WO2019019153A1 - Scheme for generating, storing and using private key - Google Patents

Scheme for generating, storing and using private key Download PDF

Info

Publication number
WO2019019153A1
WO2019019153A1 PCT/CN2017/094918 CN2017094918W WO2019019153A1 WO 2019019153 A1 WO2019019153 A1 WO 2019019153A1 CN 2017094918 W CN2017094918 W CN 2017094918W WO 2019019153 A1 WO2019019153 A1 WO 2019019153A1
Authority
WO
WIPO (PCT)
Prior art keywords
private key
chip
encryption
encryption chip
decrypted
Prior art date
Application number
PCT/CN2017/094918
Other languages
French (fr)
Chinese (zh)
Inventor
吴思进
王志文
Original Assignee
杭州复杂美科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州复杂美科技有限公司 filed Critical 杭州复杂美科技有限公司
Priority to PCT/CN2017/094918 priority Critical patent/WO2019019153A1/en
Publication of WO2019019153A1 publication Critical patent/WO2019019153A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Definitions

  • the present invention relates to the field of data processing technologies, and in particular, to a scheme for generating and using a private key.
  • the blockchain is widely used, and the key step is to use the private key to sign the transaction. Therefore, how to securely store and manage the private key is more important for blockchain transactions.
  • the current private key is mainly encrypted by the symmetric encryption algorithm, so the user needs to remember the password to be able to solve the problem and operate the private key later. And the password is regularly updated for security reasons. If it is necessary to maintain multiple wallets or private keys, the maintenance cost is high and it is inconvenient to use. Therefore, how to securely and conveniently store and manage multiple private keys in different blockchains is a technical problem that needs to be solved by those skilled in the art.
  • An object of the present invention is to provide a scheme for generating and storing a private key, which is convenient for safe operation of a blockchain by using a commonly used mobile phone, and the method and system are as follows;
  • the private key is stored in the encryption chip, and can be generated in the chip or externally, but the private key in the chip cannot be exported to the chip, and the content to be signed or decrypted by the private key can be transmitted to the encryption chip.
  • the signature result and the decrypted content can be sent outside the encryption chip.
  • the algorithm stores the result as a private key in the encryption chip.
  • the encryption chip can be built in the mobile phone, or can be a SIM card chip of the mobile phone or a SIM card encryption chip with wireless communication function, and the mnemonic should be stored in a safe place. After the chip is lost, the mnemonic can be used to regenerate the private key.
  • the device for storing the private key and the encryption chip therein can be completely separated from the Internet communication, and the content that needs to be signed or decrypted is generated into an image form such as a two-dimensional code, and the information is transmitted by scanning or photographing, and then transmitted to the encryption chip through processing. Processing, private key signature or decrypted results can generate two-dimensional code, by scanning If the private key is decrypted, the private key is encrypted with another private key corresponding to the public key, and the other private key may be stored in the encryption chip.
  • the private key is randomly generated in the encryption chip, and the private key is not exportable, and the other private key is encrypted by using the corresponding public key, and the result after encrypting the private key may be output, and a two-dimensional code may be generated, which may be photographed or Save the print, save it in a safe place, restore other private keys, input the encryption result into the encryption chip, decrypt it with the corresponding private key in the original chip, and write the decrypted private key to the encryption chip.
  • Encryption chip card Pin code authorization may be required.
  • the App may have a corresponding secret-free setting, and the size may be set.
  • the Pin code is required to be input.
  • the encryption chip Before inputting the PIN code, the encryption chip must be input after a continuous power-on, and the inter-turn interval of the input PIN code is specified. There is such a rule that the number of times the PIN code is allowed to be input can be increased but not lowered. safety.
  • the output of the encryption chip can be sent by wireless means such as short message or Bluetooth, or sent to other devices, such as a mobile phone or a display interface, to check whether the original data of the signature or decryption is illegally replaced, and then sent out.
  • wireless means such as short message or Bluetooth
  • other devices such as a mobile phone or a display interface
  • FIG. 1 is a schematic diagram of a SIM card encryption chip used after being loaded into a SIM card slot of a mobile phone;
  • FIG. 2 is a flow chart of private key backup and import.
  • the core of the present invention is to provide a scheme for private key generation storage and use.
  • the user obtains the SIM card by real-name authentication, or after registration.
  • the algorithm stores the result as a private key in the encryption chip.
  • the encryption chip can be built in the mobile phone, or can be a SIM card chip of the mobile phone or a SIM card encryption chip with wireless communication function, and the mnemonic should be stored in a safe place. After the chip is lost, the mnemonic can be used to regenerate the private key.
  • the user mobile phone app obtains the public key in the card and converts it into a corresponding blockchain address, and provides the coin to the person who plays the coin, and the coin player pays the coin according to the address (adding Pin code authentication).
  • the user mobile phone App scans the private key QR code and fills in the private key type to import the private key into the SIM card, and the SIM card generates a corresponding public key according to different private key types. If the original private key needs to be overwritten, the first need to be The certificate is authenticated by the Pin code, and the assets corresponding to the private key are transferred before being overwritten.
  • the user mobile phone App signs the transaction data with the private key in the SIM card, and the mobile phone App sends the transaction to the blockchain network, which can be authenticated by Pin code, and the authentication code is required for the large transaction.
  • the coin person confirms receipt of the corresponding blockchain virtual currency through the blockchain network
  • the scanned private key is encrypted by the in-card encryption algorithm using the public key generated by the SIM card, and then the print is saved offline.
  • the offline encrypted private key data is decrypted by using the public key generated by the SIM card. After the decryption is successful, the private key can be processed.
  • the user's wallet private key A encrypted by an encryption algorithm in the SIM card (asymmetric algorithm), generates A' data and a two-dimensional code, and prints the A' and the two-dimensional code onto paper or other secure storage place, if
  • the SIM card decrypts it by a decryption algorithm (asymmetric algorithm), and Import it into the SIM card security chip for use.

Abstract

Provided is a scheme for generating, storing and using a private key. The private key is stored in an encryption chip, can be generated in the chip, and can also be imported externally. However, the private key in the chip cannot be exported out of the chip, and content needing to be signed or decrypted by means of the private key can be transmitted into the encryption chip, and a signature result and the decrypted content can be sent out of the encryption chip.

Description

说明书 发明名称:私钥生成存储及使用的方案 技术领域  Instruction Manual Name: Private Key Generation Storage and Use Solution Technical Field
[0001] 本发明涉及数据处理技术领域, 特别涉及一种私钥生成存储及使用的方案。  [0001] The present invention relates to the field of data processing technologies, and in particular, to a scheme for generating and using a private key.
背景技术  Background technique
[0002] 目前区块链幵始广泛应用, 而其关键步骤是用私钥对交易进行签名, 所以如何 对私钥进行安全的保存和管理对区块链交易来说比较关键。 当前私钥主要通过 对称加密算法对钱包进行加密保存, 因此用户需要记住密码为以后可以解幵并 对私钥进行操作。 并且为了安全的需要对密码定期更新, 如果需要对多个钱包 或私钥进行维护成本很高, 而且使用不方便。 因此, 如何安全方便的保存并管 理不同区块链多个私钥, 是本领域技术人员需要解决的技术问题。  [0002] At present, the blockchain is widely used, and the key step is to use the private key to sign the transaction. Therefore, how to securely store and manage the private key is more important for blockchain transactions. The current private key is mainly encrypted by the symmetric encryption algorithm, so the user needs to remember the password to be able to solve the problem and operate the private key later. And the password is regularly updated for security reasons. If it is necessary to maintain multiple wallets or private keys, the maintenance cost is high and it is inconvenient to use. Therefore, how to securely and conveniently store and manage multiple private keys in different blockchains is a technical problem that needs to be solved by those skilled in the art.
技术问题  technical problem
[0003] 本发明的目的是提供一种私钥生成存储及使用的方案, 利用人们常用的手机很 方便的对区块链进行安全的操作, 方法及系统如下;  [0003] An object of the present invention is to provide a scheme for generating and storing a private key, which is convenient for safe operation of a blockchain by using a commonly used mobile phone, and the method and system are as follows;
问题的解决方案  Problem solution
技术解决方案  Technical solution
[0004] 私钥存储在加密芯片中, 可在芯片内生成, 也可以外部导入, 但芯片内的私钥 无法导出到芯片外, 要用私钥进行签名或解密的内容可以传入加密芯片, 并可 以将签名结果和解密内容发送到加密芯片外面。  [0004] The private key is stored in the encryption chip, and can be generated in the chip or externally, but the private key in the chip cannot be exported to the chip, and the content to be signed or decrypted by the private key can be transmitted to the encryption chip. The signature result and the decrypted content can be sent outside the encryption chip.
[0005] 随机生成一定的达到安全长度的助记词, 并可以人为修改, 增加随机性, 可使 用 Base58格式记录, 加上个人自定义助记词, 并使用一定数量次数的哈希计算或 其他算法, 把结果作为私钥, 存入加密芯片, 加密芯片可以内置在手机内, 也 可以是手机 SIM卡芯片内, 或带无线通讯功能的 SIM卡加密芯片, 助记词要保存 在安全的地方, 以便芯片遗失后, 可以用助记词重新生成私钥。  [0005] Randomly generate certain mnemonics that reach a safe length, and can be artificially modified to increase randomness, can be recorded in Base58 format, plus personal custom mnemonics, and use a certain number of hash calculations or other The algorithm stores the result as a private key in the encryption chip. The encryption chip can be built in the mobile phone, or can be a SIM card chip of the mobile phone or a SIM card encryption chip with wireless communication function, and the mnemonic should be stored in a safe place. After the chip is lost, the mnemonic can be used to regenerate the private key.
[0006] 保存私钥的设备及其中的加密芯片可完全脱离互联网通讯, 将需要签名或解密 的内容生成二维码等图像形式, 通过扫描或拍照将信息传输, 并通过处理后传 入加密芯片处理, 私钥签名或解密后的结果可以生成二维码, 通过扫描的方式 传输出去, 若私钥解密的是该私钥对应公钥加密的其他私钥, 则可以将该其他 私钥存入本加密芯片。 [0006] The device for storing the private key and the encryption chip therein can be completely separated from the Internet communication, and the content that needs to be signed or decrypted is generated into an image form such as a two-dimensional code, and the information is transmitted by scanning or photographing, and then transmitted to the encryption chip through processing. Processing, private key signature or decrypted results can generate two-dimensional code, by scanning If the private key is decrypted, the private key is encrypted with another private key corresponding to the public key, and the other private key may be stored in the encryption chip.
[0007] 加密芯片内随机生成私钥, 该私钥不可导出, 用其对应的公钥将其他私钥进行 加密, 可将加密私钥后的结果输出, 可生成二维码, 可通过拍照或打印等保存 , 保存在安全的地方, 恢复其他私钥吋, 可将加密结果输入加密芯片, 用原来 芯片中对应的私钥解密, 解密出的私钥写入加密芯片中。  [0007] The private key is randomly generated in the encryption chip, and the private key is not exportable, and the other private key is encrypted by using the corresponding public key, and the result after encrypting the private key may be output, and a two-dimensional code may be generated, which may be photographed or Save the print, save it in a safe place, restore other private keys, input the encryption result into the encryption chip, decrypt it with the corresponding private key in the original chip, and write the decrypted private key to the encryption chip.
[0008] 加密芯片中可以存储多组私钥及公钥地址。  [0008] Multiple sets of private keys and public key addresses can be stored in the encryption chip.
[0009] 可需要加密芯片卡 Pin码授权, 当然 App可以有相应免密设置, 并且可以设定大 小额, 当大额交易才需要输入 Pin码。  [0009] Encryption chip card Pin code authorization may be required. Of course, the App may have a corresponding secret-free setting, and the size may be set. When a large transaction is required, the Pin code is required to be input.
[0010] 当 Pin码连续输错超过一定次数, 加密芯片卡会被锁定, 相关实名认证或授权 后才能解锁。 [0010] When the Pin code is continuously input incorrectly for more than a certain number of times, the encrypted chip card will be locked, and the real name authentication or authorization can be unlocked.
[0011] 加密芯片输入 PIN码前必须在连续通电后一定吋间后才可输入, 并且输入 PIN码 的吋间间隔有规定, 有这样的规定可以增加允许 PIN码输错的次数但也没有降低 安全性。  [0011] Before inputting the PIN code, the encryption chip must be input after a continuous power-on, and the inter-turn interval of the input PIN code is specified. There is such a rule that the number of times the PIN code is allowed to be input can be increased but not lowered. safety.
[0012] 加密芯片的输出可以通过短信或蓝牙等无线方式发送出去, 或发送到其他设备 , 如手机或显示界面上, 査看签名或解密的原始数据是否被非法替代, 再发送 出去。  [0012] The output of the encryption chip can be sent by wireless means such as short message or Bluetooth, or sent to other devices, such as a mobile phone or a display interface, to check whether the original data of the signature or decryption is illegally replaced, and then sent out.
发明的有益效果  Advantageous effects of the invention
有益效果  Beneficial effect
[0013] 安全方便的保存并管理不同区块链多个私钥。  [0013] Secure and conveniently store and manage multiple private keys of different blockchains.
对附图的简要说明  Brief description of the drawing
附图说明  DRAWINGS
[0014] 图 1为 SIM卡加密芯片装入手机 SIM卡槽后使用的示意图;  1 is a schematic diagram of a SIM card encryption chip used after being loaded into a SIM card slot of a mobile phone;
[0015] 图 2为私钥备份及导入流程图。 [0015] FIG. 2 is a flow chart of private key backup and import.
实施该发明的最佳实施例  BEST MODE FOR CARRYING OUT THE INVENTION
本发明的最佳实施方式  BEST MODE FOR CARRYING OUT THE INVENTION
[0016] 本发明的核心是提供一种私钥生成存储及使用的方案。 本发明的实施方式 [0016] The core of the present invention is to provide a scheme for private key generation storage and use. Embodiments of the invention
[0017] 用户通过实名认证, 或注册后获取 SIM卡。 [0017] The user obtains the SIM card by real-name authentication, or after registration.
[0018] 随机生成一定的达到安全长度的助记词, 并可以人为修改, 增加随机性, 可使 用 Base58格式记录, 加上个人自定义助记词, 并使用一定数量次数的哈希计算或 其他算法, 把结果作为私钥, 存入加密芯片, 加密芯片可以内置在手机内, 也 可以是手机 SIM卡芯片内, 或带无线通讯功能的 SIM卡加密芯片, 助记词要保存 在安全的地方, 以便芯片遗失后, 可以用助记词重新生成私钥。  [0018] randomly generate certain mnemonics that reach a safe length, and can be artificially modified to increase randomness, can be recorded in Base58 format, plus personal custom mnemonics, and use a certain number of hash calculations or other The algorithm stores the result as a private key in the encryption chip. The encryption chip can be built in the mobile phone, or can be a SIM card chip of the mobile phone or a SIM card encryption chip with wireless communication function, and the mnemonic should be stored in a safe place. After the chip is lost, the mnemonic can be used to regenerate the private key.
[0019] 用户接收交易:  [0019] The user receives the transaction:
[0020] 用户手机 App获取卡内公钥并转换成相应区块链地址, 提供给打币的人, 打币 人根据地址打币给用户 (可加 Pin码认证) 。  [0020] The user mobile phone app obtains the public key in the card and converts it into a corresponding blockchain address, and provides the coin to the person who plays the coin, and the coin player pays the coin according to the address (adding Pin code authentication).
[0021] 导入私钥: [0021] Import private key:
[0022] 用户手机 App扫描私钥二维码并填写私钥类型把私钥导入到 SIM卡中, SIM卡 根据不同私钥类型生成相应的公钥, 如果需要覆盖原有的私钥, 需要先通过 Pin 码认证, 并把私钥对应的资产转移后才能进行覆盖。  [0022] The user mobile phone App scans the private key QR code and fills in the private key type to import the private key into the SIM card, and the SIM card generates a corresponding public key according to different private key types. If the original private key needs to be overwritten, the first need to be The certificate is authenticated by the Pin code, and the assets corresponding to the private key are transferred before being overwritten.
[0023] 用户发起交易:  [0023] User initiated transaction:
[0024] 用户手机 App把交易数据用 SIM卡中的私钥对其进行签名, 手机 App把该交易发 送到区块链网络中, 可加 Pin码认证, 对大额交易需输认证码, 收币人通过区块 链网络确认收到相对应的区块链虚拟币  [0024] The user mobile phone App signs the transaction data with the private key in the SIM card, and the mobile phone App sends the transaction to the blockchain network, which can be authenticated by Pin code, and the authentication code is required for the large transaction. The coin person confirms receipt of the corresponding blockchain virtual currency through the blockchain network
[0025] 备份加密私钥:  [0025] Backup encrypted private key:
[0026] 用户通过 Pin码认证后, 用 SIM卡中的自己生成的公私钥把扫描到的私钥用卡内 加密算法进行加密, 然后打印离线保留起来。  [0026] After the user authenticates through the Pin code, the scanned private key is encrypted by the in-card encryption algorithm using the public key generated by the SIM card, and then the print is saved offline.
[0027] 解密备份私钥: [0027] Decrypt the backup private key:
[0028] 用户通过 Pin码认证后, 用 SIM卡中的自己生成的公私钥把离线加密的私钥数据 进行解密, 解密成功后, 可以对私钥进行相关业务处理。  [0028] After the user authenticates through the Pin code, the offline encrypted private key data is decrypted by using the public key generated by the SIM card. After the decryption is successful, the private key can be processed.
[0029] 用户钱包私钥 A, 通过 SIM卡中加密算法加密 (非对称算法) , 生成 A'数据及 二维码, 把 A'和二维码打印到纸上或其他安全的存储地, 如果需要使用该私钥 的吋候, 用手机扫描数据后, SIM卡通过解密算法将其解密 (非对称算法) , 并 将其导入到 SIM卡安全芯片中使用。 [0029] The user's wallet private key A, encrypted by an encryption algorithm in the SIM card (asymmetric algorithm), generates A' data and a two-dimensional code, and prints the A' and the two-dimensional code onto paper or other secure storage place, if When the private key is needed, after scanning the data with the mobile phone, the SIM card decrypts it by a decryption algorithm (asymmetric algorithm), and Import it into the SIM card security chip for use.
工业实用性  Industrial applicability
[0030] 说明书中各个实施例采用递进的方式描述, 每个实施例重点说明的都是与其他 实施例的不同之处, 各个实施例之间相同相似部分互相参见即可。  [0030] The various embodiments in the specification are described in a progressive manner, and each embodiment focuses on differences from other embodiments, and the same similar parts between the various embodiments may be referred to each other.
序列表自由内容  Sequence table free content
[0031] 专业人员还可以进一步意识到, 结合本文中所公幵的实施例描述的各示例的单 元及算法步骤, 能够以电子硬件、 计算机软件或者二者的结合来实现, 为了清 楚地说明硬件和软件的可互换性, 在上述说明中已经按照功能一般性地描述了 各示例的组成及步骤。 这些功能究竟以硬件还是软件方式来执行, 取决于技术 方案的特定应用和设计约束条件。 专业技术人员可以对每个特定的应用来使用 不同方法来实现所描述的功能, 但是这种实现不应认为超出本发明的范围。  [0031] A person skilled in the art will further appreciate that the elements and algorithm steps of the various examples described in connection with the embodiments disclosed herein can be implemented in electronic hardware, computer software, or a combination of both, in order to clearly illustrate the hardware. Interchangeability with software, the components and steps of the examples have been generally described in terms of function in the above description. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods for implementing the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present invention.
[0032] 以上对本发明所提供的一种私钥生成存储及使用的方案进行了详细介绍。 以上 实施例的说明只是用于帮助理解本发明的方法及其核心思想。 应当指出, 对于 本技术领域的普通技术人员来说, 在不脱离本发明原理的前提下, 还可以对本 发明进行若干改进和修饰, 这些改进和修饰也落入本发明权利要求的保护范围 内。  [0032] The above describes a scheme for generating and storing a private key provided by the present invention. The above description of the embodiments is merely for assisting in understanding the method of the present invention and its core idea. It should be noted that those skilled in the art can make various modifications and changes to the present invention without departing from the spirit and scope of the invention.

Claims

权利要求书 Claim
私钥生成存储及使用的方案, 其特征在于, 私钥存储在加密芯片中, 可在芯片内生成, 也可以外部导入, 但芯片内的私钥无法导出到芯片 外, 要用私钥进行签名或解密的内容可以传入加密芯片, 并可以将签 名结果和解密内容发送到加密芯片外面。 The private key generates a storage and usage scheme, wherein the private key is stored in the encryption chip, can be generated in the chip, or can be externally imported, but the private key in the chip cannot be exported to the chip, and the private key is used for signature. Or the decrypted content can be transmitted to the encryption chip, and the signature result and the decrypted content can be sent outside the encryption chip.
根据权利要求 1所述的私钥生成存储及使用的方案, 其特征在于, 随 机生成一定的达到安全长度的助记词, 并可以人为修改, 增加随机性The scheme for generating and storing a private key according to claim 1, wherein a certain mnemonic that reaches a safe length is randomly generated, and can be artificially modified to increase randomness.
, 可使用 Base58格式记录, 加上个人自定义助记词, 并使用一定数量 次数的哈希计算或其他算法, 把结果作为私钥, 存入加密芯片, 加密 芯片可以内置在手机内, 也可以是手机 SIM卡芯片内, 或带无线通讯 功能的 SIM卡加密芯片, 助记词要保存在安全的地方, 以便芯片遗失 后, 可以用助记词重新生成私钥。 , can be recorded in Base58 format, plus personal custom mnemonics, and use a certain number of hash calculations or other algorithms, the result is stored as a private key in the encryption chip, the encryption chip can be built into the mobile phone, or It is a SIM card chip in the mobile phone, or a SIM card encryption chip with wireless communication function. The mnemonic should be kept in a safe place, so that after the chip is lost, the mnemonic can be used to regenerate the private key.
根据权利要求 1所述的私钥生成存储及使用的方案, 其特征在于, 保 存私钥的设备及其中的加密芯片可完全脱离互联网通讯, 将需要签名 或解密的内容生成二维码等图像形式, 通过扫描或拍照将信息传输, 并通过处理后传入加密芯片处理, 私钥签名或解密后的结果可以生成 二维码, 通过扫描的方式传输出去, 若私钥解密的是该私钥对应公钥 加密的其他私钥, 则可以将该其他私钥存入本加密芯片。 The scheme for storing and using a private key according to claim 1, wherein the device for storing the private key and the encryption chip therein can completely separate from the Internet communication, and generate an image form such as a two-dimensional code for the content that needs to be signed or decrypted. The information is transmitted by scanning or photographing, and processed by the incoming encryption chip, and the result of the private key signature or decryption can generate a two-dimensional code, which is transmitted by scanning, and if the private key is decrypted, the private key is decrypted. The other private key of the public key encryption can be stored in the encryption chip.
根据权利要求 1所述的私钥生成存储及使用的方案, 其特征在于, 加 密芯片内随机生成私钥, 该私钥不可导出, 用其对应的公钥将其他私 钥进行加密, 可将加密私钥后的结果输出, 可生成二维码, 可通过拍 照或打印等保存, 保存在安全的地方, 恢复其他私钥吋, 可将加密结 果输入加密芯片, 用原来芯片中对应的私钥解密, 解密出的私钥写入 加密芯片中。 The private key generation storage and usage scheme according to claim 1, wherein a private key is randomly generated in the encryption chip, the private key is not exportable, and the other private key is encrypted by using the corresponding public key, and the encryption may be performed. The result output after the private key can generate a two-dimensional code, which can be saved by taking photos or printing, stored in a safe place, and restored with other private keys. The encryption result can be input into the encryption chip and decrypted with the corresponding private key in the original chip. The decrypted private key is written into the encryption chip.
根据权利要求 1所述的私钥生成存储及使用的方案, 其特征在于, 加 密芯片中可以存储多组私钥及公钥地址。 The private key generation storage and usage scheme according to claim 1, wherein a plurality of sets of private keys and public key addresses are stored in the encryption chip.
根据权利要求 1所述的私钥生成存储及使用的方案, 其特征在于, 可 需要加密芯片卡 Pin码授权, 当然 App可以有相应免密设置, 并且可以 设定大小额, 当大额交易才需要输入 Pin码。 The scheme for generating and storing a private key according to claim 1, wherein the encryption of the chip code of the chip card may be required, and of course, the App may have a corresponding secret-free setting, and Set the size, you need to enter the Pin code for large transactions.
根据权利要求 1所述的私钥生成存储及使用的方案, 其特征在于, 当 P in码连续输错超过一定次数, 加密芯片卡会被锁定, 相关实名认证或 授权后才能解锁。 The private key generation storage and usage scheme according to claim 1, wherein when the P in code is continuously input incorrectly for more than a certain number of times, the encrypted chip card is locked, and the real name authentication or authorization can be unlocked.
根据权利要求 1所述的私钥生成存储及使用的方案, 其特征在于, 加 密芯片输入 PIN码前必须在连续通电后一定吋间后才可输入, 并且输 入 PIN码的吋间间隔有规定, 有这样的规定可以增加允许 PIN码输错 的次数但也没有降低安全性。 The scheme for storing and using the private key generation according to claim 1, wherein the encryption chip must be input after a continuous power-on after the PIN code is input, and the interval between the input PIN codes is specified. There are such regulations that increase the number of times a PIN code is allowed to be mistyped without reducing security.
根据权利要求 1所述的私钥生成存储及使用的方案, 其特征在于, 加 密芯片的输出可以通过短信或蓝牙等无线方式发送出去, 或发送到其 他设备, 如手机或显示界面上, 査看签名或解密的原始数据是否被非 法替代, 再发送出去。 The scheme for generating and storing a private key according to claim 1, wherein the output of the encryption chip can be sent by wireless means such as short message or Bluetooth, or sent to other devices, such as a mobile phone or a display interface, to view Whether the original data signed or decrypted is illegally replaced and sent out.
PCT/CN2017/094918 2017-07-28 2017-07-28 Scheme for generating, storing and using private key WO2019019153A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/094918 WO2019019153A1 (en) 2017-07-28 2017-07-28 Scheme for generating, storing and using private key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/094918 WO2019019153A1 (en) 2017-07-28 2017-07-28 Scheme for generating, storing and using private key

Publications (1)

Publication Number Publication Date
WO2019019153A1 true WO2019019153A1 (en) 2019-01-31

Family

ID=65040973

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/094918 WO2019019153A1 (en) 2017-07-28 2017-07-28 Scheme for generating, storing and using private key

Country Status (1)

Country Link
WO (1) WO2019019153A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488685A (en) * 2020-12-23 2021-03-12 杨宁波 User private key protection method for block chain
CN112651053A (en) * 2020-12-30 2021-04-13 飞天诚信科技股份有限公司 Secret operation-free method and device for block chain terminal equipment
CN113010908A (en) * 2019-12-20 2021-06-22 北京紫光青藤微系统有限公司 Safe storage method suitable for high-capacity SIM card
CN113726766A (en) * 2021-08-27 2021-11-30 成都卫士通信息产业股份有限公司 Offline identity authentication method, system and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340285A (en) * 2007-07-05 2009-01-07 杭州中正生物认证技术有限公司 Method and system for identity authentication by finger print USBkey
CN101436280A (en) * 2008-12-15 2009-05-20 北京华大智宝电子系统有限公司 Method and system for implementing electronic payment of mobile terminal
CN102186169A (en) * 2010-04-30 2011-09-14 北京华大智宝电子系统有限公司 Identity authentication method, device and system
CN104376465A (en) * 2014-11-19 2015-02-25 中城智慧科技有限公司 Safe mobile payment method
CN107453862A (en) * 2017-05-15 2017-12-08 杭州复杂美科技有限公司 Private key generation storage and the scheme used

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340285A (en) * 2007-07-05 2009-01-07 杭州中正生物认证技术有限公司 Method and system for identity authentication by finger print USBkey
CN101436280A (en) * 2008-12-15 2009-05-20 北京华大智宝电子系统有限公司 Method and system for implementing electronic payment of mobile terminal
CN102186169A (en) * 2010-04-30 2011-09-14 北京华大智宝电子系统有限公司 Identity authentication method, device and system
CN104376465A (en) * 2014-11-19 2015-02-25 中城智慧科技有限公司 Safe mobile payment method
CN107453862A (en) * 2017-05-15 2017-12-08 杭州复杂美科技有限公司 Private key generation storage and the scheme used

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113010908A (en) * 2019-12-20 2021-06-22 北京紫光青藤微系统有限公司 Safe storage method suitable for high-capacity SIM card
CN113010908B (en) * 2019-12-20 2023-11-14 紫光同芯微电子有限公司 Safe storage method suitable for large-capacity SIM card
CN112488685A (en) * 2020-12-23 2021-03-12 杨宁波 User private key protection method for block chain
CN112488685B (en) * 2020-12-23 2023-12-12 杨宁波 User private key protection method for blockchain
CN112651053A (en) * 2020-12-30 2021-04-13 飞天诚信科技股份有限公司 Secret operation-free method and device for block chain terminal equipment
CN113726766A (en) * 2021-08-27 2021-11-30 成都卫士通信息产业股份有限公司 Offline identity authentication method, system and medium

Similar Documents

Publication Publication Date Title
CN107453862B (en) Scheme for generating, storing and using private key
US11856104B2 (en) Methods for secure credential provisioning
CN111756533B (en) System, method and storage medium for secure password generation
JP4562464B2 (en) Information processing device
WO2017164159A1 (en) 1:n biometric authentication, encryption, signature system
US20130159699A1 (en) Password Recovery Service
DK2481230T3 (en) A method for authentication, method of payment authorization, and similar electronic devices
CN105900375A (en) Efficient methods for protecting identity in authenticated transmissions
JP6927981B2 (en) Methods, systems, and devices that use forward secure cryptography for passcode verification.
CN107918731A (en) Method and apparatus for controlling the authority to access to open interface
WO2020013928A1 (en) Public-private key pair account login and key manager
WO2019019153A1 (en) Scheme for generating, storing and using private key
JP2006107406A (en) Biometric authentication device and terminal
WO2021190197A1 (en) Method and apparatus for authenticating biometric payment device, computer device and storage medium
CN107124277A (en) A kind of hard copy control system based on national commercial cipher algorithm
TW201223225A (en) Method for personal identity authentication utilizing a personal cryptographic device
JP7250960B2 (en) User authentication and signature device using user biometrics, and method thereof
CN110968878B (en) Information transmission method, system, electronic equipment and readable medium
JP5380368B2 (en) IC chip issuing system, IC chip issuing method, and IC chip issuing program
JP2002312725A (en) Method and system for updating ic card
CN110138547A (en) Based on unsymmetrical key pond to and sequence number quantum communications service station cryptographic key negotiation method and system
EP4231583A1 (en) Methods and arrangements for establishing digital identity
WO2015110037A1 (en) Dual-channel identity authentication method and system
JP2017195469A (en) Proxy authentication system using IC card
JP2017208725A (en) System and method for authenticating ic card

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17919167

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08-05-2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17919167

Country of ref document: EP

Kind code of ref document: A1