+

Rezaeighaleh, 2020 - Google Patents

Improving security of crypto wallets in Blockchain technologies

Rezaeighaleh, 2020

View PDF
Document ID
17650376474041433316
Author
Rezaeighaleh H
Publication year

External Links

Snippet

A big challenge in blockchain and cryptocurrency is securing the private key from potential hackers. Nobody can rollback a transaction made with a stolen key once the network confirms it. The technical solution to protect private keys is the cryptocurrency wallet …
Continue reading at stars.library.ucf.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Similar Documents

Publication Publication Date Title
Bhutta et al. A survey on blockchain technology: Evolution, architecture and security
Ahmed et al. Security in next generation mobile payment systems: A comprehensive survey
US20220277307A1 (en) Systems and methods for personal identification and verification
Boireau Securing the blockchain against hackers
US20230412358A1 (en) Blockchain-implemented security systems and methods for blinded outcome selection
Yang Security Enhanced EMV‐Based Mobile Payment Protocol
KR20210040078A (en) Systems and methods for safe storage services
Saranya et al. Efficient mobile security for E health care application in cloud for secure payment using key distribution
Rezaeighaleh et al. Deterministic sub-wallet for cryptocurrencies
CN110417557B (en) Intelligent terminal peripheral data security control method and device
Ahmed et al. A self-sovereign identity architecture based on blockchain and the utilization of customer’s banking cards: The case of bank scam calls prevention
Wazid et al. Generic quantum blockchain-envisioned security framework for iot environment: Architecture, security benefits and future research
WO2019199813A2 (en) Managed high integrity blockchain and blockchain communications that utilize containers
Rezaeighaleh et al. Multilayered defense-in-depth architecture for cryptocurrency wallet
CN113302876A (en) Offline non-interception interaction with cryptocurrency network using network-disabled devices
Yi et al. Blockchain foundations and applications
Rezaeighaleh Improving security of crypto wallets in Blockchain technologies
Noam et al. Realizing privacy aspects in blockchain networks
Park et al. OPERA: A Complete Offline and Anonymous Digital Cash Transaction System with a One-Time Readable Memory
Wilusz et al. Secure protocols for smart contract based insurance services
Yang et al. Aep-m: Practical anonymous e-payment for mobile devices using arm trustzone and divisible e-cash
Rezaeighaleh et al. Efficient off-chain transaction to avoid inaccessible coins in cryptocurrencies
Reddy et al. ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System
Khan et al. Digital Currency Issues in the Metaverse
Fritsche Recommendations for implementing a Bitcoin wallet using smart card
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载