Skip to main content

UKey hardware wallet private key security and transaction interaction mechanism description

U
Written by UKey Wallet

The core security strategy of UKey hardware wallet is to physically isolate the private key from the networking environment (thermal environment) through the Secure Element.

1. Transaction interaction process

Signature request initiation When a user initiates an on-chain transaction through a software client (such as a mobile app or browser plug-in), the client will construct transaction data including the number of tokens, payment address, contract information, etc., and send a signature request to the connected UKey hardware device.

Data parsing and display The hardware device receives and parses the binary raw messages from the software side.

Offline security signature: After the user confirms the transaction through physical buttons or touch on the hardware device, the built-in security chip calls the private key (generated based on the mnemonic phrase) stored in the quarantine area to perform a digital signature.

Signature result transmission back After the signature is completed, the hardware device only transmits the signed encrypted transaction information back to the software client.

Transaction broadcasting onto the chain: After the software client receives the signed transaction data, it broadcasts it to the blockchain network and is packaged and uploaded to the chain by the node miners.

2. Core security features

Zero leakage of private keys: The architectural design of UKey hardware wallet ensures that the private key does not leave the security chip at any stage.

Function-restricted design: The device firmware does not have a command interface to export the private key, which eliminates the possibility of the private key being extracted from the underlying logic.

One-way security isolation: Any third-party software connected to it can only interact with data and cannot access or penetrate the encrypted core area of ​​the hardware device, thus ensuring the absolute offline security of assets.

Did this answer your question?