KR20190018377A - Method and apparatus for storing mnemonic of hardware bitcoin wallet, and computer readable recording medium - Google Patents

Method and apparatus for storing mnemonic of hardware bitcoin wallet, and computer readable recording medium Download PDF

Info

Publication number
KR20190018377A
KR20190018377A KR1020170149072A KR20170149072A KR20190018377A KR 20190018377 A KR20190018377 A KR 20190018377A KR 1020170149072 A KR1020170149072 A KR 1020170149072A KR 20170149072 A KR20170149072 A KR 20170149072A KR 20190018377 A KR20190018377 A KR 20190018377A
Authority
KR
South Korea
Prior art keywords
mnemonic
bit coin
server
user terminal
certificate
Prior art date
Application number
KR1020170149072A
Other languages
Korean (ko)
Inventor
김일영
Original Assignee
김일영
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to KR20170103075 priority Critical
Priority to KR1020170103075 priority
Application filed by 김일영 filed Critical 김일영
Publication of KR20190018377A publication Critical patent/KR20190018377A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3678Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Abstract

Provided is a mnemonic system for safely storing mnemonic of a hardware bitcoin wallet. According to the present invention, the mnemonic system may comprise: a bitcoin wallet server processing authentication of an external bitcoin hardware wallet; a mnemonic connected for communication with the bitcoin wallet server and transmitting a request for generating a bitcoin encryption key upon receiving an authentication request from the bitcoin wallet server; and a sandbox module connected to the mnemonic server for communication, receiving the request for generating the bitcoin encryption key to generate and store a mnemonic required for generating the encryption key.

Description

≪ Desc / Clms Page number 1 > METHOD AND APPARATUS FOR STORING MNEMONIC OF HARDWARE BITCOIN WALLET, AND COMPUTER READABLE RECORDING MEDIUM < RTI ID = 0.0 >

The present invention relates to a method for safely storing a mnemonic, and more particularly to a mnemonic storing method for safely storing a mnemonic used as a cryptoside of a hardware bit coin purse.

Bit coin mnemonics is an electronic wallet creation and recovery method defined by BIP39, which proposes bit coin improvement. A mnemonic is a word that is easy to remember and refers to words used to create and recover a bit coin purse. A mnemonic is generated from a random number generated by a computer program. The generated mnemonic is randomly composed of at least twelve words and up to twenty-four words without association and association information between the words.

By calculating the generated mnemonic with the cryptographic computation algorithm, the encryption key of the electronic wallet can be generated. If you lose your bit coin purse, remember the mnemonic used to generate the bit coin purse's encryption key, and if you enter it in the correct order, you will recover the bit coin purse by regenerating the bit coin purse's encryption key from the server where the mnemonic is stored .

This technique is defined in the bit coin improvement proposal, that is, in the standard protocol BIP 39, and is used as a method of defining and calculating a mnemonic used in a bit coin purse used for a bit coin exchange, a bit coin purse, a bit coin exchange service, In addition, it is applied to various virtual currency based on bit coin, or to the method of creating and restoring electronic wallet using mnemonics for encrypted currency.

However, since only the method of using mnemonic is explained in BIP39, and the server configuration and storage configuration for secure management are not proposed, in order to implement a secure mnemonic server, Must be saved. However, it is not safe to configure a separate cold storage system to protect the mnemonic server from hackers. If a mnemonic server is hacked or exposed to risks such as Ransomware, the risk of hacking users' bit coin purse, bit coin exchange, bit coin exchange, etc. is increased.

Therefore, a method for safely storing the mnemonic is required.

Korean Patent Laid-Open Publication No. 10-2015-0082564

SUMMARY OF THE INVENTION The present disclosure has been made to solve the above-mentioned problems, and it is an object of the present invention to provide a method for safely storing a bit coin mnemonic.

The present disclosure is directed to providing a cold storage system and a sandbox module to provide a secure mnemonic server.

The present disclosure is to provide a separate cold storage system separate to provide a secure mnemonic server and to provide a sandbox module for storing and managing mnemonics.

According to one aspect of the present invention, there is provided a mnemonic system for safely storing a mnemonic of a hardware bit coin purse. The mnemonic system comprises a bit coin purse server configured to handle authentication of an external bit coin hardware wallet; A mnemonic server connected to be able to communicate with the bit coin purse server and configured to transmit a request for generating a bit coin cipher key upon receiving an authentication request from the bit coin purse server; And a sandbox module connected to the mnemonic server so as to communicate with the mnemonic server and receiving the bit coin cryptographic key generation request to generate and store a mnemonic required for generating the cryptographic key, and to generate and transmit the cryptographic key.

In one embodiment, the bit coin purse server may further be configured to receive an authentication request for a product from an external user terminal, transmit a certificate of the server, and receive the certificate of the external user terminal.

In one embodiment, the bit coin wallet server may be further configured to receive the certificate of the external user terminal and to send a request for verification of the certificate of the external user terminal to the mnemonic server.

In one embodiment, The mnemonic server may be further configured to generate and transmit a bit coin cryptographic key generation request for the external user terminal and to receive the bit coin cryptographic key and to transfer the bit coin cryptographic key to the bit coin purse server .

In one embodiment, the sandbox module may be further configured to receive the bit coin cryptographic key generation request to generate a mnemonic for the external user terminal, store the mnemonic in the mnemonic database, and transmit the generated mnemonic.

According to another aspect of the present invention, there is provided a mnemonic system for safely storing a mnemonic of a hardware bit coin purse. The mnemonic system is configured to handle recovery requests of an external bitcoin hardware wallet; A mnemonic server, communicatively coupled to the bit coin purse server, configured to receive a certificate confirmation request from the bit coin purse server and to send a mnemonic recovery request; And a sandbox module communicatively coupled to the mnemonic server and configured to receive the mnemonic recovery request to recover the mnemonic and to transmit a bit coin cryptographic key.

In one embodiment, the bit coin wallet server may be further configured to receive mnemonic information from an external user terminal and to transmit the mnemonic information to the mnemonic server.

In one embodiment, the bit coin wallet server may further be configured to transmit the certificate of the bit coin purse server and receive the certificate of the external user terminal.

According to another aspect of the present invention, there is provided a method for securely storing a mnemonic of a bit coin hardware wallet performed in a mnemonic system through a communication network. The method includes receiving a product authentication request from an external user terminal and a bit coin hardware wallet associated with the external user terminal, receiving a certificate of the external user terminal, and transmitting the certificate of the mnemonics system, and And generating a bit coin encryption key of the bit coin hardware wallet connected to the user terminal and transmitting the bit coin encryption key to the external user terminal in order to confirm the certificate of the external user terminal.

In one embodiment, generating the bit coin encryption key of the bit coin hardware wallet associated with the user terminal further comprises generating a mnemonic of the bit coin hardware wallet, storing the mnemonic in the mnemonic database, and transmitting the mnemonic can do.

According to another aspect of the present invention, there is provided a method for securely storing a mnemonic of a bit coin hardware wallet performed in a mnemonic system through a communication network. The method includes receiving a recovery request for a bit coin hardware wallet connected to an external user terminal from an external user terminal, receiving a certificate of the external user terminal and transmitting the certificate of the mnemonical system, Requesting and receiving a mnemonic of a bit coin hardware wallet associated with the user terminal in order to verify a certificate of an external user terminal and storing the mnemonic in the mnemonic database and storing the bit coin cryptographic key To the mobile station.

According to another aspect of the present invention there is provided a computer-readable medium having stored thereon one or more instructions that, when executed for a computer, cause the computer to perform any of the methods described above A computer-readable recording medium is provided.

This disclosure is directed to a server for securely storing a mnemonic used as a password seed when generating a bit coin wallet for a bit coin hardware wallet user, comprising a bit coin hardware wallet, a bit coin smartphone app, a bit coin purse server, A mnemonic server and a sandbox to secure a bit coin mnemonic, thereby preventing a bit coin safe transaction and hacking in the future.

Figure 1 is a schematic diagram of a system environment in which a mnemonic storage system may be implemented, in accordance with one embodiment of the present invention.
FIG. 2 is a functional block diagram schematically illustrating the functional configuration of the bit coin hardware wallet 110 of FIG. 1 according to an embodiment of the present invention.
FIG. 3 is a functional block diagram that schematically illustrates the functional configuration of the user terminal 120 of FIG. 1, in accordance with one embodiment of the present invention.
FIG. 4 is a functional block diagram schematically illustrating the functional configuration of the bit coin purse server 140 of FIG. 1 according to an embodiment of the present invention.
FIG. 5 is a functional block diagram schematically illustrating the functional configuration of the mnemonic server 150 of FIG. 1, according to an embodiment of the present invention.
FIG. 6 is a functional block diagram schematically illustrating the functional configuration of the sandbox module 160 of FIG. 1 according to an embodiment of the present invention.
Figure 7 is a flow diagram illustrating an exemplary operational flow when registering a bit coin hardware wallet performed by a mnemonic storage system, in accordance with an embodiment of the present invention.
Figure 8 is a flow diagram illustrating an exemplary operational flow when a nickbits coin hardware wallet performed by a mnemonic storage system is lost, in accordance with an embodiment of the present invention.

Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings. Hereinafter, when it is determined that there is a possibility that the gist of the present invention may be unnecessarily blurred, a detailed description of known functions and configurations will be omitted. In addition, it should be understood that the following description is only an embodiment of the present invention, and the present disclosure is not limited thereto.

The terminology used in this disclosure is used only to describe a specific embodiment and is not used to limit the invention. For example, an element expressed in singular < Desc / Clms Page number 5 > terms should be understood as including a plurality of elements unless the context clearly dictates a singular value. It is to be understood that the term "and / or" as used in this disclosure encompasses any and all possible combinations of one or more of the listed items. It should be understood that the terms " comprises " or " having ", etc. used in the present disclosure are intended to specify that there exist features, numbers, steps, operations, elements, It is not intended to exclude the presence or addition of one or more other features, numbers, steps, operations, components, parts, or combinations thereof, by use.

As used herein, the term " module " or " module " means a functional part that performs at least one function or operation, and may be implemented by hardware or software or a combination of hardware and software. Also, a plurality of "modules" or "sub-modules" may be integrated into at least one software module and implemented by at least one processor, except for "module" or "sub-module" have.

In addition, all terms used in the present disclosure, including technical or scientific terms, unless otherwise defined, have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs. It should be understood that commonly used predefined terms are to be interpreted as having a meaning consistent with the contextual meaning of the related art and are not to be interpreted excessively or extensively unless explicitly defined otherwise in this disclosure .

Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.

Figure 1 is a schematic diagram of a system environment in which a mnemonic storage system 100 may be implemented, in accordance with one embodiment of the present invention. The system environment 100 includes a bit coin hardware wallet 110, a user terminal 120, a local area network 130, a communication network 140, a bit coin purse server 150, a mnemonic server 160, A sandbox module 170, and a dedicated network 180.

According to one embodiment of the present invention, the bit coin hardware wallet 110 may be any user electronic device usable as a bit coin purse with wired or wireless communication capability. According to one embodiment of the present invention, the bit coin hardware wallet 110 may store a bit coin address, a bit coin private key, a wallet product number, and the like.

According to one embodiment of the present invention, the user terminal 120 may be any user electronic device having wired or wireless communication capabilities. Each of the user terminals 120 may be a wired or wireless communication terminal including, for example, a smart phone, a tablet PC, a music player, a smart speaker, a desktop, a laptop, a PDA, a game console, a digital TV, a set- Lt; / RTI > According to an embodiment of the present invention, each of the user terminals 120 can communicate with the bit coin purse server 150 through the communication network 140, that is, send and receive necessary information. According to an embodiment of the present invention, each of the user terminals 120 can communicate with an external service server (not shown) through the communication network 140, that is, send and receive necessary information. In accordance with one embodiment of the present invention, each of the user terminals 120 may receive user input in the form of voice and / or text, and may communicate with the bit coin purse server 150 via the communication network 140 and / (E.g., performing a specific task, etc.) corresponding to the upper user input obtained through communication with the server (and / or processing in the user terminal 120).

According to an embodiment of the present invention, the local area network 130 includes a communication network such as a wired communication such as USB, UART, serial communication or wireless, such as RFID, NFC, Bluetooth, Thereby enabling communication between the terminals 120.

According to one embodiment of the present invention, the communication network 140 may be any wired or wireless communication network, for example, a TCP / IP communication network. According to an embodiment of the present invention, the communication network 140 may include, for example, a WiFi network, a LAN network, a WAN network, and the Internet network, but the present invention is not limited thereto. In accordance with one embodiment of the present invention, the communication network 140 may be any of a variety of wired or wireless, such as Ethernet, GSM, EDGE, CDMA, TDMA, OFDM, Bluetooth, VoIP, Wi-MAX, Wibro, May be implemented using a communication protocol. For example, the communication network 140 can use TCP, UDP, and HTTP. HTTP can include XML, SOAP, RESTFUL, HTTP / TEXT, HTTP / BINARY, and HTTP includes HTTPS using certificates.

According to an embodiment of the present invention, the bit coin purse server 150 includes a server for maintaining, updating, and storing information of a bit coin hardware wallet of a plurality of users through a communication network 140 according to a predetermined purpose . According to an embodiment of the present invention, the bit coin purse server 150 includes a bit coin hardware wallet and an authentication module for processing authentication of the user terminal, a control section including an encryption module for encrypting transmission / reception information, a communication section, .

The mnemonic server 160 communicates with the bit coin purse server 150 and the sandbox module 170 via the dedicated network 180 according to a predetermined purpose and transmits the bit coin purse server 150 and receives the bit coin cryptographic key and drives the sandbox module 170.

According to one embodiment of the present invention, the sandbox module 170 is activated by a request of the mnemonic server 160 to generate a mnemonic or a bit coin purse authentication key. According to one embodiment, the sandbox module 170 may also be understood as an application of the mnemonic server 160, and the operation of the application may be understood as the operation of the mnemonic server 160. According to one embodiment of the present invention, the sandbox module 170 may include a control unit for generating a bit coin purse authentication key and performing a command, a storage unit for storing the mnemonic database, and a communication unit.

According to an embodiment of the present invention, the dedicated network 180 is a dedicated communication network to which the bit coin purse server 150, the mnemonic server 160, and the sandbox module 170 are connected and can guarantee the requested service quality (security) A virtual private network using a tunnel or the like can be constructed. At this time, the traffic between the entities is delivered through the private network 180 by configuring an overlay network including IPSec Tunnel, GRE, VxLAN Tunnel, or the like, or using MPLS or PTN technology to guarantee QoS, It is not limited to a specific network technology.

2 is a functional block diagram schematically illustrating the functional configuration of the bit coin hardware wallet of Fig. 1 according to an embodiment of the present invention.

According to the illustration, the bit coin hardware wallet 110 may include a storage unit 202 and a communication unit 204.

According to an embodiment of the present invention, the storage unit 202 may store the wallet product number, the bit coin private key, and the bit coin address information. According to one embodiment of the present invention, the storage 202 may be any storage medium that stores various programs that may be executed on the bit coin hardware wallet 110, such as various application programs and related data. According to an embodiment of the present invention, the storage unit 202 may be configured to include various types of volatile or nonvolatile memories such as DRAM, SRAM, DDR RAM, EPROM, EEPROM, ROM, magnetic disk, optical disk, .

The communication unit 204 enables the bit coin hardware wallet 110 to communicate with the user terminal 120 via the local area network 130. According to an embodiment of the present invention, the communication unit 204 may transmit information stored in the bit coin hardware wallet 110 to the user terminal 120 through the communication network 130. [ According to the embodiment of the present invention, the communication unit 204 can receive various information from the user terminal 120 and perform appropriate processing.

FIG. 3 is a functional block diagram schematically illustrating a functional configuration of the user terminal of FIG. 1 according to an embodiment of the present invention.

The user terminal 120 may include a control unit 302, a storage unit 304, and a communication unit 306. In addition,

The control unit 302 may be configured to receive the wallet product information from the bit coin hardware wallet 110 through the communication unit 306 and to register the product of the bit coin hardware wallet 110. [ According to an embodiment of the present invention, the control unit 302 can receive authentication information required for product registration from the bit coin purse server 150 through the communication unit 306 and perform authentication. For example, the control unit 302 receives and processes a certificate for secure communication with the bit coin purse server 150, which may include a personal certificate, a public certificate, and a private certificate. According to an embodiment of the present invention, the control unit 302 may communicate with each component module of the user terminal 120 and perform various operations on the user terminal 120. [ According to an embodiment of the present invention, the control unit 302 can drive and execute various application programs on the storage unit 304. [ According to an embodiment of the present invention, according to an embodiment of the present invention, the control unit 302 may perform appropriate processing on a signal received from the outside through the communication unit 306, if necessary.

According to one embodiment of the present invention, the storage 304 may be any storage medium that stores various programs that may be executed on the user terminal 120, such as various application programs and related data. According to an embodiment of the present invention, the storage unit 304 may be configured to include various types of volatile or nonvolatile memory such as a DRAM, an SRAM, a DDR RAM, an EPROM, an EEPROM, a ROM, a magnetic disk, .

The communication unit 306 may be configured such that the user terminal 120 receives various information from the bit coin hardware wallet 110 and the bit coin purse server 150 through the communication networks 130 and 140 and performs appropriate processing.

4 is a functional block diagram schematically illustrating the functional configuration of the bit coin purse server of FIG. 1 according to an embodiment of the present invention.

As shown, the bit coin purse server 150 may include a control unit 402, a storage unit 404, and a communication unit 406.

The control unit 402 processes the product authentication request. In one embodiment, the bit coin purse server 150 receives the product authentication request from the user terminal 120 via the communication unit 406, receives the certificate for product authentication, and requests the certificate verification from the mnemonic server 160 . According to an embodiment of the present invention, the controller 402 may perform various operations on the bit coin purse server 150. [ According to an embodiment of the present invention, the control unit 402 can drive and execute various application programs on the storage unit 404. According to an embodiment of the present invention, according to an embodiment of the present invention, the control unit 402 can perform appropriate processing on a signal received from the outside via the communication unit 406, if necessary.

According to an embodiment of the present invention, the storage unit 404 may be any storage medium that stores various programs that can be executed on the bit coin purse server 150, such as various application programs and related data. According to an embodiment of the present invention, the storage unit 404 may be configured to include various types of volatile or nonvolatile memory such as a DRAM, an SRAM, a DDR RAM, an EPROM, an EEPROM, a ROM, a magnetic disk, .

The communication unit 406 receives the various information from the user terminal 120, the mnemonic server 160 and the sandbox module 170 through the communication networks 140 and 180 and performs the appropriate processing on the bit coin purse server 150 Lt; / RTI >

FIG. 5 is a functional block diagram schematically showing a functional configuration of the mnemonic server of FIG. 1 according to an embodiment of the present invention.

The mnemonic server 160 may include a control unit 502, a storage unit 504, and a communication unit 506 according to the illustrated embodiments.

The control unit 502 processes the certificate confirmation request. In one embodiment, the mnemonic server 160 may process the certificate confirmation request of the user terminal 120 received from the bit coin purse server 150 and send a bit coin cryptographic key request to the sandbox module 170. In one embodiment, the mnemonic server 160 may receive a bit coin cipher key request from the bit coin purse server 150 and drive the sandbox module 170. According to an embodiment of the present invention, the control unit 502 can drive and execute various application programs on the storage unit 504. According to an embodiment of the present invention, according to an embodiment of the present invention, the control unit 502 may perform appropriate processing on a signal received from the outside through the communication unit 506, if necessary.

According to one embodiment of the present invention, the storage unit 504 may be any storage medium that stores various programs that can be executed on the mnemonic server 1650, such as various application programs and related data. According to an embodiment of the present invention, the storage unit 504 is configured to include various types of volatile or nonvolatile memory such as a DRAM, an SRAM, a DDR RAM, an EPROM, an EEPROM, a ROM, a magnetic disk, .

The communication unit 506 may be configured such that the mnemonic server 160 receives various information from the bit coin purse server 150 and the sandbox module 170 through the communication network 180 and performs appropriate processing.

FIG. 6 is a functional block diagram schematically illustrating a functional configuration of the sandbox module of FIG. 1 according to an embodiment of the present invention.

The sandbox module 170 may include a control unit 602, a storage unit 604, and a communication unit 606. [

According to one embodiment of the present invention, the sandbox module 170 may be activated upon request of the mnemonic server 160 and executed as a virtual machine. In one embodiment, the sandbox module 170 may also be understood as an application of the mnemonic server 160, and the operation of the application may be understood as the operation of the mnemonic server 160. In one embodiment, the sandbox module 170 may be executed from the request of the mnemonic server 160, but may also be executed in advance according to the management rules or the operating rules of the mnemonic server 160. In this case, the sandbox module 170 is executed by the daemon process of the operating system and does not terminate execution even after generating the bit coin cryptographic key. The sandbox module 170 includes both application-like operations and daemon process operations.

In one embodiment, the control unit 602 of the sandbox module 170 is executed in the form of a virtual machine to generate a mnemonic from the mnemonic database required for requesting a bit coin cipher key from the mnemonic server 160, And generate a bit coin purse authentication key. In one embodiment, the controller 602 may generate a bit coin purse authentication key and perform a cryptographic key request. In one embodiment, the control unit 602 may terminate the necessary execution after generating the bit coin cryptographic key. For example, the generated encryption key may be stored in the bit coin hardware wallet 110 through the mnemonic server 160, the bit coin purse server 150, and the user terminal 120.

According to an embodiment of the present invention, the storage unit 604 may include a mnemonic database. A mnemonic database can store mnemonic information.

The communication unit 606 can be configured to allow the sandbox module 170 to receive various information from the bit coin purse server 150 and the mnemonic server 160 through the communication network 180 and to perform appropriate processing.

7 is a flow diagram illustrating an exemplary operational flow when registering a bit coin hardware wallet performed by a mnemonic system, in accordance with an embodiment of the present invention.

The mnemonic system refers to a system in which the bit coin purse server 150, the mnemonic server 160 and the sandbox module 170 are communicably connected to the private network 180.

In step 702, the mnemonic system may receive a product authentication request from a bit coin hardware wallet associated with an external user terminal from an external user terminal. According to an embodiment of the present invention, the product authentication request may include at least one of a private key of the bit coin purse, a product number of the bit coin purse, and address information of the bit coin purse. According to one embodiment of the present invention, the communication at the time of requesting the product authentication can be encrypted and communicated. According to one embodiment of the present invention, the mnemonic system may be configured to handle security errors. Techniques related to encrypted communication and security error handling and the like are obvious to those skilled in the art and can be modified in various ways, so a detailed description thereof will be omitted here.

At step 704, the mnemonic system may trigger the authentication request received at step 702 to receive the certificate of the external user terminal and send the certificate of the mnemonic system to the external user terminal.

In step 706, the mnemonic system generates and stores the mnemonics of the bit coin hardware wallet in the mnemonic database to verify the certificate of the external user terminal, and in step 708, You can generate a cryptographic key for your coin hardware wallet.

In step 710, the mnemonic system may complete the product authentication of the bit coin hardware wallet by transmitting a bit coin encryption key for the bit coin hardware wallet associated with the user terminal to the external user terminal.

According to an embodiment of the present invention, the communication when each step is performed can be encrypted and communicated, and a security error can be handled when a security error occurs. Techniques related to encrypted communication and security error handling and the like are obvious to those skilled in the art and can be modified in various ways, so a detailed description thereof will be omitted here.

8 is a flow diagram illustrating an exemplary operational flow when recovering information regarding a bit coin hardware wallet performed by a mnemonic system, in accordance with an embodiment of the present invention.

In step 802, the mnemonic system may receive a recovery request for a bit coin hardware wallet associated with an external user terminal from an external user terminal. According to an embodiment of the present invention, the restoration request may include at least one of a private key of the bit coin purse, a product number of the bit coin purse, and address information of the bit coin purse. According to one embodiment of the present invention, the communication at the time of requesting the product authentication can be encrypted and communicated. According to one embodiment of the present invention, the mnemonic system may be configured to handle security errors.

In step 804, the mnemonic system may trigger the recovery request received in step 802 to send the certificate of the mnemonic system to the corresponding external user terminal, and receive the certificate of the user terminal.

In step 806, the mnemonic system may request and receive a mnemonic of the bit coin hardware wallet associated with the user terminal to verify the certificate of the external user terminal.

In step 808, the mnemonic system may recover the received mnemonics, store them in a mnemonic database, and operate the recovered mnemonics to generate a bit coin cryptographic key of the bit coin hardware wallet.

Then, in step 810, the mnemonic system may complete the recovery procedure by sending a bit coin cryptographic key to an external user terminal.

According to an embodiment of the present invention, the communication when each step is performed can be encrypted and communicated, and a security error can be handled when a security error occurs. Techniques related to encrypted communication and security error handling and the like are obvious to those skilled in the art and can be modified in various ways, so a detailed description thereof will be omitted here.

As will be appreciated by those skilled in the art, the present invention is not limited to the examples described herein, but can be variously modified, rearranged, and replaced without departing from the scope of the present invention. It should be understood that the various techniques described herein may be implemented in hardware or software, or a combination of hardware and software.

A computer program according to an embodiment of the present invention may be stored in a storage medium readable by a computer processor or the like such as a nonvolatile memory such as EPROM, EEPROM, flash memory device, a magnetic disk such as an internal hard disk and a removable disk, CDROM disks, and the like. Also, the program code (s) may be implemented in assembly language or machine language. And all changes and modifications that fall within the true spirit and scope of the present invention are intended to be embraced by the following claims.

Claims (12)

  1. A mnemonic system for safely storing a mnemonic of a hardware bit coin purse,
    A bit coin purse server configured to process authentication of an external bit coin hardware wallet;
    A mnemonic server connected to be able to communicate with the bit coin purse server and configured to transmit a request for generating a bit coin cipher key upon receiving an authentication request from the bit coin purse server; And
    And a sandbox module connected to the mnemonic server in a communicable manner and configured to receive the bit coin cryptographic key generation request to generate and store a mnemonic required for generating the cryptographic key and to generate and transmit the cryptographic key, Of the mnemonic system.
  2. The method according to claim 1,
    Wherein the bit coin purse server is further configured to receive an authentication request of a product from an external user terminal, transmit a certificate of the server, and receive the certificate of the external user terminal.
  3. The method according to claim 1,
    Wherein the bit coin wallet server is further configured to receive the certificate of the external user terminal and to transmit a request for verification of the certificate of the external user terminal to the mnemonic server.
  4. 3. The method of claim 2,
    The mnemonic server
    A hardware bit coin purse mnemonic configured to generate and transmit a bit coin cryptographic key generation request for the external user terminal and to receive the bit coin cryptographic key and deliver the bit coin cryptographic key to the bit coin purse server, system.
  5. 5. The method of claim 4,
    The sandbox module
    Wherein the mnemonic system is further configured to receive the bit coin cryptographic key generation request to generate a mnemonic for the external user terminal, store the mnemonic in the mnemonic database, and transmit the generated mnemonic.
  6. A mnemonic system for safely storing a mnemonic of a hardware bit coin purse,
    A bit coin purse server configured to process a recovery request of an external bit coin hardware wallet;
    A mnemonic server, communicatively coupled to the bit coin purse server, configured to receive a certificate confirmation request from the bit coin purse server and to send a mnemonic recovery request; And
    And a sandbox module coupled to communicate with the mnemonic server and configured to receive the mnemonic recovery request to recover the mnemonic and to transmit a bit coin cryptographic key.
  7. The method according to claim 6,
    Wherein the bit coin wallet server is further configured to receive mnemonic information from an external user terminal and to transfer the mnemonic information to the mnemonic server.
  8. The method according to claim 6,
    Wherein the bit coin purse server is further configured to transmit a certificate of the bit coin purse server and receive a certificate of the external user terminal.
  9. A method for securely storing a mnemonic of a bit coin hardware wallet performed in a mnemonic system via a communication network,
    Receiving a product authentication request of a bit coin hardware wallet connected to an external user terminal from an external user terminal,
    Receiving a certificate of the external user terminal and transmitting the certificate of the mnemonic system, and
    Generating a bit coin encryption key of the bit coin hardware wallet connected to the user terminal and transmitting the bit coin encryption key to the external user terminal in order to check the certificate of the external user terminal
    A method of safely storing a mnemonic of a bit coin hardware wallet comprising:
  10. 10. The method of claim 9,
    Generating a bit coin encryption key of a bit coin hardware wallet associated with the user terminal,
    Further comprising: generating a mnemonic of the bit coin hardware wallet, storing the mnemonic in the mnemonic database, and transmitting the mnemonic; and safely storing the mnemonic of the bit coin hardware wallet.
  11. A method for securely storing a mnemonic of a bit coin hardware wallet performed in a mnemonic system via a communication network,
    Receiving a recovery request of a bit coin hardware wallet connected to an external user terminal from an external user terminal,
    Receiving a certificate of the external user terminal and transmitting the certificate of the mnemonic system, and
    Requesting and receiving a mnemonic of a bit coin hardware wallet associated with the user terminal to verify the certificate of the external user terminal;
    Recovering the mnemonics and storing them in a mnemonic database and transmitting a bit coin cryptographic key of the bit coin hardware wallet
    A method of safely storing a mnemonic of a bit coin hardware wallet comprising:
  12. A computer-readable medium having stored thereon one or more instructions,
    Wherein the one or more instructions cause the computer to perform the method of any one of claims 9 to 11 when executed on a computer.
KR1020170149072A 2017-08-14 2017-11-10 Method and apparatus for storing mnemonic of hardware bitcoin wallet, and computer readable recording medium KR20190018377A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
KR20170103075 2017-08-14
KR1020170103075 2017-08-14

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/KR2018/013602 WO2019093808A1 (en) 2017-08-14 2018-11-09 Method, apparatus, and computer-readable recording medium for safe storage of mnemonic of hardware bitcoin wallet

Publications (1)

Publication Number Publication Date
KR20190018377A true KR20190018377A (en) 2019-02-22

Family

ID=65584868

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020170149072A KR20190018377A (en) 2017-08-14 2017-11-10 Method and apparatus for storing mnemonic of hardware bitcoin wallet, and computer readable recording medium

Country Status (2)

Country Link
KR (1) KR20190018377A (en)
WO (1) WO2019093808A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102172645B1 (en) 2020-08-11 2020-11-02 박용규 Cube for Stamping Mnemonic of Crypto Currency Wallet

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20150082564A (en) 2012-11-05 2015-07-15 마스터카드 인터내셔날, 인코포레이티드 Electronic wallet apparatus, method, and computer program product

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101416817B1 (en) * 2012-11-29 2014-07-08 에스케이씨앤씨 주식회사 Apparatus and method for e-wallet services using a two-factor authentication
KR20150050231A (en) * 2013-10-31 2015-05-08 한국전자통신연구원 Apparatus and method for performing key derivation on closed domain
KR101580514B1 (en) * 2015-06-22 2015-12-28 (주) 시큐어가드 테크놀러지 Method and apparatus for managing a password by using the seed key and computer readable recording medium applying the same

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20150082564A (en) 2012-11-05 2015-07-15 마스터카드 인터내셔날, 인코포레이티드 Electronic wallet apparatus, method, and computer program product

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102172645B1 (en) 2020-08-11 2020-11-02 박용규 Cube for Stamping Mnemonic of Crypto Currency Wallet

Also Published As

Publication number Publication date
WO2019093808A1 (en) 2019-05-16

Similar Documents

Publication Publication Date Title
US10594498B2 (en) Method and service-providing server for secure transmission of user-authenticating information
US10846663B2 (en) Systems and methods for securing cryptocurrency purchases
US20200127858A1 (en) Method for carrying out an authentication
RU2710897C2 (en) Methods for safe generation of cryptograms
US9660985B2 (en) Service authorization using auxiliary device
EP2945410B1 (en) Security for mobile applications
EP3518567B1 (en) Remote server encrypted data provisioning system and methods
US10404461B2 (en) Token security on a communication device
US10491384B2 (en) Device for secure multi-party cryptographic authorization
US9867043B2 (en) Secure device service enrollment
US10496832B2 (en) System and method for initially establishing and periodically confirming trust in a software application
CN105408913B (en) Privacy data are handled in cloud
US10586229B2 (en) Anytime validation tokens
US20200021441A1 (en) Methods for secure credential provisioning
US10171476B2 (en) System and method for protecting the privacy of identity and financial information of the consumer conducting online business
ES2680152T3 (en) Authentication method and device convenient for the user using a mobile authentication application
JP6514218B2 (en) Client authentication using social data
US8505075B2 (en) Enterprise device recovery
ES2632795T3 (en) Payment system
US9325708B2 (en) Secure access to data in a device
EP3175380B1 (en) System and method for implementing a one-time-password using asymmetric cryptography
US9137223B2 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
TWI455559B (en) Virtual subscriber identity module
US9118662B2 (en) Method and system for distributed off-line logon using one-time passwords
US20130145455A1 (en) Method for accessing a secure storage, secure storage and system comprising the secure storage

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application