CN117557260A - Virtual currency wallet implementation method, system and electronic equipment - Google Patents

Virtual currency wallet implementation method, system and electronic equipment Download PDF

Info

Publication number
CN117557260A
CN117557260A CN202311513388.0A CN202311513388A CN117557260A CN 117557260 A CN117557260 A CN 117557260A CN 202311513388 A CN202311513388 A CN 202311513388A CN 117557260 A CN117557260 A CN 117557260A
Authority
CN
China
Prior art keywords
wallet
transaction
transaction data
virtual currency
remote
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311513388.0A
Other languages
Chinese (zh)
Inventor
赵风昭
余力
张事林
张恒
刘俊隆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Knownsec Information Technology Co ltd
Original Assignee
Chengdu Knownsec Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Knownsec Information Technology Co ltd filed Critical Chengdu Knownsec Information Technology Co ltd
Priority to CN202311513388.0A priority Critical patent/CN117557260A/en
Publication of CN117557260A publication Critical patent/CN117557260A/en
Pending legal-status Critical Current

Links

Abstract

The application provides a virtual currency wallet implementation method, a virtual currency wallet implementation system and electronic equipment, wherein the virtual currency wallet implementation method, the virtual currency wallet implementation system and the electronic equipment comprise an agent wallet, a remote wallet and a transaction wallet, after transaction data are acquired through the agent wallet, the transaction data are subjected to authentication processing once and pass through the agent wallet, the transaction data are encrypted, and the encrypted transaction data are sent to the remote wallet. Decrypting the received transaction data through the remote wallet, performing secondary authentication processing on the decrypted transaction data, and transmitting the transaction data to the transaction wallet after the secondary authentication processing is passed. And finally, executing corresponding transaction operation by the transaction wallet and based on the transaction data. In the scheme, the proxy wallet and the remote wallet are additionally arranged in the original transaction wallet mode, the proxy wallet and the remote wallet perform authority verification and data protection, and the transaction wallet performs actual transaction operation, so that the data security problem that all authorities are concentrated in the transaction wallet can be avoided.

Description

Virtual currency wallet implementation method, system and electronic equipment
Technical Field
The application relates to the technical field of computers, in particular to a virtual currency wallet realization method, a virtual currency wallet realization system and electronic equipment.
Background
With the rapid development of blockchain technology, virtual currency is also unprecedented as the most widely used field in blockchains. However, the wallet ecology related to the virtual currency is slow to develop, and the wallet ecology is completely free from the requirement of ecology development. The current virtual currency wallet design is that operators have all rights of the whole wallet, the design mode has no problem in personal use in early ecological development, but with ecological development, users change from personal to organizations, and managers serving as organizations have the need of controlling the operation rights of the wallet.
However, in the existing virtual money wallet mode, the user has all the rights of the wallet, including such things as transfer, signature, contract interaction, and even the bottom private key data of the whole wallet can be obtained through a browser. The existing mode lacks of authority control and data protection, and is extremely easy to cause loss to organizations.
Disclosure of Invention
The aim of the application is to provide a virtual currency wallet implementation method, a virtual currency wallet implementation system and electronic equipment, which can avoid the problem of data security in which all rights are concentrated in a transaction wallet.
Embodiments of the present application may be implemented as follows:
in a first aspect, the present application provides a virtual currency wallet implementing method applied to a virtual currency wallet implementing system, the virtual currency wallet implementing system including a proxy wallet, a remote wallet and a transaction wallet in communication connection, the method including:
after transaction data is obtained through the proxy wallet, carrying out authentication processing on the transaction data once, encrypting the transaction data after the authentication processing once passes, and sending the encrypted transaction data to the remote wallet;
decrypting the received transaction data through the remote wallet, performing secondary authentication processing on the decrypted transaction data, and transmitting the transaction data to the transaction wallet after the secondary authentication processing is passed;
and executing corresponding transaction operation by the transaction wallet and based on the transaction data.
In an alternative embodiment, the proxy wallet and the transaction wallet are both used as plug-ins to a browser, the proxy wallet and the transaction wallet being injected into the same application program interface of the browser for invocation by the browser.
In an alternative embodiment, the transaction wallet stores a help word therein, and the step of performing a corresponding transaction operation by the transaction wallet and based on the transaction data includes:
calculating to obtain a wallet private key through the mnemonics stored in the transaction wallet;
calculating a corresponding wallet public key according to the wallet private key, and determining a transaction address according to the wallet public key;
and executing corresponding transaction operation based on the transaction data and the transaction address.
In an alternative embodiment, the step of performing a corresponding transaction operation based on the transaction data and the transaction address includes:
obtaining virtual currency in the transaction data and obtaining currency types of the virtual currency;
acquiring a wallet address corresponding to the currency type in the transaction address;
and transferring the virtual currency to the wallet address to complete corresponding transaction operation.
In an alternative embodiment, the primary authentication process and the secondary authentication process are an organizational tree verification process or a secondary verification process.
In an alternative embodiment, the step of encrypting the transaction data includes:
signing the transaction data using an encrypted private key stored in the proxy wallet;
the step of decrypting, by the remote wallet, the received transaction data includes:
and verifying signature information in the received transaction data through a public key stored in the remote wallet, and decrypting the transaction data after verification is valid.
In an alternative embodiment, the proxy wallet, the remote wallet and the transaction wallet are located in different local area networks, and communication is achieved among the proxy wallet, the remote wallet and the transaction wallet through a network real-time communication mode.
In a second aspect, the present application provides a virtual currency wallet-implementing system comprising a proxy wallet, a remote wallet, and a transaction wallet in communication;
the proxy wallet is used for carrying out authentication processing on the transaction data once after the transaction data are acquired, encrypting the transaction data after the authentication processing is passed once, and sending the encrypted transaction data to the remote wallet;
the remote wallet is used for decrypting the received transaction data, performing secondary authentication processing on the decrypted transaction data, and transmitting the transaction data to the transaction wallet after the secondary authentication processing is passed;
the transaction wallet is configured to perform a corresponding transaction operation based on the transaction data.
In an alternative embodiment, the transaction wallet stores a help token therein, the transaction wallet being configured to perform a corresponding transaction operation based on the transaction data by:
calculating to obtain a wallet private key through the mnemonics stored in the transaction wallet;
calculating a corresponding wallet public key according to the wallet private key, and determining a transaction address according to the wallet public key;
and executing corresponding transaction operation based on the transaction data and the transaction address.
In a third aspect, the present application provides an electronic device comprising a machine-readable storage medium storing machine-executable instructions and a processor that, when executed, implements a method as in any of the preceding embodiments.
The beneficial effects of the embodiment of the application include, for example:
the application provides a virtual currency wallet implementation method, a virtual currency wallet implementation system and electronic equipment, wherein the virtual currency wallet implementation system comprises an agent wallet, a remote wallet and a transaction wallet, after transaction data are acquired through the agent wallet, the transaction data are subjected to authentication processing once and pass through the agent wallet, the transaction data are encrypted, and the encrypted transaction data are sent to the remote wallet. Decrypting the received transaction data through the remote wallet, performing secondary authentication processing on the decrypted transaction data, and transmitting the transaction data to the transaction wallet after the secondary authentication processing is passed. And finally, executing corresponding transaction operation by the transaction wallet and based on the transaction data. In the scheme, the proxy wallet and the remote wallet are additionally arranged in the original transaction wallet mode, the proxy wallet and the remote wallet perform authority verification and data protection, and the transaction wallet performs actual transaction operation, so that the data security problem that all authorities are concentrated in the transaction wallet can be avoided.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered limiting the scope, and that other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic architecture diagram of a virtual currency wallet implementing system provided in an embodiment of the present application;
FIG. 2 is a schematic diagram of a prior art transaction wallet-based wallet schema;
FIG. 3 is a schematic diagram of wallet mode in an embodiment of the present application;
FIG. 4 is a flowchart of a method for implementing a virtual currency wallet provided in an embodiment of the present application;
FIG. 5 is a flowchart of the substeps involved in S13 in FIG. 4;
FIG. 6 is a flow chart of sub-steps involved in S133 in FIG. 5;
fig. 7 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, which are generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, as provided in the accompanying drawings, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures.
In the description of the present application, it should be noted that, if the terms "first," "second," and the like are used merely to distinguish between descriptions, they are not to be construed as indicating or implying relative importance.
It should be noted that, without conflict, features in embodiments of the present application may be combined with each other.
Referring to fig. 1, a schematic architecture diagram of a virtual currency wallet implementing system according to an embodiment of the present application is provided, where the virtual currency wallet implementing system includes a proxy wallet, a remote wallet, and a transaction wallet that are communicatively connected. The proxy wallet, the remote wallet and the transaction wallet are all digital wallets carried on devices, such as terminal devices or servers, and can be digital wallets carried on different terminal devices or servers, or digital wallets carried on the same terminal device or server. The division between proxy wallet, remote wallet and transaction wallet can be understood to be divided with different operators operating and different operating contents.
The terminal device and the server can be any type of electronic device such as a computer, a smart phone, an all-in-one machine and the like.
For example, for an application scenario inside an enterprise, the proxy wallets may be multiple, each proxy wallet may be controlled by each employee inside the enterprise, the remote wallets may be digital wallets operated by an administrator of the enterprise, and the transaction wallets may be wallets performing actual transaction operations in the original transaction system, and the transaction wallets may be digital wallets controlled by employees or digital wallets controlled by the administrator.
In the original transaction system, only a transaction wallet is provided, and the operation authority about the transaction is concentrated in the transaction wallet, namely, each staff can directly execute various transaction operations based on the operation authority concentrated in the transaction wallet. As shown in fig. 2, the wallet of the prior art works in such a manner that a transaction wallet is installed in a browser, and a help word is stored in the transaction wallet, and a transaction operation is directly performed based on the transaction wallet.
The virtual currency wallet implementation system provided in this embodiment is that, based on the original transaction system, a transaction wallet and a remote wallet are added, which is equivalent to transplanting a part of operation authority of the transaction wallet into the transaction wallet and the remote wallet, and authentication and data security processing are performed through the proxy wallet and the remote wallet, and the transaction wallet only performs actual transaction operation after authentication and data security processing. Referring to fig. 3, in the embodiment of the present application, a proxy wallet is installed in a browser, the proxy wallet is in communication connection with a remote wallet, and after the proxy wallet and the remote wallet are authenticated, transaction data is transmitted to a transaction wallet which is also installed in the browser, so that transaction operation is realized through the transaction wallet.
Therefore, under the condition that the original mode of executing actual transaction operation by utilizing the transaction wallet is not changed, the data security problem easily caused by centralizing all operation authorities in the transaction wallet can be avoided.
Referring to fig. 4 in combination, a flow chart of a virtual currency wallet implementing method according to an embodiment of the present application is provided, where the virtual currency wallet implementing method is applied to the virtual currency wallet implementing system. The detailed steps of the virtual currency wallet implementation method are described below.
S11, after transaction data are obtained through the proxy wallet, authentication processing is carried out on the transaction data once, after the authentication processing is passed once, the transaction data are encrypted, and the encrypted transaction data are sent to the remote wallet.
S12, decrypting the received transaction data through the remote wallet, performing secondary authentication processing on the decrypted transaction data, and transmitting the transaction data to the transaction wallet after the secondary authentication processing is passed.
S13, executing corresponding transaction operation through the transaction wallet and based on the transaction data.
In this embodiment, the transaction data may be user-provided, and the transaction data may include information such as transaction initiator, transaction recipient, transaction amount, and the like. The transaction data may be in JSON format, for example in the form of { method, params }, where params is an optional parameter. Taking the transaction data including the user account as an example, the user account information included in the transaction data may be expressed as { method: 'eth_requestaccounts', }.
The proxy wallet can be installed in a browser of the terminal equipment as a plug-in, a user can log in the code wallet through the browser, and transaction data can be obtained through the code wallet.
On the proxy wallet side, first, the transaction data may be subjected to a primary authentication process, which may be an organizational tree verification process or a secondary verification process, and specifically, the embodiment is not limited. The organizational structure tree verification process and the secondary verification process are mature technologies, and the embodiment is not described herein.
After one authentication process is passed, the transaction data can be encrypted on one side of the proxy wallet, and the encrypted transaction data is sent to the remote wallet, so that the data security of the transaction data in the transmission process is ensured, and the risk caused by data leakage is avoided.
In this embodiment, neither the remote wallet nor the proxy wallet is a wallet that actually manipulates virtual assets, neither of which stores help notes. The remote wallet-based transaction data is subjected to secondary authentication processing on the transaction data which is proxied by the proxy wallet, so that the authority of the user on the transaction data is further verified.
The remote wallet, upon receiving the transaction data sent by the proxy wallet, first decrypts the transaction data. In this embodiment, the proxy wallet may use the encryption private key in the proxy wallet to sign the transaction data when encrypting the transaction data. And the remote wallet can verify the signature information in the received transaction data through a public key stored in the remote wallet after receiving the transaction data, and decrypt the transaction data after the verification is valid.
The remote wallet may perform a secondary authentication process on the decrypted transaction data, where the secondary authentication process may be an organizational tree verification process or a secondary verification process, which is not limited herein.
The transaction data after the secondary authentication process by the remote wallet will be sent to the transaction wallet, which is an existing wallet on the market that can actually handle the virtual asset. Thus, actual transaction operations may be performed by the transaction wallet based on the transaction data.
In this embodiment, both the proxy wallet and the transaction wallet are used as plug-ins to the browser, and the proxy wallet and the transaction wallet are injected into the same application program interface (Application Programming Interface, API) of the browser for the browser to call. Therefore, the existing ecological project does not need to be modified, the user does not feel which wallet is called to conduct transaction, and the problem of poor user experience caused by modification of the original transaction habit mode is avoided.
In this embodiment, in the scenario that the proxy wallet, the transaction wallet and the remote wallet implement related functions based on different terminal devices, if the proxy wallet, the remote wallet and the transaction wallet are located in different local area networks, the proxy wallet, the remote wallet and the transaction wallet implement communication through a network real-time communication mode, such as a P2P communication mode. Therefore, transaction data does not need to pass through a centralized server in the transmission process, the transaction data can be prevented from being stolen, and the transmission safety of the transaction data is ensured.
In the virtual currency wallet implementation scheme provided by the embodiment, the proxy wallet and the remote wallet do not need to be imported with the mnemonic words, and the proxy wallet and the remote wallet perform authentication on transaction data and cannot perform actual transaction operation, so that data security can be ensured, and the mnemonic word leakage risk does not exist.
The agent wallet transmits the obtained transaction data to the remote wallet in a network real-time communication mode, so that the risk of stealing the transaction data can be prevented.
The agent wallet and the transaction wallet are injected into the same API of the browser for the browser to call, the original transaction mode is not changed on the basis of the existing ecological project system, and the scheme is light in weight, free of invasion and perception, and can be integrated into the existing ecological project system. The user has no sense on wallet call, and the problem of reducing user experience is avoided.
In this embodiment, the mnemonic is stored in the transaction wallet, referring to fig. 5, the above steps of executing the corresponding transaction operation by the transaction wallet based on the transaction data may be implemented by the following ways:
s131, calculating to obtain a wallet private key through the mnemonics stored in the transaction wallet.
S132, calculating a corresponding wallet public key according to the wallet private key, and determining a transaction address according to the wallet public key.
S133, executing corresponding transaction operation based on the transaction data and the transaction address.
In a digital wallet, the wallet private key is generally composed of a 64-bit character string, so that the recording is inconvenient, and the recording is very easy to copy by mistake, so that a mnemonic word appears, which is another expression form of the wallet private key, is generally composed of 12 words, and is convenient for a user to memorize and record. It is understood that the wallet private key is a key that determines whether the user can open the virtual currency wallet to extract virtual currency in the wallet, and the mnemonic is provided to prevent the user from forgetting the private key.
Therefore, the corresponding wallet private key can be pushed out based on the mnemonics stored in the transaction wallet, the transaction wallet can be logged in based on the wallet private key, and the transaction wallet has operation authority.
The wallet public key may be generated from a wallet private key and the wallet private key is paired, and the transaction address may be calculated using the wallet public key. The transaction address is a string of characters for use in transfer. Based on the transaction amount and other information in the transaction data and the determined transaction address, a corresponding transaction operation may be performed by the transaction wallet.
In this embodiment, considering that a user may have multiple wallet addresses, and different wallet addresses correspond to different wallet types, different wallet types may be used to perform transactions of different currency types. Therefore, referring to fig. 6, in this embodiment, when the corresponding transaction operation is performed based on the transaction data and the transaction address, the following manner may be implemented:
s1331, obtaining virtual currency in the transaction data and obtaining the currency type of the virtual currency.
S1332, acquiring a wallet address corresponding to the currency type in the transaction address.
S1333, transferring the virtual currency to the wallet address to complete corresponding transaction operation.
In this embodiment, the money is divided according to the types of money. In executing a transaction, it is necessary to determine the currency type of the virtual currency. In the case where the transaction address determined for the same user includes a plurality of wallet addresses, the wallet address corresponding to the currency type among the plurality of wallet addresses may be determined. And further transfers virtual currency of the corresponding currency type to the corresponding wallet address.
If the determined wallet address is only one, the virtual currency may be directly transferred to the wallet address.
In this embodiment, a flow of a transaction operation performed by a transaction wallet will be described below by taking the transaction wallet as the most widely used MetaMask wallet.
The transaction data is triggered on the Metamask wallet page, and the transaction data is transmitted from a remote wallet. The data format may be as follows:
interface RequestArguments{
method:string;
params?:unknown[]|object;
}
the following are exemplary sample data:
{
method:'eth_sendTransaction',
params:[
{
from:'0x2C0F1b8BE2aaA363fc1095De9d854A9e9BFD5008',
to:'0x2C0F1b8BE2aaA363fc1095De9d854A9e9BFD5008',
value is '0x9184e72a',//16, corresponding to 10, 2441406250, which is the unit of transfer
},
]
}
The related executive is called to execute the transaction operation, and the specific calling method can be as follows:
const params={
method:'eth_sendTransaction',
params:[
{
from:'0x2C0F1b8BE2aaA363fc1095De9d854A9e9BFD5008',
to:'0x2C0F1b8BE2aaA363fc1095De9d854A9e9BFD5008',
value is '0x9184e72a',//16, corresponding to 10, 2441406250, which is the unit of transfer
},
]
};
window.ethereum
.request({
method:'eth_sendTransaction',
params,
})
.then((result)=>{
//The result varies by RPC method.
//For example,this method returns a transaction hash hexadecimal string
upon success.
})
.catch((error)=>{
//If the request fails,the Promise rejects with an error.
})
After the calling method is executed, the transaction wallet is triggered to play a frame confirmation page, and the transaction operation can be completed after clicking and determining.
The virtual currency wallet implementation provided by the present embodiment includes a proxy wallet, a remote wallet, and a transaction wallet. The proxy wallet and the transaction wallet inject the same API for the browser to call. The proxy wallet only authenticates and encrypts the transaction data and does not store wallet data and mnemonics. The remote wallet further authenticates the transaction data proxied by the proxy wallet. The proxy wallet and the remote wallet are communicated in a P2P mode, transaction data does not pass through the centralized server, the transaction data can be prevented from being stolen, and the transaction data security is ensured.
The mnemonic is only stored in the transaction wallet, the transaction wallet is utilized to manage assets, and the permission control is realized by the proxy wallet and the remote wallet, so that the security of data can be ensured by a lightweight system under the condition of not changing the transaction habit of a user.
Referring again to fig. 1, the virtual currency wallet implementing system provided in the embodiment of the present application corresponds to the virtual currency wallet implementing method in the above embodiment, and the proxy wallet, the remote wallet and the transaction wallet in the system may be used to implement the following functions. It should be noted that the proxy wallet, the remote wallet and the transaction wallet are based on the carried terminal device, and are combined with the software and hardware devices of the terminal device to realize the following related functions.
The proxy wallet is used for carrying out authentication processing on the transaction data once after the transaction data are acquired, encrypting the transaction data after the authentication processing is passed once, and sending the encrypted transaction data to the remote wallet;
the remote wallet is used for decrypting the received transaction data, performing secondary authentication processing on the decrypted transaction data, and transmitting the transaction data to the transaction wallet after the secondary authentication processing is passed;
the transaction wallet is configured to perform a corresponding transaction operation based on the transaction data.
In one possible implementation, the proxy wallet and the transaction wallet are both used as plug-ins to a browser, the proxy wallet and the transaction wallet being injected into the same application program interface of the browser for invocation by the browser.
In one possible implementation, the transaction wallet stores a mnemonic therein, the transaction wallet being configured to perform a corresponding transaction operation based on the transaction data by:
calculating to obtain a wallet private key through the mnemonics stored in the transaction wallet;
calculating a corresponding wallet public key according to the wallet private key, and determining a transaction address according to the wallet public key;
and executing corresponding transaction operation based on the transaction data and the transaction address.
In one possible implementation, the transaction wallet is configured to perform corresponding transaction operations by:
obtaining virtual currency in the transaction data and obtaining currency types of the virtual currency;
acquiring a wallet address corresponding to the currency type in the transaction address;
and transferring the virtual currency to the wallet address to complete corresponding transaction operation.
In one possible implementation, the primary authentication process and the secondary authentication process are an organizational architecture tree verification process or a secondary verification process.
In one possible implementation, the proxy wallet is used to encrypt transaction data by:
signing the transaction data using an encrypted private key stored in the proxy wallet;
in one possible implementation, the remote wallet is used to decrypt transaction data by:
and verifying signature information in the received transaction data through a public key stored in the remote wallet, and decrypting the transaction data after verification is valid.
In one possible implementation, the proxy wallet, the remote wallet, and the transaction wallet are in different local area networks, and communication is implemented between the proxy wallet, the remote wallet, and the transaction wallet through a network real-time communication manner.
It should be noted that, the virtual currency wallet implementing system provided in this embodiment corresponds to the method in the foregoing embodiment, and has the same, similar and corresponding technical effects as the foregoing method, and details of this embodiment may be referred to in the related description of the foregoing embodiment, which is not repeated herein.
Referring to fig. 7, the embodiment of the present application further provides an electronic device, which may be understood as a terminal device carrying the above proxy wallet, remote wallet and transaction wallet. As shown in fig. 7, the electronic device includes a Central Processing Unit (CPU) that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) or a program loaded from a storage section into a Random Access Memory (RAM). In the RAM, various programs and data required for the system operation are also stored. The CPU, ROM and RAM are connected to each other by a bus. An input/output (I/O) interface is also connected to the bus.
The following components are connected to the I/O interface: an input section including a keyboard, a mouse, etc.; an output section including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), etc., and a speaker, etc.; a storage section including a hard disk or the like; and a communication section including a network interface card such as a LAN card, a modem, and the like. The communication section performs communication processing via a network such as the internet. The drives are also connected to the I/O interfaces as needed. Removable media such as magnetic disks, optical disks, magneto-optical disks, semiconductor memories, and the like are mounted on the drive as needed so that a computer program read therefrom is mounted into the storage section as needed.
In particular, according to embodiments of the present application, the processes described by the schematic illustrations of the main steps above may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the schematic diagram of the main steps. In such embodiments, the computer program may be downloaded and installed from a network via a communication portion, and/or installed from a removable medium. The above-described functions defined in the system of the present application are performed when the computer program is executed by a Central Processing Unit (CPU).
It should be noted that the computer readable medium shown in the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
In summary, the method, the system and the electronic device for implementing the virtual currency wallet provided by the embodiment of the application include the proxy wallet, the remote wallet and the transaction wallet, after the proxy wallet obtains the transaction data, the proxy wallet performs authentication processing on the transaction data once and then encrypts the transaction data, and sends the encrypted transaction data to the remote wallet. Decrypting the received transaction data through the remote wallet, performing secondary authentication processing on the decrypted transaction data, and transmitting the transaction data to the transaction wallet after the secondary authentication processing is passed. And finally, executing corresponding transaction operation by the transaction wallet and based on the transaction data. In the scheme, the proxy wallet and the remote wallet are additionally arranged in the original transaction wallet mode, the proxy wallet and the remote wallet perform authority verification and data protection, and the transaction wallet performs actual transaction operation, so that the data security problem that all authorities are concentrated in the transaction wallet can be avoided.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions easily conceivable by those skilled in the art within the technical scope of the present application should be covered in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A virtual currency wallet-implementing method, characterized by being applied to a virtual currency wallet-implementing system including a proxy wallet, a remote wallet, and a transaction wallet in communication connection, the method comprising:
after transaction data is obtained through the proxy wallet, carrying out authentication processing on the transaction data once, encrypting the transaction data after the authentication processing once passes, and sending the encrypted transaction data to the remote wallet;
decrypting the received transaction data through the remote wallet, performing secondary authentication processing on the decrypted transaction data, and transmitting the transaction data to the transaction wallet after the secondary authentication processing is passed;
and executing corresponding transaction operation by the transaction wallet and based on the transaction data.
2. The virtual currency wallet implementation of claim 1, wherein the proxy wallet and the transaction wallet are both used as plug-ins to a browser, the proxy wallet and the transaction wallet being injected into the same application program interface of the browser for invocation by the browser.
3. The virtual currency wallet implementing method of claim 1, wherein said transaction wallet stores a mnemonic therein, said step of performing a corresponding transaction operation by said transaction wallet and based on said transaction data, comprising:
calculating to obtain a wallet private key through the mnemonics stored in the transaction wallet;
calculating a corresponding wallet public key according to the wallet private key, and determining a transaction address according to the wallet public key;
and executing corresponding transaction operation based on the transaction data and the transaction address.
4. A virtual currency wallet implementing method according to claim 3, wherein said step of performing a corresponding transaction operation based on said transaction data and transaction address comprises:
obtaining virtual currency in the transaction data and obtaining currency types of the virtual currency;
acquiring a wallet address corresponding to the currency type in the transaction address;
and transferring the virtual currency to the wallet address to complete corresponding transaction operation.
5. The virtual currency wallet implementing method of claim 1, wherein the primary authentication process and the secondary authentication process are an organizational tree verification process or a secondary verification process.
6. The virtual currency wallet implementing method of claim 1, wherein said step of encrypting transaction data comprises:
signing the transaction data using an encrypted private key stored in the proxy wallet;
the step of decrypting, by the remote wallet, the received transaction data includes:
and verifying signature information in the received transaction data through a public key stored in the remote wallet, and decrypting the transaction data after verification is valid.
7. The virtual currency wallet implementation of claim 1, wherein the proxy wallet, remote wallet and transaction wallet are in different local area networks, the proxy wallet, remote wallet and transaction wallet being in communication via a network real-time communication means.
8. A virtual currency wallet-implementing system, comprising a proxy wallet, a remote wallet, and a transaction wallet in communication;
the proxy wallet is used for carrying out authentication processing on the transaction data once after the transaction data are acquired, encrypting the transaction data after the authentication processing is passed once, and sending the encrypted transaction data to the remote wallet;
the remote wallet is used for decrypting the received transaction data, performing secondary authentication processing on the decrypted transaction data, and transmitting the transaction data to the transaction wallet after the secondary authentication processing is passed;
the transaction wallet is configured to perform a corresponding transaction operation based on the transaction data.
9. The virtual currency wallet implementing system of claim 8, wherein said transaction wallet stores a mnemonic therein, said transaction wallet operative to perform a corresponding transaction operation based on said transaction data by:
calculating to obtain a wallet private key through the mnemonics stored in the transaction wallet;
calculating a corresponding wallet public key according to the wallet private key, and determining a transaction address according to the wallet public key;
and executing corresponding transaction operation based on the transaction data and the transaction address.
10. An electronic device comprising a machine-readable storage medium storing machine-executable instructions and a processor which, when executing the machine-executable instructions, implements the method of any one of claims 1-7.
CN202311513388.0A 2023-11-13 2023-11-13 Virtual currency wallet implementation method, system and electronic equipment Pending CN117557260A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311513388.0A CN117557260A (en) 2023-11-13 2023-11-13 Virtual currency wallet implementation method, system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311513388.0A CN117557260A (en) 2023-11-13 2023-11-13 Virtual currency wallet implementation method, system and electronic equipment

Publications (1)

Publication Number Publication Date
CN117557260A true CN117557260A (en) 2024-02-13

Family

ID=89822689

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311513388.0A Pending CN117557260A (en) 2023-11-13 2023-11-13 Virtual currency wallet implementation method, system and electronic equipment

Country Status (1)

Country Link
CN (1) CN117557260A (en)

Similar Documents

Publication Publication Date Title
US20210192497A1 (en) Methods, apparatus and computer program products for securely accessing account data
EP3704621B1 (en) Secure identity and profiling system
US10554420B2 (en) Wireless connections to a wireless access point
EP2915279B1 (en) Method and system for protected exchange of data
US8924714B2 (en) Authentication with an untrusted root
CN110050435A (en) Key pair architecture for security message transmitting-receiving
CN109791671A (en) Method and system for realizing block chain
WO2017108783A1 (en) Method for managing a trusted identity
KR20050057081A (en) Secure logging of transactions
EP3867849B1 (en) Secure digital wallet processing system
JP2023535013A (en) Quantum secure payment system
CN115066863B (en) System and techniques for cross-account device key transfer in benefit denial systems
CN106161470A (en) A kind of authorization method, client, server and system
CN108616352A (en) Dynamic password formation method based on safety element and system
KR102131206B1 (en) Method, service server and authentication server for providing corporate-related services, supporting the same
AU2020239610A1 (en) Improved Storage System
US10108937B2 (en) Method of registering a membership for an electronic payment, system for same, and apparatus and terminal thereof
CN108768655A (en) Dynamic password formation method and system
CN117557260A (en) Virtual currency wallet implementation method, system and electronic equipment
KR101795849B1 (en) Authentication apparatus and method for connectivity of fintech services, and computer program for the same
KR102060976B1 (en) Method for dealing a digital currency with block chain matching QR(or BAR) code
CN113987561A (en) Trusted execution environment-based private data classification method, system and terminal
KR101936941B1 (en) Electronic approval system, method, and program using biometric authentication
KR101171798B1 (en) System and method for electronic payment in electronic commerce, and recording medium used thereto
TW202101267A (en) Account data processing method and account data processing system ensuring that there is encryption protection when account data is returned to an electronic payment dealer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination