intelligent card;
the mnemonic word backup verification processor is connected with the mnemonic word backup instruction processor and the mnemonic word restoration instruction processor, generates a second backup factor according to a backup strategy selected by a user, and encrypts the backup mnemonic word generated by a previous mnemonic word backup strategy by the second backup factor and the first backup factor together to obtain a temporary backup mnemonic word and a checksum; when the selection times of the mnemonic word backup strategy reach or exceed a time threshold value, converting the temporary backup mnemonic words and the check sum into a target ciphertext backup mnemonic word and the check sum, and sending the target ciphertext backup mnemonic word and the check sum to the smart card;
the backup factor generation processor is connected with the mnemonic word backup processor, generates a first backup factor according to the selected mnemonic word backup strategy and sends the first backup factor to the communication terminal;
and the mnemonic word backup processor is connected with the backup factor generation processor and the import factor generation processor and is used for receiving the target ciphertext mnemonic words and the check sum for backup.
8. The system for backing up mnemonics according to claim 7, wherein the communication terminal further comprises: the mnemonic word restoring instruction processor is connected with the mnemonic word backup verification processor, receives a safety certification instruction, selects a mnemonic word backup strategy when the certification is finished and sends the strategy to the intelligent card;
receiving a first import factor generated by the smart card according to the selected mnemonic word backup strategy;
generating a second import factor according to a backup strategy selected by a user, and generating an authentication instruction to be sent to the smart card for authentication when the selection times of the mnemonic word backup strategy is judged to reach or exceed the time threshold;
receiving the target ciphertext backup mnemonic word and the check sum fed back after the smart card is successfully authenticated;
and reading and importing the mnemonic words to a recovery wallet when the selected mnemonic word backup strategy, the first import factor and the second import factor are used for completing the verification and decryption of the target ciphertext backup mnemonic words.
9. An apparatus for backing up mnemonics, comprising: the system comprises a mnemonic word backup module and a mnemonic word backup verification module;
the mnemonic word backup module is connected with the mnemonic word backup verification module, receives a safety authentication instruction, selects a mnemonic word backup strategy when authentication is completed and sends the strategy to the smart card;
the mnemonic word backup verification module is connected with the mnemonic word backup instruction module and used for receiving a first backup factor generated by the intelligent card according to the selected mnemonic word backup strategy; generating a second backup factor according to a backup strategy selected by a user, and encrypting a backup mnemonic word generated by a previous mnemonic word backup strategy by the second backup factor and the first backup factor together to obtain a temporary backup mnemonic word and a checksum; and when the selection times of the mnemonic word backup strategy reach or exceed a time threshold value, converting the temporary backup mnemonic words and the check sum into a target ciphertext backup mnemonic word and the check sum, and sending the target ciphertext backup mnemonic word and the check sum to the intelligent card.
10. The apparatus for backing up mnemonics according to claim 9, further comprising: the mnemonic word restoration instruction module is connected with the mnemonic word backup verification module, receives a safety authentication instruction, selects a mnemonic word backup strategy when authentication is completed and sends the strategy to the smart card;
receiving a first import factor generated by the smart card according to the selected mnemonic word backup strategy;
generating a second import factor according to a backup strategy selected by a user, and generating an authentication instruction to be sent to the smart card for authentication when the selection times of the mnemonic word backup strategy is judged to reach or exceed the time threshold;
receiving the target ciphertext backup mnemonic word and the check sum fed back after the smart card is successfully authenticated;
and reading and importing the mnemonic words to a recovery wallet when the selected mnemonic word backup strategy, the first import factor and the second import factor are used for completing the verification and decryption of the target ciphertext backup mnemonic words.
CN201911406278.8A 2019-12-31 2019-12-31 Method, system and device for backing up mnemonic words Active CN111127019B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911406278.8A CN111127019B (en) 2019-12-31 2019-12-31 Method, system and device for backing up mnemonic words

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911406278.8A CN111127019B (en) 2019-12-31 2019-12-31 Method, system and device for backing up mnemonic words

Publications (2)

Publication Number Publication Date
CN111127019A CN111127019A (en) 2020-05-08
CN111127019B true CN111127019B (en) 2020-10-27

Family

ID=70506082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911406278.8A Active CN111127019B (en) 2019-12-31 2019-12-31 Method, system and device for backing up mnemonic words

Country Status (1)

Country Link
CN (1) CN111127019B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112671542A (en) * 2020-12-16 2021-04-16 深圳市大中华区块链科技有限公司 Block chain biological voice recognition method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103269271A (en) * 2013-05-23 2013-08-28 天地融科技股份有限公司 Method and system for back-upping private key in electronic signature token
CN103905204A (en) * 2014-04-02 2014-07-02 天地融科技股份有限公司 Data transmission method and transmission system
CN108681890A (en) * 2018-05-21 2018-10-19 北京橙鑫数据科技有限公司 Processing method, processing equipment and the processing system of private information
CN109146468A (en) * 2018-08-22 2019-01-04 爱刷(北京)科技股份有限公司 A kind of backup and restoration methods of the logical card of number
CN109474424A (en) * 2018-12-17 2019-03-15 江苏恒宝智能系统技术有限公司 Block chain account cipher key backup and method, the system of recovery
CN109815051A (en) * 2018-12-20 2019-05-28 深圳智乾区块链科技有限公司 The data processing method and system of block chain
CN109934584A (en) * 2019-03-08 2019-06-25 上海恺英网络科技有限公司 Block chain account trading method and apparatus

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10680820B2 (en) * 2018-03-09 2020-06-09 Coolbitx Ltd. Method of creating and recovering digital wallet
US20190354963A1 (en) * 2018-05-15 2019-11-21 Decentral Inc. Cryptographic transaction processing system and client wallet and methods therefor

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103269271A (en) * 2013-05-23 2013-08-28 天地融科技股份有限公司 Method and system for back-upping private key in electronic signature token
CN103905204A (en) * 2014-04-02 2014-07-02 天地融科技股份有限公司 Data transmission method and transmission system
CN108681890A (en) * 2018-05-21 2018-10-19 北京橙鑫数据科技有限公司 Processing method, processing equipment and the processing system of private information
CN109146468A (en) * 2018-08-22 2019-01-04 爱刷(北京)科技股份有限公司 A kind of backup and restoration methods of the logical card of number
CN109474424A (en) * 2018-12-17 2019-03-15 江苏恒宝智能系统技术有限公司 Block chain account cipher key backup and method, the system of recovery
CN109815051A (en) * 2018-12-20 2019-05-28 深圳智乾区块链科技有限公司 The data processing method and system of block chain
CN109934584A (en) * 2019-03-08 2019-06-25 上海恺英网络科技有限公司 Block chain account trading method and apparatus

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
New Secure Approach to Backup Cryptocurrency Wallets;Hossein Rezaeighaleh;《IEEE》;20191213;全文 *
区块链技术安全风险研究;张启;《信息通信技术与政策》;20190131(第1期);全文 *

Also Published As

Publication number Publication date
CN111127019A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
EP3343831B1 (en) Identity authentication method and apparatus
US9876646B2 (en) User identification management system and method
CN110519260B (en) Information processing method and information processing device
CN104270338B (en) Method and its system that a kind of electronic identity registration and certification are logged in
CN102045367B (en) Registration method and authentication server of real-name authentication
CN110086608A (en) User authen method, device, computer equipment and computer readable storage medium
CN105989386B (en) A kind of method and apparatus for reading and writing radio frequency identification card
CN107771383A (en) At least two authenticating devices are mapped to the method for user account using certificate server
US20080189772A1 (en) Method for generating digital fingerprint using pseudo random number code
CN113472793B (en) Personal data protection system based on hardware password equipment
CN110930147B (en) Offline payment method and device, electronic equipment and computer-readable storage medium
CN1921395B (en) Method for improving security of network software
CN107257284B (en) Method and device for carrying out virtual card transaction
CN101334884A (en) Method and system for enhancing bank transfer safety
CN111327629B (en) Identity verification method, client and server
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
CN110659470B (en) Authentication method and authentication system for off-line physical isolation
CN104820814A (en) Second-generation ID card anti-counterfeiting verification system
CN111242611A (en) Method and system for recovering digital wallet key
CN104125064A (en) Dynamic password authentication method, client and authentication system
TWI476629B (en) Data security and security systems and methods
CN106101140B (en) A kind of method and server of authentification of message
WO2015062441A1 (en) Cgi web interface multi-session verification code generation and verification method
CN105635164B (en) The method and apparatus of safety certification
JP2006155547A (en) Individual authentication system, terminal device and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant