Nothing Special   »   [go: up one dir, main page]

CN111130762B - Key storage and electronic wallet recovery method - Google Patents

Key storage and electronic wallet recovery method Download PDF

Info

Publication number
CN111130762B
CN111130762B CN201911142603.4A CN201911142603A CN111130762B CN 111130762 B CN111130762 B CN 111130762B CN 201911142603 A CN201911142603 A CN 201911142603A CN 111130762 B CN111130762 B CN 111130762B
Authority
CN
China
Prior art keywords
electronic wallet
storage device
mnemonic
password
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911142603.4A
Other languages
Chinese (zh)
Other versions
CN111130762A (en
Inventor
梁宵
耿方
李孝猛
刘茜
黄艳丽
孟媛媛
董亮亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201911142603.4A priority Critical patent/CN111130762B/en
Publication of CN111130762A publication Critical patent/CN111130762A/en
Application granted granted Critical
Publication of CN111130762B publication Critical patent/CN111130762B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the disclosure discloses a key storage and electronic wallet recovery method. The key storage method comprises the following steps: the method comprises the steps of backing up mnemonics and signature files in an electronic wallet, wherein the signature files are files which are stored with private keys and public keys in an encryption mode in the electronic wallet, and the encryption mode is that a first password is used for encryption; importing the mnemonic and signature files into a storage device, and inputting the identification code of the storage device during importing; decrypting the signature file successfully imported into the storage device by using the first password to obtain a private key and a public key in the signature file; and storing the decrypted private key and public key into a storage device. By importing the mnemonic and the signature file into the storage device and verifying by inputting the first password and the identification code of the storage device in the importing process, the password storage safety is ensured, and the problem that potential safety hazards exist in password storage in the prior art is solved.

Description

Key storage and electronic wallet recovery method
Technical Field
The present disclosure relates to the field of cryptographic storage technology, and more particularly, to a method for key storage and electronic wallet recovery.
Background
Currently, the most widely used and successful blockchain technology is digital currency represented by bitcoin. Digital currency has been developed rapidly in recent years, and has high transaction circulation value due to the characteristics of non-falsification and frequent transaction of data due to decentralization, and relatively stable price can be maintained by developing financial derivatives with hedging property.
Digital currency (electronic) wallets are not money-holding, but rather are means for holding keys (private and public keys) that, with the keys, can have the digital currency at the corresponding address's dominance, i.e., can be used to make financial transactions such as payments, transfers, refills, etc. The security of digital money wallets is important and highly desirable because they possess the financial asset attributes of payment, transfer, purchase, recharge, etc.
However, the mnemonics used to generate the keys of digital money wallets are currently very difficult to remember, which is inconvenient for the user. And the public and private key pairs of the wallet are stored only in an encrypted text file mode, so that a plurality of potential safety hazards exist.
Disclosure of Invention
In view of the above, the embodiments of the present disclosure provide a method for storing a key and recovering an electronic wallet, which at least solves the problem of potential safety hazard in the prior art.
In a first aspect, an embodiment of the present disclosure provides a key storage method, including:
the method comprises the steps of backing up mnemonics and signature files in an electronic wallet, wherein the signature files are files which are stored with private keys and public keys in an encryption mode in the electronic wallet, and the encryption mode is that a first password is used for encryption;
importing the mnemonic and signature files into a storage device, and inputting the identification code of the storage device during importing;
decrypting the signature file successfully imported into the storage device by using the first password to obtain a private key and a public key in the signature file;
and storing the decrypted private key and public key into a storage device.
Optionally, before the step of backing up the mnemonic and the signature file in the electronic wallet, the method further includes:
and responding to the user instruction, creating the electronic wallet, and inputting the name and the payment password of the electronic wallet.
Optionally, the first password is a payment password.
Optionally, the electronic wallet is created in a first electronic device, and the storage device is plugged onto an interface of the first electronic device.
Optionally, the storage device is plugged into an audio port of the first electronic device.
In a second aspect, an embodiment of the present disclosure further provides an electronic wallet recovering method, including:
selecting an electronic wallet recovery mode, wherein the recovery mode comprises signature file recovery and mnemonic recovery;
inputting an identification code of a storage device for storing the signature file and the mnemonic, thereby obtaining the signature file or the mnemonic;
and inputting a first password on the basis of the obtained signature file or the mnemonic, and completing the recovery of the electronic wallet.
Optionally, the inputting the identification code of the storage device storing the signature file and the mnemonic, thereby obtaining the signature file or the mnemonic includes:
if a mode of recovering the signature file is selected, inputting a correct identification code of a storage device, and importing the signature file into an electronic wallet application;
if the mode of the mnemonic recovery is selected, the identification code of the correct storage device is input, and the mnemonic stored in the storage device is acquired.
Optionally, the inputting the first password based on the obtained signature file or the mnemonic word to complete the recovery of the electronic wallet includes:
if a mode of recovering the signature file is selected, a first password is input in an electronic wallet application which successfully imports the signature file, and recovery of the electronic wallet is completed;
if the mnemonic recovery mode is selected, the mnemonic and the first password are input in the electronic wallet application, and the recovery of the electronic wallet is completed.
Optionally, a display screen is arranged on the storage device, and after the identification code of the correct storage device is input, the mnemonic word is acquired through the display screen.
Optionally, before the step of selecting the electronic wallet recovering mode, the method further includes:
and responding to the request of the user, and performing the operation of recovering the electronic wallet.
According to the method and the device, the mnemonic and the signature file are imported into the storage device, and verification is carried out by inputting the first password and the identification code of the storage device in the importing process, so that the password storage safety is guaranteed, and the problem that potential safety hazards exist in password storage in the prior art is solved.
Additional features and advantages of the present disclosure will be set forth in the detailed description which follows.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following more particular descriptions of exemplary embodiments of the disclosure as illustrated in the accompanying drawings wherein like reference numbers generally represent like parts throughout exemplary embodiments of the disclosure.
FIG. 1 illustrates a flow chart of a key storage method according to one embodiment of the present disclosure;
FIG. 2 illustrates a flow diagram for creating an electronic wallet and storing wallet keys, according to one embodiment of the disclosure;
FIG. 3 illustrates a flow chart of an electronic wallet recovery method according to one embodiment of the disclosure;
fig. 4 shows a flow diagram of recovering an electronic wallet according to one embodiment of the disclosure.
Detailed Description
Preferred embodiments of the present disclosure will be described in more detail below. While the preferred embodiments of the present disclosure are described below, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein.
As shown in fig. 1, a key storage method includes:
step S101: the method comprises the steps of backing up mnemonics and signature files in an electronic wallet, wherein the signature files are files which are stored with private keys and public keys in an encryption mode in the electronic wallet, and the encryption mode is that a first password is used for encryption;
step S102: importing the mnemonic and signature files into a storage device, and inputting the identification code of the storage device during importing;
step S103: decrypting the signature file successfully imported into the storage device by using the first password to obtain a private key and a public key in the signature file;
step S104: and storing the decrypted private key and public key into a storage device.
Optionally, before the step of backing up the mnemonic and the signature file in the electronic wallet, the method further includes:
and responding to the user instruction, creating the electronic wallet, and inputting the name and the payment password of the electronic wallet.
Optionally, the first password is a payment password.
Optionally, the electronic wallet is created in a first electronic device, and the storage device is plugged onto an interface of the first electronic device. The first electronic device may be an electronic device such as a mobile phone, an electronic watch, a tablet or a computer, which may use an electronic wallet. The storage means may be a key of a conventional key storage device, and the device identification code may be a PIN of the key.
Optionally, the storage device is plugged into an audio port of the first electronic device.
In a specific application, the key is plugged into the audio port of the mobile phone, and the key stored in the key is imported into the electronic wallet application in the mobile phone through the audio port of the mobile phone.
In one specific application scenario, as shown in figure 2,
(1) The user clicks the imtoken electronic wallet app to create the electronic wallet. In the creation process, the name of the wallet and the payment password of the wallet are required to be input, and the password is used for encrypting the file by the key pair;
(2) After the wallet is successfully created, the mnemonic and the key are required to be backed up (in the wallet, the private key and the public key are stored as a file called the key in an encrypted manner so as to prevent the wallet from being restored under the conditions of mobile phone loss, APP reloading, careless deletion of the wallet and the like);
(3) The user connects the electronic wallet key storage device to the mobile phone (adopting an audio port insertion mode);
(4) The user selects to import the key store with the signature file, and the PIN code of the key store is needed to be input in the importing process;
(5) After the successful introduction, the payment password in step 1) needs to be input, and the password is used for encrypting the key file;
(6) If the payment password is correct, the key ciphertext can be successfully decrypted, a public and private key pair of the electronic wallet is obtained and stored in the device.
As shown in fig. 3, this embodiment further discloses an electronic wallet recovering method, including:
step S301: selecting an electronic wallet recovery mode, wherein the recovery mode comprises signature file recovery and mnemonic recovery;
step S302: inputting an identification code of a storage device for storing the signature file and the mnemonic, thereby obtaining the signature file or the mnemonic;
step S303: and inputting a first password on the basis of the obtained signature file or the mnemonic, and completing the recovery of the electronic wallet.
Optionally, the inputting the identification code of the storage device storing the signature file and the mnemonic, thereby obtaining the signature file or the mnemonic includes:
if a mode of recovering the signature file is selected, inputting a correct identification code of a storage device, and importing the signature file into an electronic wallet application;
if the mode of the mnemonic recovery is selected, the identification code of the correct storage device is input, and the mnemonic stored in the storage device is acquired.
Optionally, the inputting the first password based on the obtained signature file or the mnemonic word to complete the recovery of the electronic wallet includes:
if a mode of recovering the signature file is selected, a first password is input in an electronic wallet application which successfully imports the signature file, and recovery of the electronic wallet is completed;
if the mnemonic recovery mode is selected, the mnemonic and the first password are input in the electronic wallet application, and the recovery of the electronic wallet is completed.
Optionally, a display screen is arranged on the storage device, and after the identification code of the correct storage device is input, the mnemonic word is acquired through the display screen.
Optionally, before the step of selecting the electronic wallet recovering mode, the method further includes:
and responding to the request of the user, and performing the operation of recovering the electronic wallet.
In one specific application scenario, as shown in figure 4,
(1) The user connects the key storage device to the mobile phone (adopting an audio port insertion mode);
(2) The user clicks the imtoken electronic wallet app to perform the operation of key recovery, the key recovery can be performed by means of importing a key file or inputting a mnemonic, if the key file is selected to be imported, the step is skipped to step 3), and if the mnemonic is selected to be input, the step is skipped to step 7).
(3) Selecting an imported key file to restore the electronic wallet;
(4) The user inputs a PIN code of the key storage device, if the password is correct, the key file can be exported to an imtoken wallet app;
(5) The user enters a payment password (set by the user when creating the electronic wallet);
(6) The password is correctly input, and the electronic wallet is successfully restored;
(7) Selecting and inputting a mnemonic word, and recovering the electronic wallet;
(8) A user inputs a PIN code and logs in a key storage device;
(9) If the login is successful, the screen displays the mnemonic;
(10) The user inputs a mnemonic word and a payment password in the imtoken wallet app;
(11) The password is correctly input, and the electronic wallet is restored.
The password storage method provided by the embodiment is used for generating the mnemonic word of the secret key of the electronic wallet, so that the mnemonic word is difficult to remember, and the technical problem of inconvenience is brought to a user. Meanwhile, the key storage mode is improved, and the safety coefficient is greatly improved.
The technical key points of the embodiment are as follows:
1. the public key and the private key of the electronic wallet are stored in a hardware key (storage device);
2. the key storage device adopts an audio port;
3. the key storage device is provided with a screen display, and can directly display the mnemonic.
1) The storage device is connected with the mobile phone or the pc by adopting an audio port, so that the use is convenient;
2) The storage device has a screen display function, and can directly display the mnemonic words when a user successfully logs in, so that the operation is convenient;
3) The public key and the private key of the electronic wallet are stored in the storage device, the private key cannot be independently derived, and the security of the key is ensured. Compared with the mode of storing the encrypted text file, the safety coefficient stored in the storage device is greatly improved.
The foregoing description of the embodiments of the present disclosure has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the various embodiments described.

Claims (8)

1. A key storage method, comprising:
the method comprises the steps of backing up mnemonics and signature files in an electronic wallet, wherein the signature files are files which are stored with private keys and public keys in an encryption mode in the electronic wallet, and the encryption mode is that a first password is used for encryption;
importing the mnemonic and signature files into a storage device, and inputting the identification code of the storage device during importing;
decrypting the signature file successfully imported into the storage device by using the first password to obtain a private key and a public key in the signature file;
and storing the decrypted private key and public key into a storage device.
2. The key storage method of claim 1, wherein before the step of backing up the mnemonic and signature files in the electronic wallet, further comprising:
and responding to the user instruction, creating the electronic wallet, and inputting the name and the payment password of the electronic wallet.
3. The key storage method of claim 2, wherein,
the first password is a payment password.
4. The key storage method of claim 2, wherein,
the electronic wallet is created in a first electronic device, and the storage device is plugged onto an interface of the first electronic device.
5. The key storage method of claim 4, wherein the storage device is plugged into an audio port of the first electronic device.
6. An electronic wallet recovery method, comprising:
selecting an electronic wallet recovery mode, wherein the recovery mode comprises signature file recovery and mnemonic recovery;
inputting an identification code of a storage device for storing the signature file and the mnemonic, thereby obtaining the signature file or the mnemonic;
inputting a first password on the basis of the obtained signature file or the mnemonic, and completing recovery of the electronic wallet;
wherein the inputting the identification code of the storage device storing the signature file and the mnemonic, thereby obtaining the signature file or the mnemonic comprises:
if a mode of recovering the signature file is selected, inputting a correct identification code of a storage device, and importing the signature file into an electronic wallet application;
if a mnemonic recovery mode is selected, inputting an identification code of a correct storage device, and acquiring the mnemonic stored in the storage device;
the method for recovering the electronic wallet comprises the steps of inputting a first password on the basis of the obtained signature file or the mnemonic word, and completing recovery of the electronic wallet, and comprises the following steps:
if a mode of recovering the signature file is selected, a first password is input in an electronic wallet application which successfully imports the signature file, and recovery of the electronic wallet is completed;
if the mnemonic recovery mode is selected, the mnemonic and the first password are input in the electronic wallet application, and the recovery of the electronic wallet is completed.
7. The method for recovering electronic wallet according to claim 6, wherein a display screen is provided on said storage device, and after inputting the correct identification code of the storage device, the mnemonic is obtained through said display screen.
8. The method for recovering electronic wallet of claim 6, wherein before said step of selecting the electronic wallet recovering mode, further comprising:
and responding to the request of the user, and performing the operation of recovering the electronic wallet.
CN201911142603.4A 2019-11-20 2019-11-20 Key storage and electronic wallet recovery method Active CN111130762B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911142603.4A CN111130762B (en) 2019-11-20 2019-11-20 Key storage and electronic wallet recovery method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911142603.4A CN111130762B (en) 2019-11-20 2019-11-20 Key storage and electronic wallet recovery method

Publications (2)

Publication Number Publication Date
CN111130762A CN111130762A (en) 2020-05-08
CN111130762B true CN111130762B (en) 2023-08-22

Family

ID=70495905

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911142603.4A Active CN111130762B (en) 2019-11-20 2019-11-20 Key storage and electronic wallet recovery method

Country Status (1)

Country Link
CN (1) CN111130762B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012171435A1 (en) * 2011-06-17 2012-12-20 飞天诚信科技股份有限公司 Electronic signature system and method based on audio communication
CN109474424A (en) * 2018-12-17 2019-03-15 江苏恒宝智能系统技术有限公司 Block chain account cipher key backup and method, the system of recovery

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012171435A1 (en) * 2011-06-17 2012-12-20 飞天诚信科技股份有限公司 Electronic signature system and method based on audio communication
CN109474424A (en) * 2018-12-17 2019-03-15 江苏恒宝智能系统技术有限公司 Block chain account cipher key backup and method, the system of recovery

Also Published As

Publication number Publication date
CN111130762A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
CN107077670B (en) Method and apparatus for transmitting and processing transaction message, computer readable storage medium
US20190220858A1 (en) Multi-approval system using m of n keys to perform an action at a customer device
TWI246289B (en) Method, apparatus, and recording medium for providing a user device with a set of access codes
JP2018522353A (en) Authentication system and method for server-based payment
US20100205448A1 (en) Devices, systems and methods for secure verification of user identity
CN109474420A (en) A kind of private key backup method and relevant device
US20140359730A1 (en) Input validation, user and data authentication on potentially compromised mobile devices
CN111242611B (en) Method and system for recovering digital wallet key
US20110055586A1 (en) Secure PIN Character Retrieval and Setting Using PIN Offset Masking
JP2013527514A (en) POS equipment, POS equipment card payment system and card payment transaction method
CN104200363A (en) Fingerprint-encryption-based electronic purse system payment method
EP2120175A2 (en) Identity verification
US20120296830A1 (en) Method and mobile terminal for realizing network payment
CN110544090A (en) Digital currency hard wallet application implementation method, SIM card and system
US20170076285A1 (en) Payment Method and Apparatus and Payment Factor Processing Method and Apparatus
CN104134141B (en) E-wallet system payment method based on time synchronization
US12041179B2 (en) Digital signature terminal and secure communication method
US11604870B2 (en) Systems and methods for authentication code entry using mobile electronic devices
CN102176227B (en) Signing testifying method and auxiliary signing testifying system
US7545930B1 (en) Portable terminal
KR101783281B1 (en) Electronic terminal device for safe storage of identification data and operating method thereof
KR101156102B1 (en) Memory card reader apparatus having security features and the method thereof
CN111130762B (en) Key storage and electronic wallet recovery method
EP3136329A1 (en) Securing mo/to processing
TWI792966B (en) Traction confirming system for non-fungible token

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant