Asset transfer method and device

A transfer method and asset technology, applied in the computer field, can solve problems such as hacker attacks, wallet key leakage and destruction on the host device, and achieve the effect of ensuring security

Inactive Publication Date: 2019-07-12
上海恺英网络科技有限公司
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Since the host device where the online wallet software is located maintains a network connection, there is a risk of being attacked and remotely controlled by hackers through the network, causing the wallet key on the host device to be leaked and destroyed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asset transfer method and device
  • Asset transfer method and device
  • Asset transfer method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0043] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0044] Memory may include non-permanent storage in computer-readable media, in the form of random access memory (RAM) and / or nonvolatile memory, such as read-only memory (ROM) or flash memory (flashRAM). Memory is an example of computer readable media.

[0045] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims to provide an asset transfer method and device. According to traditional online wallet software, a device storing a wallet key needs to be connected with an external device througha network or a USB to transmit a transaction signature. The method has risk that the wallet key is stolen or lost due to the fact that the device storing the wallet key is remotely controlled by a hacker and attacks is caused, and asset loss is caused. According to the scheme, network connection and connection of other physical devices are isolated through the offline wallet client, an account transfer signature identification code is generated offline, and the online wallet client scans the transfer signature identification code, correspondingly generates an asset transfer request and submitsthe asset transfer request to the blockchain system, thereby ensuring the physical isolation of the wallet secret key stored in the offline wallet client, ensuring the security of the digital wallet.The method and the device are applicable to a wide application scene of digital asset transactions.

Description

technical field [0001] The invention relates to the field of computers, in particular to an asset transfer method and equipment. Background technique [0002] Such as figure 1 As shown, in the existing scheme, based on the device with network connection, the asset transfer transaction signature is generated on the wallet software client, and then the request is sent to the blockchain system through the network for transfer confirmation, including the following step: [0003] 1. Users operate the online PC wallet client or mobile App software through networked devices to perform asset transfer operations; [0004] 2. The online wallet software generates an asset transfer signature request, and then sends it to the blockchain system process for confirmation through the network. [0005] The above process has the following problems: [0006] Since the host device where the online wallet software is located maintains a network connection, there is a risk of being attacked an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/36G06Q20/38G06Q20/40G06Q40/04
CPCG06Q20/36G06Q20/3823G06Q20/401G06Q40/04
Inventor 沈兴山韩斌
Owner 上海恺英网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products