KR20190018377A - Method and apparatus for storing mnemonic of hardware bitcoin wallet, and computer readable recording medium - Google Patents
Method and apparatus for storing mnemonic of hardware bitcoin wallet, and computer readable recording medium Download PDFInfo
- Publication number
- KR20190018377A KR20190018377A KR1020170149072A KR20170149072A KR20190018377A KR 20190018377 A KR20190018377 A KR 20190018377A KR 1020170149072 A KR1020170149072 A KR 1020170149072A KR 20170149072 A KR20170149072 A KR 20170149072A KR 20190018377 A KR20190018377 A KR 20190018377A
- Authority
- KR
- South Korea
- Prior art keywords
- mnemonic
- bit coin
- server
- user terminal
- certificate
- Prior art date
Links
- 230000001343 mnemonic Effects 0.000 title claims abstract description 165
- 238000004891 communication Methods 0.000 claims abstract description 60
- 240000007419 Hura crepitans Species 0.000 claims abstract description 32
- 238000000034 methods Methods 0.000 claims description 14
- 238000010586 diagrams Methods 0.000 description 16
- 230000015654 memory Effects 0.000 description 5
- 206010057190 Respiratory tract infections Diseases 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 230000000875 corresponding Effects 0.000 description 2
- 238000005516 engineering processes Methods 0.000 description 2
- 235000010384 tocopherol Nutrition 0.000 description 2
- 235000019731 tricalcium phosphate Nutrition 0.000 description 2
- XCCTYIAWTASOJW-XVFCMESISA-N Uridine-5'-Diphosphate Chemical compound data:image/svg+xml;base64,<?xml version='1.0' encoding='iso-8859-1'?>
<svg version='1.1' baseProfile='full'
              xmlns='http://www.w3.org/2000/svg'
                      xmlns:rdkit='http://www.rdkit.org/xml'
                      xmlns:xlink='http://www.w3.org/1999/xlink'
                  xml:space='preserve'
width='300px' height='300px' viewBox='0 0 300 300'>
<!-- END OF HEADER -->
<rect style='opacity:1.0;fill:#FFFFFF;stroke:none' width='300' height='300' x='0' y='0'> </rect>
<path class='bond-0' d='M 181.622,121.583 L 188.189,116.251 L 186.252,114.503 Z' style='fill:#3B4143;fill-rule:evenodd;fill-opacity=1;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-0' d='M 188.189,116.251 L 190.883,107.423 L 194.757,110.918 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-0' d='M 188.189,116.251 L 186.252,114.503 L 190.883,107.423 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-1' d='M 181.622,121.583 L 155.681,118.831' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-24' d='M 181.622,121.583 L 187.021,147.105' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-2' d='M 155.681,118.831 L 152.304,110.356 L 150.044,111.659 Z' style='fill:#3B4143;fill-rule:evenodd;fill-opacity=1;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-2' d='M 152.304,110.356 L 144.407,104.486 L 148.928,101.882 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-2' d='M 152.304,110.356 L 150.044,111.659 L 144.407,104.486 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-3' d='M 155.681,118.831 L 145.048,142.652' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 142.442,142.937 L 142.55,143.447' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 139.836,143.221 L 140.052,144.242' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 137.229,143.506 L 137.553,145.037' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 134.623,143.791 L 135.055,145.832' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 132.017,144.075 L 132.557,146.627' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 129.411,144.36 L 130.059,147.423' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 126.805,144.645 L 127.561,148.218' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 124.199,144.929 L 125.063,149.013' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 121.593,145.214 L 122.564,149.808' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 118.987,145.499 L 120.066,150.603' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-14' d='M 145.048,142.652 L 151.398,148.381' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-14' d='M 151.398,148.381 L 157.747,154.109' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-5' d='M 119.526,148.051 L 116.618,156.973' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-5' d='M 116.618,156.973 L 113.709,165.896' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-6' d='M 104.772,174.263 L 98.3908,175.613' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-6' d='M 98.3908,175.613 L 92.0097,176.963' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-7' d='M 87.3914,185.208 L 88.6192,191.012' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-7' d='M 88.6192,191.012 L 89.8471,196.816' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 87.0004,170.755 L 85.7725,164.951' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 85.7725,164.951 L 84.5447,159.146' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 81.8961,171.835 L 80.6683,166.03' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 80.6683,166.03 L 79.4404,160.226' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-9' d='M 79.8299,179.539 L 73.4488,180.889' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-9' d='M 73.4488,180.889 L 67.0677,182.239' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-10' d='M 54.1471,176.694 L 51.5996,173.859' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-10' d='M 51.5996,173.859 L 49.0521,171.024' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-11' d='M 49.0521,158.775 L 52.3739,155.789' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-11' d='M 52.3739,155.789 L 55.6957,152.804' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-12' d='M 36.8723,157.47 L 34.3248,154.636' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-12' d='M 34.3248,154.636 L 31.7772,151.801' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 35.1287,167.78 L 31.8069,170.765' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 31.8069,170.765 L 28.485,173.75' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 38.6159,171.66 L 35.2941,174.645' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 35.2941,174.645 L 31.9723,177.63' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-15' d='M 171.086,156.284 L 179.053,151.694' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-15' d='M 179.053,151.694 L 187.021,147.105' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 188.659,148.122 L 188.871,147.645' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 190.297,149.139 L 190.722,148.186' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 191.935,150.155 L 192.573,148.726' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 193.573,151.172 L 194.423,149.267' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 195.211,152.189 L 196.274,149.807' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 196.849,153.206 L 198.125,150.348' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 198.487,154.223 L 199.976,150.888' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 200.125,155.24 L 201.826,151.429' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 201.763,156.257 L 203.677,151.969' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 203.401,157.274 L 205.528,152.509' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-17' d='M 211.566,164.694 L 212.554,174.189' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-17' d='M 212.554,174.189 L 213.543,183.684' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-25' d='M 217.218,153.114 L 224.589,147.77' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-25' d='M 224.589,147.77 L 231.96,142.426' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 212.011,181.572 L 204.787,186.811' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 204.787,186.811 L 197.562,192.049' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 215.074,185.796 L 207.849,191.034' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 207.849,191.034 L 200.624,196.273' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-19' d='M 213.543,183.684 L 222.265,187.577' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-19' d='M 222.265,187.577 L 230.986,191.471' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-20' d='M 243.74,189.694 L 251.111,184.349' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-20' d='M 251.111,184.349 L 258.482,179.005' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 257.419,181.387 L 265.995,185.215' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 265.995,185.215 L 274.57,189.043' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 259.546,176.623 L 268.121,180.451' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 268.121,180.451 L 276.697,184.279' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-22' d='M 258.482,179.005 L 255.781,153.059' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-23' d='M 255.781,153.059 L 231.96,142.426' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-23' d='M 250.081,156.228 L 233.407,148.785' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<text dominant-baseline="central" text-anchor="start" x='195.905' y='103.519' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>OH</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='145.851' y='97.5317' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>HO</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='108.25' y='174.157' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='85.9198' y='179.555' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#FF60B7' ><tspan>P</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='88.1275' y='205.077' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>OH</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='77.3299' y='154.034' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='60.3984' y='184.954' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='42.9622' y='165.552' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#FF60B7' ><tspan>P</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='59.1739' y='148.115' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>OH</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='28.7171' y='146.149' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>HO</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='26.7505' y='182.988' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='164.417' y='161.43' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='210.841' y='159.042' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#4284F4' ><tspan>N</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='195.615' y='200.301' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='237.363' y='195.622' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#4284F4' ><tspan>N</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='234.465' y='204.317' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#4284F4' ><tspan>H</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='279.112' y='190.943' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
</svg>
 data:image/svg+xml;base64,<?xml version='1.0' encoding='iso-8859-1'?>
<svg version='1.1' baseProfile='full'
              xmlns='http://www.w3.org/2000/svg'
                      xmlns:rdkit='http://www.rdkit.org/xml'
                      xmlns:xlink='http://www.w3.org/1999/xlink'
                  xml:space='preserve'
width='85px' height='85px' viewBox='0 0 85 85'>
<!-- END OF HEADER -->
<rect style='opacity:1.0;fill:#FFFFFF;stroke:none' width='85' height='85' x='0' y='0'> </rect>
<path class='bond-0' d='M 50.9595,33.9486 L 53.1537,32.0682 L 52.6049,31.5731 Z' style='fill:#3B4143;fill-rule:evenodd;fill-opacity=1;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-0' d='M 53.1537,32.0682 L 54.2503,29.1975 L 55.3479,30.1877 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-0' d='M 53.1537,32.0682 L 52.6049,31.5731 L 54.2503,29.1975 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-1' d='M 50.9595,33.9486 L 43.6097,33.1689' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-24' d='M 50.9595,33.9486 L 52.4892,41.1797' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-2' d='M 43.6097,33.1689 L 42.44,30.3981 L 41.7996,30.7671 Z' style='fill:#3B4143;fill-rule:evenodd;fill-opacity=1;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-2' d='M 42.44,30.3981 L 39.9895,28.3652 L 41.2704,27.6273 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-2' d='M 42.44,30.3981 L 41.7996,30.7671 L 39.9895,28.3652 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-3' d='M 43.6097,33.1689 L 40.5969,39.9181' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 39.8585,39.9987 L 39.8891,40.1433' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 39.1201,40.0794 L 39.1813,40.3686' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 38.3817,40.16 L 38.4735,40.5939' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 37.6433,40.2407 L 37.7656,40.8192' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 36.9049,40.3213 L 37.0578,41.0444' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 36.1665,40.402 L 36.35,41.2697' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 35.4281,40.4826 L 35.6422,41.495' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 34.6897,40.5633 L 34.9344,41.7203' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 33.9513,40.644 L 34.2266,41.9456' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 33.2129,40.7246 L 33.5188,42.1708' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-14' d='M 40.5969,39.9181 L 42.7655,41.8746' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-14' d='M 42.7655,41.8746 L 44.9342,43.831' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-5' d='M 33.3658,41.4477 L 32.4212,44.3454' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-5' d='M 32.4212,44.3454 L 31.4766,47.243' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-6' d='M 29.9245,48.7182 L 27.3774,49.257' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-6' d='M 27.3774,49.257 L 24.8303,49.7958' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-7' d='M 24.1045,51.2364 L 24.6088,53.62' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-7' d='M 24.6088,53.62 L 25.113,56.0037' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 24.3065,48.6197 L 23.8022,46.236' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 23.8022,46.236 L 23.298,43.8523' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 22.8603,48.9256 L 22.356,46.5419' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 22.356,46.5419 L 21.8518,44.1583' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-9' d='M 22.8576,50.2132 L 20.3105,50.752' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-9' d='M 20.3105,50.752 L 17.7634,51.2908' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-10' d='M 15.5059,50.3023 L 14.0824,48.7183' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-10' d='M 14.0824,48.7183 L 12.659,47.1343' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-11' d='M 12.659,45.1503 L 14.3393,43.6403' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-11' d='M 14.3393,43.6403 L 16.0196,42.1304' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-12' d='M 10.6863,44.9391 L 9.26281,43.3551' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-12' d='M 9.26281,43.3551 L 7.83936,41.7711' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 10.1922,46.3734 L 8.51194,47.8833' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 8.51194,47.8833 L 6.83165,49.3933' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 11.1803,47.4728 L 9.49999,48.9828' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 9.49999,48.9828 L 7.81971,50.4928' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-15' d='M 47.2352,44.2062 L 49.8622,42.693' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-15' d='M 49.8622,42.693 L 52.4892,41.1797' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 53.0272,41.5008 L 53.0875,41.3658' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 53.5652,41.8219 L 53.6857,41.5519' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 54.1032,42.143 L 54.284,41.7381' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 54.6413,42.4641 L 54.8823,41.9242' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 55.1793,42.7852 L 55.4806,42.1103' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 55.7173,43.1063 L 56.0788,42.2964' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 56.2553,43.4274 L 56.6771,42.4826' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 56.7933,43.7486 L 57.2754,42.6687' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 57.3313,44.0697 L 57.8737,42.8548' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 57.8694,44.3908 L 58.4719,43.0409' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-17' d='M 59.3666,45.4243 L 59.6852,48.4841' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-17' d='M 59.6852,48.4841 L 60.0038,51.5438' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-25' d='M 60.306,43.4183 L 62.7641,41.6361' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-25' d='M 62.7641,41.6361 L 65.2221,39.8539' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 59.5699,50.9454 L 57.1533,52.6976' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 57.1533,52.6976 L 54.7367,54.4498' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 60.4376,52.1422 L 58.021,53.8944' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 58.021,53.8944 L 55.6044,55.6466' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-19' d='M 60.0038,51.5438 L 62.8445,52.8119' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-19' d='M 62.8445,52.8119 L 65.6852,54.08' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-20' d='M 67.8206,53.7825 L 70.2787,52.0003' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-20' d='M 70.2787,52.0003 L 72.7367,50.2181' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 72.4354,50.893 L 75.2347,52.1426' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 75.2347,52.1426 L 78.0341,53.3922' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 73.038,49.5431 L 75.8373,50.7927' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 75.8373,50.7927 L 78.6366,52.0423' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-22' d='M 72.7367,50.2181 L 71.9713,42.8667' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-23' d='M 71.9713,42.8667 L 65.2221,39.8539' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-23' d='M 70.3563,43.7646 L 65.6319,41.6557' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<text dominant-baseline="central" text-anchor="start" x='55.0063' y='28.8303' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>OH</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='40.8245' y='27.134' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>HO</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='30.1709' y='48.8444' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='23.8439' y='50.3741' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#FF60B7' ><tspan>P</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='24.4695' y='57.6051' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>OH</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='21.4101' y='43.143' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='16.6129' y='51.9037' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='11.6726' y='46.4063' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#FF60B7' ><tspan>P</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='16.2659' y='41.466' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>OH</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='7.63651' y='40.9088' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>HO</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='7.07931' y='51.3465' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='46.0847' y='45.2386' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='59.2383' y='44.562' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#4284F4' ><tspan>N</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='54.9242' y='56.2519' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='66.7529' y='54.9262' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#4284F4' ><tspan>N</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='65.9316' y='57.3899' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#4284F4' ><tspan>H</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='78.5817' y='53.6004' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
</svg>
 O[C@@H]1[C@H](O)[C@@H](COP(O)(=O)OP(O)(O)=O)O[C@H]1N1C(=O)NC(=O)C=C1 XCCTYIAWTASOJW-XVFCMESISA-N 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006011 modification reactions Methods 0.000 description 1
- 230000003287 optical Effects 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 230000001172 regenerating Effects 0.000 description 1
- 239000000344 soaps Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3678—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Abstract
Description
The present invention relates to a method for safely storing a mnemonic, and more particularly to a mnemonic storing method for safely storing a mnemonic used as a cryptoside of a hardware bit coin purse.
Bit coin mnemonics is an electronic wallet creation and recovery method defined by BIP39, which proposes bit coin improvement. A mnemonic is a word that is easy to remember and refers to words used to create and recover a bit coin purse. A mnemonic is generated from a random number generated by a computer program. The generated mnemonic is randomly composed of at least twelve words and up to twenty-four words without association and association information between the words.
By calculating the generated mnemonic with the cryptographic computation algorithm, the encryption key of the electronic wallet can be generated. If you lose your bit coin purse, remember the mnemonic used to generate the bit coin purse's encryption key, and if you enter it in the correct order, you will recover the bit coin purse by regenerating the bit coin purse's encryption key from the server where the mnemonic is stored .
This technique is defined in the bit coin improvement proposal, that is, in the standard protocol BIP 39, and is used as a method of defining and calculating a mnemonic used in a bit coin purse used for a bit coin exchange, a bit coin purse, a bit coin exchange service, In addition, it is applied to various virtual currency based on bit coin, or to the method of creating and restoring electronic wallet using mnemonics for encrypted currency.
However, since only the method of using mnemonic is explained in BIP39, and the server configuration and storage configuration for secure management are not proposed, in order to implement a secure mnemonic server, Must be saved. However, it is not safe to configure a separate cold storage system to protect the mnemonic server from hackers. If a mnemonic server is hacked or exposed to risks such as Ransomware, the risk of hacking users' bit coin purse, bit coin exchange, bit coin exchange, etc. is increased.
Therefore, a method for safely storing the mnemonic is required.
SUMMARY OF THE INVENTION The present disclosure has been made to solve the above-mentioned problems, and it is an object of the present invention to provide a method for safely storing a bit coin mnemonic.
The present disclosure is directed to providing a cold storage system and a sandbox module to provide a secure mnemonic server.
The present disclosure is to provide a separate cold storage system separate to provide a secure mnemonic server and to provide a sandbox module for storing and managing mnemonics.
According to one aspect of the present invention, there is provided a mnemonic system for safely storing a mnemonic of a hardware bit coin purse. The mnemonic system comprises a bit coin purse server configured to handle authentication of an external bit coin hardware wallet; A mnemonic server connected to be able to communicate with the bit coin purse server and configured to transmit a request for generating a bit coin cipher key upon receiving an authentication request from the bit coin purse server; And a sandbox module connected to the mnemonic server so as to communicate with the mnemonic server and receiving the bit coin cryptographic key generation request to generate and store a mnemonic required for generating the cryptographic key, and to generate and transmit the cryptographic key.
In one embodiment, the bit coin purse server may further be configured to receive an authentication request for a product from an external user terminal, transmit a certificate of the server, and receive the certificate of the external user terminal.
In one embodiment, the bit coin wallet server may be further configured to receive the certificate of the external user terminal and to send a request for verification of the certificate of the external user terminal to the mnemonic server.
In one embodiment, The mnemonic server may be further configured to generate and transmit a bit coin cryptographic key generation request for the external user terminal and to receive the bit coin cryptographic key and to transfer the bit coin cryptographic key to the bit coin purse server .
In one embodiment, the sandbox module may be further configured to receive the bit coin cryptographic key generation request to generate a mnemonic for the external user terminal, store the mnemonic in the mnemonic database, and transmit the generated mnemonic.
According to another aspect of the present invention, there is provided a mnemonic system for safely storing a mnemonic of a hardware bit coin purse. The mnemonic system is configured to handle recovery requests of an external bitcoin hardware wallet; A mnemonic server, communicatively coupled to the bit coin purse server, configured to receive a certificate confirmation request from the bit coin purse server and to send a mnemonic recovery request; And a sandbox module communicatively coupled to the mnemonic server and configured to receive the mnemonic recovery request to recover the mnemonic and to transmit a bit coin cryptographic key.
In one embodiment, the bit coin wallet server may be further configured to receive mnemonic information from an external user terminal and to transmit the mnemonic information to the mnemonic server.
In one embodiment, the bit coin wallet server may further be configured to transmit the certificate of the bit coin purse server and receive the certificate of the external user terminal.
According to another aspect of the present invention, there is provided a method for securely storing a mnemonic of a bit coin hardware wallet performed in a mnemonic system through a communication network. The method includes receiving a product authentication request from an external user terminal and a bit coin hardware wallet associated with the external user terminal, receiving a certificate of the external user terminal, and transmitting the certificate of the mnemonics system, and And generating a bit coin encryption key of the bit coin hardware wallet connected to the user terminal and transmitting the bit coin encryption key to the external user terminal in order to confirm the certificate of the external user terminal.
In one embodiment, generating the bit coin encryption key of the bit coin hardware wallet associated with the user terminal further comprises generating a mnemonic of the bit coin hardware wallet, storing the mnemonic in the mnemonic database, and transmitting the mnemonic can do.
According to another aspect of the present invention, there is provided a method for securely storing a mnemonic of a bit coin hardware wallet performed in a mnemonic system through a communication network. The method includes receiving a recovery request for a bit coin hardware wallet connected to an external user terminal from an external user terminal, receiving a certificate of the external user terminal and transmitting the certificate of the mnemonical system, Requesting and receiving a mnemonic of a bit coin hardware wallet associated with the user terminal in order to verify a certificate of an external user terminal and storing the mnemonic in the mnemonic database and storing the bit coin cryptographic key To the mobile station.
According to another aspect of the present invention there is provided a computer-readable medium having stored thereon one or more instructions that, when executed for a computer, cause the computer to perform any of the methods described above A computer-readable recording medium is provided.
This disclosure is directed to a server for securely storing a mnemonic used as a password seed when generating a bit coin wallet for a bit coin hardware wallet user, comprising a bit coin hardware wallet, a bit coin smartphone app, a bit coin purse server, A mnemonic server and a sandbox to secure a bit coin mnemonic, thereby preventing a bit coin safe transaction and hacking in the future.
Figure 1 is a schematic diagram of a system environment in which a mnemonic storage system may be implemented, in accordance with one embodiment of the present invention.
FIG. 2 is a functional block diagram schematically illustrating the functional configuration of the bit coin hardware wallet 110 of FIG. 1 according to an embodiment of the present invention.
FIG. 3 is a functional block diagram that schematically illustrates the functional configuration of the user terminal 120 of FIG. 1, in accordance with one embodiment of the present invention.
FIG. 4 is a functional block diagram schematically illustrating the functional configuration of the bit coin purse server 140 of FIG. 1 according to an embodiment of the present invention.
FIG. 5 is a functional block diagram schematically illustrating the functional configuration of the mnemonic server 150 of FIG. 1, according to an embodiment of the present invention.
FIG. 6 is a functional block diagram schematically illustrating the functional configuration of the sandbox module 160 of FIG. 1 according to an embodiment of the present invention.
Figure 7 is a flow diagram illustrating an exemplary operational flow when registering a bit coin hardware wallet performed by a mnemonic storage system, in accordance with an embodiment of the present invention.
Figure 8 is a flow diagram illustrating an exemplary operational flow when a nickbits coin hardware wallet performed by a mnemonic storage system is lost, in accordance with an embodiment of the present invention.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings. Hereinafter, when it is determined that there is a possibility that the gist of the present invention may be unnecessarily blurred, a detailed description of known functions and configurations will be omitted. In addition, it should be understood that the following description is only an embodiment of the present invention, and the present disclosure is not limited thereto.
The terminology used in this disclosure is used only to describe a specific embodiment and is not used to limit the invention. For example, an element expressed in singular < Desc / Clms Page number 5 > terms should be understood as including a plurality of elements unless the context clearly dictates a singular value. It is to be understood that the term "and / or" as used in this disclosure encompasses any and all possible combinations of one or more of the listed items. It should be understood that the terms " comprises " or " having ", etc. used in the present disclosure are intended to specify that there exist features, numbers, steps, operations, elements, It is not intended to exclude the presence or addition of one or more other features, numbers, steps, operations, components, parts, or combinations thereof, by use.
As used herein, the term " module " or " module " means a functional part that performs at least one function or operation, and may be implemented by hardware or software or a combination of hardware and software. Also, a plurality of "modules" or "sub-modules" may be integrated into at least one software module and implemented by at least one processor, except for "module" or "sub-module" have.
In addition, all terms used in the present disclosure, including technical or scientific terms, unless otherwise defined, have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs. It should be understood that commonly used predefined terms are to be interpreted as having a meaning consistent with the contextual meaning of the related art and are not to be interpreted excessively or extensively unless explicitly defined otherwise in this disclosure .
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Figure 1 is a schematic diagram of a system environment in which a mnemonic storage system 100 may be implemented, in accordance with one embodiment of the present invention. The system environment 100 includes a bit coin hardware wallet 110, a user terminal 120, a local area network 130, a communication network 140, a bit coin purse server 150, a mnemonic server 160, A sandbox module 170, and a dedicated network 180.
According to one embodiment of the present invention, the bit coin hardware wallet 110 may be any user electronic device usable as a bit coin purse with wired or wireless communication capability. According to one embodiment of the present invention, the bit coin hardware wallet 110 may store a bit coin address, a bit coin private key, a wallet product number, and the like.
According to one embodiment of the present invention, the user terminal 120 may be any user electronic device having wired or wireless communication capabilities. Each of the user terminals 120 may be a wired or wireless communication terminal including, for example, a smart phone, a tablet PC, a music player, a smart speaker, a desktop, a laptop, a PDA, a game console, a digital TV, a set- Lt; / RTI > According to an embodiment of the present invention, each of the user terminals 120 can communicate with the bit coin purse server 150 through the communication network 140, that is, send and receive necessary information. According to an embodiment of the present invention, each of the user terminals 120 can communicate with an external service server (not shown) through the communication network 140, that is, send and receive necessary information. In accordance with one embodiment of the present invention, each of the user terminals 120 may receive user input in the form of voice and / or text, and may communicate with the bit coin purse server 150 via the communication network 140 and / (E.g., performing a specific task, etc.) corresponding to the upper user input obtained through communication with the server (and / or processing in the user terminal 120).
According to an embodiment of the present invention, the local area network 130 includes a communication network such as a wired communication such as USB, UART, serial communication or wireless, such as RFID, NFC, Bluetooth, Thereby enabling communication between the terminals 120.
According to one embodiment of the present invention, the communication network 140 may be any wired or wireless communication network, for example, a TCP / IP communication network. According to an embodiment of the present invention, the communication network 140 may include, for example, a WiFi network, a LAN network, a WAN network, and the Internet network, but the present invention is not limited thereto. In accordance with one embodiment of the present invention, the communication network 140 may be any of a variety of wired or wireless, such as Ethernet, GSM, EDGE, CDMA, TDMA, OFDM, Bluetooth, VoIP, Wi-MAX, Wibro, May be implemented using a communication protocol. For example, the communication network 140 can use TCP, UDP, and HTTP. HTTP can include XML, SOAP, RESTFUL, HTTP / TEXT, HTTP / BINARY, and HTTP includes HTTPS using certificates.
According to an embodiment of the present invention, the bit coin purse server 150 includes a server for maintaining, updating, and storing information of a bit coin hardware wallet of a plurality of users through a communication network 140 according to a predetermined purpose . According to an embodiment of the present invention, the bit coin purse server 150 includes a bit coin hardware wallet and an authentication module for processing authentication of the user terminal, a control section including an encryption module for encrypting transmission / reception information, a communication section, .
The mnemonic server 160 communicates with the bit coin purse server 150 and the sandbox module 170 via the dedicated network 180 according to a predetermined purpose and transmits the bit coin purse server 150 and receives the bit coin cryptographic key and drives the sandbox module 170.
According to one embodiment of the present invention, the sandbox module 170 is activated by a request of the mnemonic server 160 to generate a mnemonic or a bit coin purse authentication key. According to one embodiment, the sandbox module 170 may also be understood as an application of the mnemonic server 160, and the operation of the application may be understood as the operation of the mnemonic server 160. According to one embodiment of the present invention, the sandbox module 170 may include a control unit for generating a bit coin purse authentication key and performing a command, a storage unit for storing the mnemonic database, and a communication unit.
According to an embodiment of the present invention, the dedicated network 180 is a dedicated communication network to which the bit coin purse server 150, the mnemonic server 160, and the sandbox module 170 are connected and can guarantee the requested service quality (security) A virtual private network using a tunnel or the like can be constructed. At this time, the traffic between the entities is delivered through the private network 180 by configuring an overlay network including IPSec Tunnel, GRE, VxLAN Tunnel, or the like, or using MPLS or PTN technology to guarantee QoS, It is not limited to a specific network technology.
2 is a functional block diagram schematically illustrating the functional configuration of the bit coin hardware wallet of Fig. 1 according to an embodiment of the present invention.
According to the illustration, the bit coin hardware wallet 110 may include a storage unit 202 and a communication unit 204.
According to an embodiment of the present invention, the storage unit 202 may store the wallet product number, the bit coin private key, and the bit coin address information. According to one embodiment of the present invention, the storage 202 may be any storage medium that stores various programs that may be executed on the bit coin hardware wallet 110, such as various application programs and related data. According to an embodiment of the present invention, the storage unit 202 may be configured to include various types of volatile or nonvolatile memories such as DRAM, SRAM, DDR RAM, EPROM, EEPROM, ROM, magnetic disk, optical disk, .
The communication unit 204 enables the bit coin hardware wallet 110 to communicate with the user terminal 120 via the local area network 130. According to an embodiment of the present invention, the communication unit 204 may transmit information stored in the bit coin hardware wallet 110 to the user terminal 120 through the communication network 130. [ According to the embodiment of the present invention, the communication unit 204 can receive various information from the user terminal 120 and perform appropriate processing.
FIG. 3 is a functional block diagram schematically illustrating a functional configuration of the user terminal of FIG. 1 according to an embodiment of the present invention.
The user terminal 120 may include a control unit 302, a storage unit 304, and a communication unit 306. In addition,
The control unit 302 may be configured to receive the wallet product information from the bit coin hardware wallet 110 through the communication unit 306 and to register the product of the bit coin hardware wallet 110. [ According to an embodiment of the present invention, the control unit 302 can receive authentication information required for product registration from the bit coin purse server 150 through the communication unit 306 and perform authentication. For example, the control unit 302 receives and processes a certificate for secure communication with the bit coin purse server 150, which may include a personal certificate, a public certificate, and a private certificate. According to an embodiment of the present invention, the control unit 302 may communicate with each component module of the user terminal 120 and perform various operations on the user terminal 120. [ According to an embodiment of the present invention, the control unit 302 can drive and execute various application programs on the storage unit 304. [ According to an embodiment of the present invention, according to an embodiment of the present invention, the control unit 302 may perform appropriate processing on a signal received from the outside through the communication unit 306, if necessary.
According to one embodiment of the present invention, the storage 304 may be any storage medium that stores various programs that may be executed on the user terminal 120, such as various application programs and related data. According to an embodiment of the present invention, the storage unit 304 may be configured to include various types of volatile or nonvolatile memory such as a DRAM, an SRAM, a DDR RAM, an EPROM, an EEPROM, a ROM, a magnetic disk, .
The communication unit 306 may be configured such that the user terminal 120 receives various information from the bit coin hardware wallet 110 and the bit coin purse server 150 through the communication networks 130 and 140 and performs appropriate processing.
4 is a functional block diagram schematically illustrating the functional configuration of the bit coin purse server of FIG. 1 according to an embodiment of the present invention.
As shown, the bit coin purse server 150 may include a control unit 402, a storage unit 404, and a communication unit 406.
The control unit 402 processes the product authentication request. In one embodiment, the bit coin purse server 150 receives the product authentication request from the user terminal 120 via the communication unit 406, receives the certificate for product authentication, and requests the certificate verification from the mnemonic server 160 . According to an embodiment of the present invention, the controller 402 may perform various operations on the bit coin purse server 150. [ According to an embodiment of the present invention, the control unit 402 can drive and execute various application programs on the storage unit 404. According to an embodiment of the present invention, according to an embodiment of the present invention, the control unit 402 can perform appropriate processing on a signal received from the outside via the communication unit 406, if necessary.
According to an embodiment of the present invention, the storage unit 404 may be any storage medium that stores various programs that can be executed on the bit coin purse server 150, such as various application programs and related data. According to an embodiment of the present invention, the storage unit 404 may be configured to include various types of volatile or nonvolatile memory such as a DRAM, an SRAM, a DDR RAM, an EPROM, an EEPROM, a ROM, a magnetic disk, .
The communication unit 406 receives the various information from the user terminal 120, the mnemonic server 160 and the sandbox module 170 through the communication networks 140 and 180 and performs the appropriate processing on the bit coin purse server 150 Lt; / RTI >
FIG. 5 is a functional block diagram schematically showing a functional configuration of the mnemonic server of FIG. 1 according to an embodiment of the present invention.
The mnemonic server 160 may include a control unit 502, a storage unit 504, and a communication unit 506 according to the illustrated embodiments.
The control unit 502 processes the certificate confirmation request. In one embodiment, the mnemonic server 160 may process the certificate confirmation request of the user terminal 120 received from the bit coin purse server 150 and send a bit coin cryptographic key request to the sandbox module 170. In one embodiment, the mnemonic server 160 may receive a bit coin cipher key request from the bit coin purse server 150 and drive the sandbox module 170. According to an embodiment of the present invention, the control unit 502 can drive and execute various application programs on the storage unit 504. According to an embodiment of the present invention, according to an embodiment of the present invention, the control unit 502 may perform appropriate processing on a signal received from the outside through the communication unit 506, if necessary.
According to one embodiment of the present invention, the storage unit 504 may be any storage medium that stores various programs that can be executed on the mnemonic server 1650, such as various application programs and related data. According to an embodiment of the present invention, the storage unit 504 is configured to include various types of volatile or nonvolatile memory such as a DRAM, an SRAM, a DDR RAM, an EPROM, an EEPROM, a ROM, a magnetic disk, .
The communication unit 506 may be configured such that the mnemonic server 160 receives various information from the bit coin purse server 150 and the sandbox module 170 through the communication network 180 and performs appropriate processing.
FIG. 6 is a functional block diagram schematically illustrating a functional configuration of the sandbox module of FIG. 1 according to an embodiment of the present invention.
The sandbox module 170 may include a control unit 602, a storage unit 604, and a communication unit 606. [
According to one embodiment of the present invention, the sandbox module 170 may be activated upon request of the mnemonic server 160 and executed as a virtual machine. In one embodiment, the sandbox module 170 may also be understood as an application of the mnemonic server 160, and the operation of the application may be understood as the operation of the mnemonic server 160. In one embodiment, the sandbox module 170 may be executed from the request of the mnemonic server 160, but may also be executed in advance according to the management rules or the operating rules of the mnemonic server 160. In this case, the sandbox module 170 is executed by the daemon process of the operating system and does not terminate execution even after generating the bit coin cryptographic key. The sandbox module 170 includes both application-like operations and daemon process operations.
In one embodiment, the control unit 602 of the sandbox module 170 is executed in the form of a virtual machine to generate a mnemonic from the mnemonic database required for requesting a bit coin cipher key from the mnemonic server 160, And generate a bit coin purse authentication key. In one embodiment, the controller 602 may generate a bit coin purse authentication key and perform a cryptographic key request. In one embodiment, the control unit 602 may terminate the necessary execution after generating the bit coin cryptographic key. For example, the generated encryption key may be stored in the bit coin hardware wallet 110 through the mnemonic server 160, the bit coin purse server 150, and the user terminal 120.
According to an embodiment of the present invention, the storage unit 604 may include a mnemonic database. A mnemonic database can store mnemonic information.
The communication unit 606 can be configured to allow the sandbox module 170 to receive various information from the bit coin purse server 150 and the mnemonic server 160 through the communication network 180 and to perform appropriate processing.
7 is a flow diagram illustrating an exemplary operational flow when registering a bit coin hardware wallet performed by a mnemonic system, in accordance with an embodiment of the present invention.
The mnemonic system refers to a system in which the bit coin purse server 150, the mnemonic server 160 and the sandbox module 170 are communicably connected to the private network 180.
In step 702, the mnemonic system may receive a product authentication request from a bit coin hardware wallet associated with an external user terminal from an external user terminal. According to an embodiment of the present invention, the product authentication request may include at least one of a private key of the bit coin purse, a product number of the bit coin purse, and address information of the bit coin purse. According to one embodiment of the present invention, the communication at the time of requesting the product authentication can be encrypted and communicated. According to one embodiment of the present invention, the mnemonic system may be configured to handle security errors. Techniques related to encrypted communication and security error handling and the like are obvious to those skilled in the art and can be modified in various ways, so a detailed description thereof will be omitted here.
At step 704, the mnemonic system may trigger the authentication request received at step 702 to receive the certificate of the external user terminal and send the certificate of the mnemonic system to the external user terminal.
In step 706, the mnemonic system generates and stores the mnemonics of the bit coin hardware wallet in the mnemonic database to verify the certificate of the external user terminal, and in step 708, You can generate a cryptographic key for your coin hardware wallet.
In step 710, the mnemonic system may complete the product authentication of the bit coin hardware wallet by transmitting a bit coin encryption key for the bit coin hardware wallet associated with the user terminal to the external user terminal.
According to an embodiment of the present invention, the communication when each step is performed can be encrypted and communicated, and a security error can be handled when a security error occurs. Techniques related to encrypted communication and security error handling and the like are obvious to those skilled in the art and can be modified in various ways, so a detailed description thereof will be omitted here.
8 is a flow diagram illustrating an exemplary operational flow when recovering information regarding a bit coin hardware wallet performed by a mnemonic system, in accordance with an embodiment of the present invention.
In step 802, the mnemonic system may receive a recovery request for a bit coin hardware wallet associated with an external user terminal from an external user terminal. According to an embodiment of the present invention, the restoration request may include at least one of a private key of the bit coin purse, a product number of the bit coin purse, and address information of the bit coin purse. According to one embodiment of the present invention, the communication at the time of requesting the product authentication can be encrypted and communicated. According to one embodiment of the present invention, the mnemonic system may be configured to handle security errors.
In step 804, the mnemonic system may trigger the recovery request received in step 802 to send the certificate of the mnemonic system to the corresponding external user terminal, and receive the certificate of the user terminal.
In step 806, the mnemonic system may request and receive a mnemonic of the bit coin hardware wallet associated with the user terminal to verify the certificate of the external user terminal.
In step 808, the mnemonic system may recover the received mnemonics, store them in a mnemonic database, and operate the recovered mnemonics to generate a bit coin cryptographic key of the bit coin hardware wallet.
Then, in step 810, the mnemonic system may complete the recovery procedure by sending a bit coin cryptographic key to an external user terminal.
According to an embodiment of the present invention, the communication when each step is performed can be encrypted and communicated, and a security error can be handled when a security error occurs. Techniques related to encrypted communication and security error handling and the like are obvious to those skilled in the art and can be modified in various ways, so a detailed description thereof will be omitted here.
As will be appreciated by those skilled in the art, the present invention is not limited to the examples described herein, but can be variously modified, rearranged, and replaced without departing from the scope of the present invention. It should be understood that the various techniques described herein may be implemented in hardware or software, or a combination of hardware and software.
A computer program according to an embodiment of the present invention may be stored in a storage medium readable by a computer processor or the like such as a nonvolatile memory such as EPROM, EEPROM, flash memory device, a magnetic disk such as an internal hard disk and a removable disk, CDROM disks, and the like. Also, the program code (s) may be implemented in assembly language or machine language. And all changes and modifications that fall within the true spirit and scope of the present invention are intended to be embraced by the following claims.
Claims (12)
- A mnemonic system for safely storing a mnemonic of a hardware bit coin purse,
A bit coin purse server configured to process authentication of an external bit coin hardware wallet;
A mnemonic server connected to be able to communicate with the bit coin purse server and configured to transmit a request for generating a bit coin cipher key upon receiving an authentication request from the bit coin purse server; And
And a sandbox module connected to the mnemonic server in a communicable manner and configured to receive the bit coin cryptographic key generation request to generate and store a mnemonic required for generating the cryptographic key and to generate and transmit the cryptographic key, Of the mnemonic system. - The method according to claim 1,
Wherein the bit coin purse server is further configured to receive an authentication request of a product from an external user terminal, transmit a certificate of the server, and receive the certificate of the external user terminal. - The method according to claim 1,
Wherein the bit coin wallet server is further configured to receive the certificate of the external user terminal and to transmit a request for verification of the certificate of the external user terminal to the mnemonic server. - 3. The method of claim 2,
The mnemonic server
A hardware bit coin purse mnemonic configured to generate and transmit a bit coin cryptographic key generation request for the external user terminal and to receive the bit coin cryptographic key and deliver the bit coin cryptographic key to the bit coin purse server, system. - 5. The method of claim 4,
The sandbox module
Wherein the mnemonic system is further configured to receive the bit coin cryptographic key generation request to generate a mnemonic for the external user terminal, store the mnemonic in the mnemonic database, and transmit the generated mnemonic. - A mnemonic system for safely storing a mnemonic of a hardware bit coin purse,
A bit coin purse server configured to process a recovery request of an external bit coin hardware wallet;
A mnemonic server, communicatively coupled to the bit coin purse server, configured to receive a certificate confirmation request from the bit coin purse server and to send a mnemonic recovery request; And
And a sandbox module coupled to communicate with the mnemonic server and configured to receive the mnemonic recovery request to recover the mnemonic and to transmit a bit coin cryptographic key. - The method according to claim 6,
Wherein the bit coin wallet server is further configured to receive mnemonic information from an external user terminal and to transfer the mnemonic information to the mnemonic server. - The method according to claim 6,
Wherein the bit coin purse server is further configured to transmit a certificate of the bit coin purse server and receive a certificate of the external user terminal. - A method for securely storing a mnemonic of a bit coin hardware wallet performed in a mnemonic system via a communication network,
Receiving a product authentication request of a bit coin hardware wallet connected to an external user terminal from an external user terminal,
Receiving a certificate of the external user terminal and transmitting the certificate of the mnemonic system, and
Generating a bit coin encryption key of the bit coin hardware wallet connected to the user terminal and transmitting the bit coin encryption key to the external user terminal in order to check the certificate of the external user terminal
A method of safely storing a mnemonic of a bit coin hardware wallet comprising: - 10. The method of claim 9,
Generating a bit coin encryption key of a bit coin hardware wallet associated with the user terminal,
Further comprising: generating a mnemonic of the bit coin hardware wallet, storing the mnemonic in the mnemonic database, and transmitting the mnemonic; and safely storing the mnemonic of the bit coin hardware wallet. - A method for securely storing a mnemonic of a bit coin hardware wallet performed in a mnemonic system via a communication network,
Receiving a recovery request of a bit coin hardware wallet connected to an external user terminal from an external user terminal,
Receiving a certificate of the external user terminal and transmitting the certificate of the mnemonic system, and
Requesting and receiving a mnemonic of a bit coin hardware wallet associated with the user terminal to verify the certificate of the external user terminal;
Recovering the mnemonics and storing them in a mnemonic database and transmitting a bit coin cryptographic key of the bit coin hardware wallet
A method of safely storing a mnemonic of a bit coin hardware wallet comprising: - A computer-readable medium having stored thereon one or more instructions,
Wherein the one or more instructions cause the computer to perform the method of any one of claims 9 to 11 when executed on a computer.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20170103075 | 2017-08-14 | ||
KR1020170103075 | 2017-08-14 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/KR2018/013602 WO2019093808A1 (en) | 2017-08-14 | 2018-11-09 | Method, apparatus, and computer-readable recording medium for safe storage of mnemonic of hardware bitcoin wallet |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20190018377A true KR20190018377A (en) | 2019-02-22 |
Family
ID=65584868
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020170149072A KR20190018377A (en) | 2017-08-14 | 2017-11-10 | Method and apparatus for storing mnemonic of hardware bitcoin wallet, and computer readable recording medium |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR20190018377A (en) |
WO (1) | WO2019093808A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102172645B1 (en) | 2020-08-11 | 2020-11-02 | 박용규 | Cube for Stamping Mnemonic of Crypto Currency Wallet |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20150082564A (en) | 2012-11-05 | 2015-07-15 | 마스터카드 인터내셔날, 인코포레이티드 | Electronic wallet apparatus, method, and computer program product |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101416817B1 (en) * | 2012-11-29 | 2014-07-08 | 에스케이씨앤씨 주식회사 | Apparatus and method for e-wallet services using a two-factor authentication |
KR20150050231A (en) * | 2013-10-31 | 2015-05-08 | 한국전자통신연구원 | Apparatus and method for performing key derivation on closed domain |
KR101580514B1 (en) * | 2015-06-22 | 2015-12-28 | (주) 시큐어가드 테크놀러지 | Method and apparatus for managing a password by using the seed key and computer readable recording medium applying the same |
-
2017
- 2017-11-10 KR KR1020170149072A patent/KR20190018377A/en not_active Application Discontinuation
-
2018
- 2018-11-09 WO PCT/KR2018/013602 patent/WO2019093808A1/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20150082564A (en) | 2012-11-05 | 2015-07-15 | 마스터카드 인터내셔날, 인코포레이티드 | Electronic wallet apparatus, method, and computer program product |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102172645B1 (en) | 2020-08-11 | 2020-11-02 | 박용규 | Cube for Stamping Mnemonic of Crypto Currency Wallet |
Also Published As
Publication number | Publication date |
---|---|
WO2019093808A1 (en) | 2019-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10594498B2 (en) | Method and service-providing server for secure transmission of user-authenticating information | |
US10846663B2 (en) | Systems and methods for securing cryptocurrency purchases | |
US20200127858A1 (en) | Method for carrying out an authentication | |
RU2710897C2 (en) | Methods for safe generation of cryptograms | |
US9660985B2 (en) | Service authorization using auxiliary device | |
EP2945410B1 (en) | Security for mobile applications | |
EP3518567B1 (en) | Remote server encrypted data provisioning system and methods | |
US10404461B2 (en) | Token security on a communication device | |
US10491384B2 (en) | Device for secure multi-party cryptographic authorization | |
US9867043B2 (en) | Secure device service enrollment | |
US10496832B2 (en) | System and method for initially establishing and periodically confirming trust in a software application | |
CN105408913B (en) | Privacy data are handled in cloud | |
US10586229B2 (en) | Anytime validation tokens | |
US20200021441A1 (en) | Methods for secure credential provisioning | |
US10171476B2 (en) | System and method for protecting the privacy of identity and financial information of the consumer conducting online business | |
ES2680152T3 (en) | Authentication method and device convenient for the user using a mobile authentication application | |
JP6514218B2 (en) | Client authentication using social data | |
US8505075B2 (en) | Enterprise device recovery | |
ES2632795T3 (en) | Payment system | |
US9325708B2 (en) | Secure access to data in a device | |
EP3175380B1 (en) | System and method for implementing a one-time-password using asymmetric cryptography | |
US9137223B2 (en) | Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer | |
TWI455559B (en) | Virtual subscriber identity module | |
US9118662B2 (en) | Method and system for distributed off-line logon using one-time passwords | |
US20130145455A1 (en) | Method for accessing a secure storage, secure storage and system comprising the secure storage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |