WO2019093808A1 - 하드웨어 비트코인 지갑의 니모닉을 안전하게 저장하는 방법, 장치 및 컴퓨터 판독가능 기록 매체 - Google Patents
하드웨어 비트코인 지갑의 니모닉을 안전하게 저장하는 방법, 장치 및 컴퓨터 판독가능 기록 매체 Download PDFInfo
- Publication number
- WO2019093808A1 WO2019093808A1 PCT/KR2018/013602 KR2018013602W WO2019093808A1 WO 2019093808 A1 WO2019093808 A1 WO 2019093808A1 KR 2018013602 W KR2018013602 W KR 2018013602W WO 2019093808 A1 WO2019093808 A1 WO 2019093808A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mnemonic
- bit coin
- server
- user terminal
- certificate
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3678—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Definitions
- the present invention relates to a method for safely storing a mnemonic, and more particularly to a mnemonic storing method for safely storing a mnemonic used as a cryptoside of a hardware bit coin purse.
- Bit coin mnemonics is an electronic wallet creation and recovery method defined by BIP39, which proposes bit coin improvement.
- a mnemonic is a word that is easy to remember and refers to words used to create and recover a bit coin purse.
- a mnemonic is generated from a random number generated by a computer program. The generated mnemonic is randomly composed of at least twelve words and up to twenty-four words without association and association information between the words.
- the encryption key of the electronic wallet can be generated. If you lose your bit coin purse, remember the mnemonic used to generate the bit coin purse's encryption key, and if you enter it in the correct order, you will recover the bit coin purse by regenerating the bit coin purse's encryption key from the server where the mnemonic is stored .
- This technique is defined in the bit coin improvement proposal, that is, in the standard protocol BIP 39, and is used as a method of defining and calculating a mnemonic used in a bit coin purse used for a bit coin exchange, a bit coin purse, a bit coin exchange service, In addition, it is applied to various virtual currency based on bit coin, or to the method of creating and restoring electronic wallet using mnemonics for encrypted currency.
- the present disclosure has been made to solve the above-mentioned problems, and it is an object of the present invention to provide a method for safely storing a bit coin mnemonic.
- the present disclosure is directed to providing a cold storage system and a sandbox module to provide a secure mnemonic server.
- the present disclosure is to provide a separate cold storage system separate to provide a secure mnemonic server and to provide a sandbox module for storing and managing mnemonics.
- a mnemonic system for safely storing a mnemonic of a hardware bit coin purse.
- the mnemonic system comprises a bit coin purse server configured to handle authentication of an external bit coin hardware wallet; A mnemonic server connected to be able to communicate with the bit coin purse server and configured to transmit a request for generating a bit coin cipher key upon receiving an authentication request from the bit coin purse server; And a sandbox module connected to the mnemonic server so as to communicate with the mnemonic server and receiving the bit coin cryptographic key generation request to generate and store a mnemonic required for generating the cryptographic key, and to generate and transmit the cryptographic key.
- the bit coin purse server may further be configured to receive an authentication request for a product from an external user terminal, transmit a certificate of the server, and receive the certificate of the external user terminal.
- the bit coin wallet server may be further configured to receive the certificate of the external user terminal and to send a request for verification of the certificate of the external user terminal to the mnemonic server.
- the mnemonic server generates and transmits a bit coin cryptographic key generation request for the external user terminal, receives the bit coin cryptographic key, and forwards the bit coin cryptographic key to the bit coin purse server Lt; / RTI >
- the sandbox module may be further configured to receive the bit coin cryptographic key generation request to generate a mnemonic for the external user terminal, store the mnemonic in the mnemonic database, and transmit the generated mnemonic.
- a mnemonic system for safely storing a mnemonic of a hardware bit coin purse.
- the mnemonic system is configured to handle recovery requests of an external bitcoin hardware wallet;
- a mnemonic server communicatively coupled to the bit coin purse server, configured to receive a certificate confirmation request from the bit coin purse server and to send a mnemonic recovery request;
- a sandbox module communicatively coupled to the mnemonic server and configured to receive the mnemonic recovery request to recover the mnemonic and to transmit a bit coin cryptographic key.
- the bit coin wallet server may be further configured to receive mnemonic information from an external user terminal and to transmit the mnemonic information to the mnemonic server.
- the bit coin wallet server may further be configured to transmit the certificate of the bit coin purse server and receive the certificate of the external user terminal.
- a method for securely storing a mnemonic of a bit coin hardware wallet performed in a mnemonic system through a communication network includes receiving a product authentication request from an external user terminal and a bit coin hardware wallet associated with the external user terminal, receiving a certificate of the external user terminal, and transmitting the certificate of the mnemonics system, and And generating a bit coin encryption key of the bit coin hardware wallet connected to the user terminal and transmitting the bit coin encryption key to the external user terminal in order to confirm the certificate of the external user terminal.
- generating the bit coin encryption key of the bit coin hardware wallet associated with the user terminal further comprises generating a mnemonic of the bit coin hardware wallet, storing the mnemonic in the mnemonic database, and transmitting the mnemonic can do.
- a method for securely storing a mnemonic of a bit coin hardware wallet performed in a mnemonic system through a communication network includes receiving a recovery request for a bit coin hardware wallet connected to an external user terminal from an external user terminal, receiving a certificate of the external user terminal and transmitting the certificate of the mnemonical system, Requesting and receiving a mnemonic of a bit coin hardware wallet associated with the user terminal in order to verify a certificate of an external user terminal and storing the mnemonic in the mnemonic database and storing the bit coin cryptographic key To the mobile station.
- a computer-readable medium having stored thereon one or more instructions that, when executed for a computer, cause the computer to perform any of the methods described above
- a computer-readable recording medium is provided.
- This disclosure is directed to a server for securely storing a mnemonic used as a password seed when generating a bit coin wallet for a bit coin hardware wallet user, comprising a bit coin hardware wallet, a bit coin smartphone app, a bit coin purse server, A mnemonic server and a sandbox to secure a bit coin mnemonic, thereby preventing a bit coin safe transaction and hacking in the future.
- Figure 1 is a schematic diagram of a system environment in which a mnemonic storage system may be implemented, in accordance with one embodiment of the present invention.
- FIG. 2 is a functional block diagram schematically illustrating the functional configuration of the bit coin hardware wallet 110 of FIG. 1 according to an embodiment of the present invention.
- FIG. 3 is a functional block diagram that schematically illustrates the functional configuration of the user terminal 120 of FIG. 1, in accordance with one embodiment of the present invention.
- FIG. 4 is a functional block diagram schematically illustrating the functional configuration of the bit coin purse server 140 of FIG. 1 according to an embodiment of the present invention.
- FIG. 5 is a functional block diagram schematically illustrating the functional configuration of the mnemonic server 150 of FIG. 1, according to an embodiment of the present invention.
- FIG. 6 is a functional block diagram schematically illustrating the functional configuration of the sandbox module 160 of FIG. 1 according to an embodiment of the present invention.
- Figure 7 is a flow diagram illustrating an exemplary operational flow when registering a bit coin hardware wallet performed by a mnemonic storage system, in accordance with an embodiment of the present invention.
- Figure 8 is a flow diagram illustrating an exemplary operational flow when a nickbits coin hardware wallet performed by a mnemonic storage system is lost, in accordance with an embodiment of the present invention.
- " module " or " module " means a functional part that performs at least one function or operation, and may be implemented by hardware or software or a combination of hardware and software. Also, a plurality of "modules” or “sub-modules” may be integrated into at least one software module and implemented by at least one processor, except for "module” or “sub-module” have.
- FIG. 1 is a schematic diagram of a system environment in which a mnemonic storage system 100 may be implemented, in accordance with one embodiment of the present invention.
- the system environment 100 includes a bit coin hardware wallet 110, a user terminal 120, a local area network 130, a communication network 140, a bit coin purse server 150, a mnemonic server 160, A sandbox module 170, and a dedicated network 180.
- the bit coin hardware wallet 110 may be any user electronic device usable as a bit coin purse with wired or wireless communication capability. According to one embodiment of the present invention, the bit coin hardware wallet 110 may store a bit coin address, a bit coin private key, a wallet product number, and the like.
- the user terminal 120 may be any user electronic device having wired or wireless communication capabilities.
- Each of the user terminals 120 may be a wired or wireless communication terminal including, for example, a smart phone, a tablet PC, a music player, a smart speaker, a desktop, a laptop, a PDA, a game console, a digital TV, a set- Lt; / RTI >
- each of the user terminals 120 can communicate with the bit coin purse server 150 through the communication network 140, that is, send and receive necessary information.
- each of the user terminals 120 can communicate with an external service server (not shown) through the communication network 140, that is, send and receive necessary information.
- each of the user terminals 120 may receive user input in the form of voice and / or text, and may communicate with the bit coin purse server 150 via the communication network 140 and / (E.g., performing a specific task, etc.) corresponding to the upper user input obtained through communication with the server (and / or processing in the user terminal 120).
- the local area network 130 includes a communication network such as a wired communication such as USB, UART, serial communication or wireless, such as RFID, NFC, Bluetooth, Thereby enabling communication between the terminals 120.
- a communication network such as a wired communication such as USB, UART, serial communication or wireless, such as RFID, NFC, Bluetooth, Thereby enabling communication between the terminals 120.
- the communication network 140 may be any wired or wireless communication network, for example, a TCP / IP communication network.
- the communication network 140 may include, for example, a WiFi network, a LAN network, a WAN network, and the Internet network, but the present invention is not limited thereto.
- the communication network 140 may be any of a variety of wired or wireless, such as Ethernet, GSM, EDGE, CDMA, TDMA, OFDM, Bluetooth, VoIP, Wi-MAX, Wibro, May be implemented using a communication protocol.
- the communication network 140 can use TCP, UDP, and HTTP.
- HTTP can include XML, SOAP, RESTFUL, HTTP / TEXT, HTTP / BINARY, and HTTP includes HTTPS using certificates.
- the bit coin purse server 150 includes a server for maintaining, updating, and storing information of a bit coin hardware wallet of a plurality of users through a communication network 140 according to a predetermined purpose .
- the bit coin purse server 150 includes a bit coin hardware wallet and an authentication module for processing authentication of the user terminal, a control section including an encryption module for encrypting transmission / reception information, a communication section, .
- the mnemonic server 160 communicates with the bit coin purse server 150 and the sandbox module 170 via the dedicated network 180 according to a predetermined purpose and transmits the bit coin purse server 150 and receives the bit coin cryptographic key and drives the sandbox module 170.
- the sandbox module 170 is activated by a request of the mnemonic server 160 to generate a mnemonic or a bit coin purse authentication key.
- the sandbox module 170 may also be understood as an application of the mnemonic server 160, and the operation of the application may be understood as the operation of the mnemonic server 160.
- the sandbox module 170 may include a control unit for generating a bit coin purse authentication key and performing a command, a storage unit for storing the mnemonic database, and a communication unit.
- the dedicated network 180 is a dedicated communication network to which the bit coin purse server 150, the mnemonic server 160, and the sandbox module 170 are connected and can guarantee the requested service quality (security)
- a virtual private network using a tunnel or the like can be constructed.
- the traffic between the entities is delivered through the private network 180 by configuring an overlay network including IPSec Tunnel, GRE, VxLAN Tunnel, or the like, or using MPLS or PTN technology to guarantee QoS, It is not limited to a specific network technology.
- FIG. 2 is a functional block diagram schematically illustrating the functional configuration of the bit coin hardware wallet of Fig. 1 according to an embodiment of the present invention.
- the bit coin hardware wallet 110 may include a storage unit 202 and a communication unit 204.
- the storage unit 202 may store the wallet product number, the bit coin private key, and the bit coin address information.
- the storage 202 may be any storage medium that stores various programs that may be executed on the bit coin hardware wallet 110, such as various application programs and related data.
- the storage unit 202 may be configured to include various types of volatile or nonvolatile memories such as DRAM, SRAM, DDR RAM, EPROM, EEPROM, ROM, magnetic disk, optical disk, .
- the communication unit 204 enables the bit coin hardware wallet 110 to communicate with the user terminal 120 via the local area network 130. According to an embodiment of the present invention, the communication unit 204 may transmit information stored in the bit coin hardware wallet 110 to the user terminal 120 through the communication network 130. [ According to the embodiment of the present invention, the communication unit 204 can receive various information from the user terminal 120 and perform appropriate processing.
- FIG. 3 is a functional block diagram schematically illustrating a functional configuration of the user terminal of FIG. 1 according to an embodiment of the present invention.
- the user terminal 120 may include a control unit 302, a storage unit 304, and a communication unit 306.
- a control unit 302 may control the user terminal 120 to receive a control signal from a control terminal.
- a storage unit 304 may store data from a storage unit 304.
- the control unit 302 may be configured to receive the wallet product information from the bit coin hardware wallet 110 through the communication unit 306 and to register the product of the bit coin hardware wallet 110.
- the control unit 302 can receive authentication information required for product registration from the bit coin purse server 150 through the communication unit 306 and perform authentication.
- the control unit 302 receives and processes a certificate for secure communication with the bit coin purse server 150, which may include a personal certificate, a public certificate, and a private certificate.
- the control unit 302 may communicate with each component module of the user terminal 120 and perform various operations on the user terminal 120.
- the control unit 302 can drive and execute various application programs on the storage unit 304.
- the control unit 302 may perform appropriate processing on a signal received from the outside through the communication unit 306, if necessary.
- the storage 304 may be any storage medium that stores various programs that may be executed on the user terminal 120, such as various application programs and related data.
- the storage unit 304 may be configured to include various types of volatile or nonvolatile memory such as a DRAM, an SRAM, a DDR RAM, an EPROM, an EEPROM, a ROM, a magnetic disk, .
- the communication unit 306 may be configured such that the user terminal 120 receives various information from the bit coin hardware wallet 110 and the bit coin purse server 150 through the communication networks 130 and 140 and performs appropriate processing.
- FIG. 4 is a functional block diagram schematically illustrating the functional configuration of the bit coin purse server of FIG. 1 according to an embodiment of the present invention.
- the bit coin purse server 150 may include a control unit 402, a storage unit 404, and a communication unit 406.
- the control unit 402 processes the product authentication request.
- the bit coin purse server 150 receives the product authentication request from the user terminal 120 via the communication unit 406, receives the certificate for product authentication, and requests the certificate verification from the mnemonic server 160 .
- the controller 402 may perform various operations on the bit coin purse server 150.
- the control unit 402 can drive and execute various application programs on the storage unit 404.
- the control unit 402 can perform appropriate processing on a signal received from the outside via the communication unit 406, if necessary.
- the storage unit 404 may be any storage medium that stores various programs that can be executed on the bit coin purse server 150, such as various application programs and related data.
- the storage unit 404 may be configured to include various types of volatile or nonvolatile memory such as a DRAM, an SRAM, a DDR RAM, an EPROM, an EEPROM, a ROM, a magnetic disk, .
- the communication unit 406 receives the various information from the user terminal 120, the mnemonic server 160 and the sandbox module 170 through the communication networks 140 and 180 and performs the appropriate processing on the bit coin purse server 150 Lt; / RTI >
- FIG. 5 is a functional block diagram schematically showing a functional configuration of the mnemonic server of FIG. 1 according to an embodiment of the present invention.
- the mnemonic server 160 may include a control unit 502, a storage unit 504, and a communication unit 506 according to the illustrated embodiments.
- the control unit 502 processes the certificate confirmation request.
- the mnemonic server 160 may process the certificate confirmation request of the user terminal 120 received from the bit coin purse server 150 and send a bit coin cryptographic key request to the sandbox module 170.
- the mnemonic server 160 may receive a bit coin cipher key request from the bit coin purse server 150 and drive the sandbox module 170.
- the control unit 502 can drive and execute various application programs on the storage unit 504. According to an embodiment of the present invention, according to an embodiment of the present invention, the control unit 502 may perform appropriate processing on a signal received from the outside through the communication unit 506, if necessary.
- the storage unit 504 may be any storage medium that stores various programs that can be executed on the mnemonic server 1650, such as various application programs and related data.
- the storage unit 504 is configured to include various types of volatile or nonvolatile memory such as a DRAM, an SRAM, a DDR RAM, an EPROM, an EEPROM, a ROM, a magnetic disk, .
- the communication unit 506 may be configured such that the mnemonic server 160 receives various information from the bit coin purse server 150 and the sandbox module 170 through the communication network 180 and performs appropriate processing.
- FIG. 6 is a functional block diagram schematically illustrating a functional configuration of the sandbox module of FIG. 1 according to an embodiment of the present invention.
- the sandbox module 170 may include a control unit 602, a storage unit 604, and a communication unit 606.
- the sandbox module 170 may be activated upon request of the mnemonic server 160 and executed as a virtual machine.
- the sandbox module 170 may also be understood as an application of the mnemonic server 160, and the operation of the application may be understood as the operation of the mnemonic server 160.
- the sandbox module 170 may be executed from the request of the mnemonic server 160, but may also be executed in advance according to the management rules or the operating rules of the mnemonic server 160. In this case, the sandbox module 170 is executed by the daemon process of the operating system and does not terminate execution even after generating the bit coin cryptographic key.
- the sandbox module 170 includes both application-like operations and daemon process operations.
- control unit 602 of the sandbox module 170 is executed in the form of a virtual machine to generate a mnemonic from the mnemonic database required for requesting a bit coin cipher key from the mnemonic server 160, And generate a bit coin purse authentication key.
- the controller 602 may generate a bit coin purse authentication key and perform a cryptographic key request.
- the control unit 602 may terminate the necessary execution after generating the bit coin cryptographic key.
- the generated encryption key may be stored in the bit coin hardware wallet 110 through the mnemonic server 160, the bit coin purse server 150, and the user terminal 120.
- the storage unit 604 may include a mnemonic database.
- a mnemonic database can store mnemonic information.
- the communication unit 606 can be configured to allow the sandbox module 170 to receive various information from the bit coin purse server 150 and the mnemonic server 160 through the communication network 180 and to perform appropriate processing.
- FIG. 7 is a flow diagram illustrating an exemplary operational flow when registering a bit coin hardware wallet performed by a mnemonic system, in accordance with an embodiment of the present invention.
- the mnemonic system refers to a system in which the bit coin purse server 150, the mnemonic server 160 and the sandbox module 170 are communicably connected to the private network 180.
- the mnemonic system may receive a product authentication request from a bit coin hardware wallet associated with an external user terminal from an external user terminal.
- the product authentication request may include at least one of a private key of the bit coin purse, a product number of the bit coin purse, and address information of the bit coin purse.
- the communication at the time of requesting the product authentication can be encrypted and communicated.
- the mnemonic system may be configured to handle security errors. Techniques related to encrypted communication and security error handling and the like are obvious to those skilled in the art and can be modified in various ways, so a detailed description thereof will be omitted here.
- the mnemonic system may trigger the authentication request received at step 702 to receive the certificate of the external user terminal and send the certificate of the mnemonic system to the external user terminal.
- step 706 the mnemonic system generates and stores the mnemonics of the bit coin hardware wallet in the mnemonic database to verify the certificate of the external user terminal, and in step 708, You can generate a cryptographic key for your coin hardware wallet.
- the mnemonic system may complete the product authentication of the bit coin hardware wallet by transmitting a bit coin encryption key for the bit coin hardware wallet associated with the user terminal to the external user terminal.
- the communication when each step is performed can be encrypted and communicated, and a security error can be handled when a security error occurs.
- Techniques related to encrypted communication and security error handling and the like are obvious to those skilled in the art and can be modified in various ways, so a detailed description thereof will be omitted here.
- FIG. 8 is a flow diagram illustrating an exemplary operational flow when recovering information regarding a bit coin hardware wallet performed by a mnemonic system, in accordance with an embodiment of the present invention.
- the mnemonic system may receive a recovery request for a bit coin hardware wallet associated with an external user terminal from an external user terminal.
- the restoration request may include at least one of a private key of the bit coin purse, a product number of the bit coin purse, and address information of the bit coin purse.
- the communication at the time of requesting the product authentication can be encrypted and communicated.
- the mnemonic system may be configured to handle security errors.
- the mnemonic system may trigger the recovery request received in step 802 to send the certificate of the mnemonic system to the corresponding external user terminal, and receive the certificate of the user terminal.
- the mnemonic system may request and receive a mnemonic of the bit coin hardware wallet associated with the user terminal to verify the certificate of the external user terminal.
- the mnemonic system may recover the received mnemonics, store them in a mnemonic database, and operate the recovered mnemonics to generate a bit coin cryptographic key of the bit coin hardware wallet.
- the mnemonic system may complete the recovery procedure by sending a bit coin cryptographic key to an external user terminal.
- the communication when each step is performed can be encrypted and communicated, and a security error can be handled when a security error occurs.
- Techniques related to encrypted communication and security error handling and the like are obvious to those skilled in the art and can be modified in various ways, so a detailed description thereof will be omitted here.
- a computer program according to an embodiment of the present invention may be stored in a storage medium readable by a computer processor or the like such as a nonvolatile memory such as EPROM, EEPROM, flash memory device, a magnetic disk such as an internal hard disk and a removable disk, CDROM disks, and the like. Also, the program code (s) may be implemented in assembly language or machine language. And all changes and modifications that fall within the true spirit and scope of the present invention are intended to be embraced by the following claims.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (12)
- 하드웨어 비트코인 지갑의 니모닉을 안전하게 저장하는 니모닉 시스템으로서,외부의 비트코인 하드웨어 지갑의 인증을 처리하도록 구성되는 비트코인 지갑 서버;상기 비트코인 지갑 서버와 통신가능하도록 연결되고, 상기 비트코인 지갑 서버로부터 인증 요청을 수신하면, 비트코인 암호키의 생성 요청을 전송하도록 구성되는 니모닉 서버; 및상기 니모닉 서버와 통신가능하도록 연결되고 상기 비트코인 암호키 생성 요청을 수신하여 상기 암호키 생성에 필요한 니모닉을 생성하여 저장하고 상기 암호키를 생성하여 전송하도록 구성된 샌드박스 모듈을 포함하는 하드웨어 비트코인 지갑의 니모닉 시스템.
- 제1항에 있어서,상기 비트코인 지갑 서버는 외부의 사용자 단말로부터 제품의 인증 요청을 수신하고, 서버의 인증서를 전송하며, 상기 외부의 사용자 단말의 인증서를 수신받도록 더 구성되는 하드웨어 비트코인 지갑의 니모닉 시스템.
- 제1항에 있어서,상기 비트코인 지갑 서버는 상기 외부의 사용자 단말의 인증서를 수신하고, 상기 외부의 사용자 단말의 인증서의 확인 요청을 상기 니모닉 서버로 전송하도록 더 구성되는 하드웨어 비트코인 지갑의 니모닉 시스템.
- 제2항에 있어서,상기 니모닉 서버는상기 외부의 사용자 단말에 대한 비트코인 암호키 생성 요청을 생성하여 전송하고, 상기 비트코인 암호키를 수신하여 상기 비트코인 암호키를 상기 비트코인 지갑 서버로 전달하도록 더 구성되는 하드웨어 비트코인 지갑의 니모닉 시스템.
- 제4항에 있어서,상기 샌드박스 모듈은상기 상기 비트코인 암호키 생성 요청을 수신하여 상기 외부의 사용자 단말에 대한 니모닉을 생성하여 니모닉 데이터베이스에 저장하고 생성된 니모닉을 전송하도록 더 구성되는 하드웨어 비트코인 지갑의 니모닉 시스템.
- 하드웨어 비트코인 지갑의 니모닉을 안전하게 저장하는 니모닉 시스템으로서,외부의 비트코인 하드웨어 지갑의 복구 요청을 처리하도록 구성되는 비트코인 지갑 서버;상기 비트코인 지갑 서버와 통신가능하도록 연결되고, 상기 비트코인 지갑 서버로부터 인증서 확인 요청을 수신하고, 니모닉 복구 요청을 전송하도록 구성되는 니모닉 서버; 및상기 니모닉 서버와 통신가능하도록 연결되고 상기 니모닉 복구 요청을 수신하여 상기 니모닉을 복구하고 비트코인 암호키를 전송하도록 구성된 샌드박스 모듈을 포함하는 하드웨어 비트코인 지갑의 니모닉 시스템.
- 제6항에 있어서,상기 비트코인 지갑 서버는 외부의 사용자 단말로부터 니모닉 정보를 입력받아 상기 니모닉 서버로 상기 니모닉 정보를 전송하도록 더 구성되는 하드웨어 비트코인 지갑의 니모닉 시스템.
- 제6항에 있어서,상기 비트코인 지갑 서버는 상기 비트코인 지갑 서버의 인증서를 전송하며, 상기 외부의 사용자 단말의 인증서를 수신받도록 더 구성되는 하드웨어 비트코인 지갑의 니모닉 시스템.
- 통신망을 통해 니모닉 시스템에서 수행되는 비트코인 하드웨어 지갑의 니모닉을 안전하게 저장하는 방법으로서,외부의 사용자 단말로부터 상기 외부의 사용자 단말과 연결된 비트코인 하드웨어 지갑의 제품 인증 요청을 수신하는 단계,상기 외부의 사용자 단말의 인증서를 수신하고, 상기 니모닉 시스템의 인증서를 전송하는 단계, 및상기 외부의 사용자 단말의 인증서를 확인하기 위해서, 상기 사용자 단말과 연결된 비트코인 하드웨어 지갑의 비트코인 암호화 키를 생성하여 상기 외부의 사용자 단말로 전송하는 단계를 포함하는 비트코인 하드웨어 지갑의 니모닉을 안전하게 저장하는 방법.
- 제9항에 있어서,상기 사용자 단말과 연결된 비트코인 하드웨어 지갑의 비트코인 암호화 키를 생성하는 단계는,상기 비트코인 하드웨어 지갑의 니모닉을 생성하여 니모닉 데이터베이스에 저장하고 상기 니모닉을 전송하는 단계를 더 포함하는 비트코인 하드웨어 지갑의 니모닉을 안전하게 저장하는 방법.
- 통신망을 통해 니모닉 시스템에서 수행되는 비트코인 하드웨어 지갑의 니모닉을 안전하게 저장하는 방법으로서,외부의 사용자 단말로부터 상기 외부의 사용자 단말과 연결된 비트코인 하드웨어 지갑의 복구 요청을 수신하는 단계,상기 외부의 사용자 단말의 인증서를 수신하고, 상기 니모닉 시스템의 인증서를 전송하는 단계, 및상기 외부의 사용자 단말의 인증서를 확인하기 위해서, 상기 사용자 단말과 연결된 비트코인 하드웨어 지갑의 니모닉을 요청하여 수신하는 단계, 및상기 니모닉을 복구하여 니모닉 데이터베이스에 저장하고 상기 비트코인 하드웨어 지갑의 비트코인 암호키를 전송하는 단계를 포함하는 비트코인 하드웨어 지갑의 니모닉을 안전하게 저장하는 방법.
- 하나 이상의 명령어를 포함하는 컴퓨터 판독 가능 기록 매체로서,상기 하나 이상의 명령어는, 컴퓨터에 위해 실행되는 경우, 상기 컴퓨터로 하여금, 제9항 내지 제11항 중 어느 한 항의 방법을 수행하게 하는, 컴퓨터 판독 가능 기록 매체.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20170103075 | 2017-08-14 | ||
KR10-2017-0149072 | 2017-11-10 | ||
KR1020170149072A KR20190018377A (ko) | 2017-08-14 | 2017-11-10 | 하드웨어 비트코인 지갑의 니모닉을 안전하게 저장하는 방법, 장치 및 컴퓨터 판독가능 기록 매체 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019093808A1 true WO2019093808A1 (ko) | 2019-05-16 |
Family
ID=65584868
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2018/013602 WO2019093808A1 (ko) | 2017-08-14 | 2018-11-09 | 하드웨어 비트코인 지갑의 니모닉을 안전하게 저장하는 방법, 장치 및 컴퓨터 판독가능 기록 매체 |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR20190018377A (ko) |
WO (1) | WO2019093808A1 (ko) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022177201A1 (ko) * | 2021-02-22 | 2022-08-25 | 주식회사 블록체인기술연구소 | 키 백업 정보가 분산 저장된 개인키 관리 및 복구 시스템 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102446985B1 (ko) * | 2019-10-16 | 2022-09-26 | 주식회사 피어테크 | 암호화폐 지갑을 위한 키 관리 메커니즘 |
KR102314379B1 (ko) * | 2019-12-27 | 2021-10-19 | 주식회사 안랩 | 암호화폐 지갑 보안장치 및 암호화폐 지갑 보안방법 |
KR102172645B1 (ko) | 2020-08-11 | 2020-11-02 | 박용규 | 암호화폐 지갑의 니모닉 각인용 큐브 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140069466A (ko) * | 2012-11-29 | 2014-06-10 | 에스케이씨앤씨 주식회사 | 전자지갑 서비스를 위해 이중 인증하는 전자지갑 시스템 및 방법 |
KR20150050231A (ko) * | 2013-10-31 | 2015-05-08 | 한국전자통신연구원 | 폐쇄 도메인에서의 키 생성 장치 및 방법 |
KR101580514B1 (ko) * | 2015-06-22 | 2015-12-28 | (주) 시큐어가드 테크놀러지 | 시드 키를 이용한 패스워드 관리방법, 패스워드 관리장치 및 이를 적용한 컴퓨터로 읽을 수 있는 기록매체 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11222329B2 (en) | 2012-11-05 | 2022-01-11 | Mastercard International Incorporated | Electronic wallet apparatus, method, and computer program product |
-
2017
- 2017-11-10 KR KR1020170149072A patent/KR20190018377A/ko not_active Application Discontinuation
-
2018
- 2018-11-09 WO PCT/KR2018/013602 patent/WO2019093808A1/ko active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140069466A (ko) * | 2012-11-29 | 2014-06-10 | 에스케이씨앤씨 주식회사 | 전자지갑 서비스를 위해 이중 인증하는 전자지갑 시스템 및 방법 |
KR20150050231A (ko) * | 2013-10-31 | 2015-05-08 | 한국전자통신연구원 | 폐쇄 도메인에서의 키 생성 장치 및 방법 |
KR101580514B1 (ko) * | 2015-06-22 | 2015-12-28 | (주) 시큐어가드 테크놀러지 | 시드 키를 이용한 패스워드 관리방법, 패스워드 관리장치 및 이를 적용한 컴퓨터로 읽을 수 있는 기록매체 |
Non-Patent Citations (2)
Title |
---|
"CafeMochaHOT! HOT!", BITCOIN #1 -MAKING WALLET, 30 November 2013 (2013-11-30), XP055606883, Retrieved from the Internet <URL:http://ezam80.blogspot.com/2013/11/1.html> * |
NAPDEUKI STIMA: "Monero GUI Wallet #2 Opening and Exchange", TISTORY, 9 July 2017 (2017-07-09), XP055606876, Retrieved from the Internet <URL:https://www.cryptocoin.kr/entry/%EB%AA%A8%EB%84%A4%EB%A1%9C-Monero-GUI-%EC%A7%80%EA%B0%91-2-%EB%B6%88%EB%9F%AC%EC%98%A4%EA%B8%B0%EC%99%80-%EC%A3%BC%EA%B3%A0-%EB%B0%9B%EA%B8%B0> * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022177201A1 (ko) * | 2021-02-22 | 2022-08-25 | 주식회사 블록체인기술연구소 | 키 백업 정보가 분산 저장된 개인키 관리 및 복구 시스템 |
KR20220120059A (ko) * | 2021-02-22 | 2022-08-30 | 주식회사 블록체인기술연구소 | 키 백업 정보가 분산 저장된 개인키 관리 및 복구 시스템 |
KR102520066B1 (ko) | 2021-02-22 | 2023-04-10 | 주식회사 블록체인기술연구소 | 키 백업 정보가 분산 저장된 개인키 관리 및 복구 시스템 |
Also Published As
Publication number | Publication date |
---|---|
KR20190018377A (ko) | 2019-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019093808A1 (ko) | 하드웨어 비트코인 지갑의 니모닉을 안전하게 저장하는 방법, 장치 및 컴퓨터 판독가능 기록 매체 | |
EP3280090B1 (en) | User authentication method and device | |
US9294274B2 (en) | Technologies for synchronizing and restoring reference templates | |
KR20200090707A (ko) | 하나의 장치를 이용하여 다른 장치를 언로크하는 방법 | |
WO2017119564A1 (ko) | 본인인증용 정보 보안 전송시스템 및 방법 | |
RU2552166C2 (ru) | Способ и устройство для аутентификации вызов-ответ | |
EP2905925B1 (en) | System and method for remote access, Remote digital signature | |
TWI507005B (zh) | 虛擬用戶識別模組 | |
JP2009510644A (ja) | 安全な認証のための方法及び構成 | |
EP3694243A1 (en) | Method and device for network connection authentication | |
WO2013176491A1 (ko) | 웹 서비스 사용자 인증 방법 | |
JP2018038068A (ja) | 通信端末および関連システムのユーザーの識別情報を確認するための方法 | |
CN107113319A (zh) | 一种虚拟网络计算认证中应答的方法、装置、系统和代理服务器 | |
CN109067528A (zh) | 密码运算、创建工作密钥的方法、密码服务平台及设备 | |
CN108462710A (zh) | 认证授权方法、装置、认证服务器及机器可读存储介质 | |
JP2014504069A (ja) | 通信セッションを検証する方法、装置、およびシステム | |
WO2021190197A1 (zh) | 生物支付设备的认证方法、装置、计算机设备和存储介质 | |
US9887967B2 (en) | Portable security device, method for securing a data exchange and computer program product | |
CN109831311A (zh) | 一种服务器验证方法、系统、用户终端及可读存储介质 | |
CN107040501B (zh) | 基于平台即服务的认证方法和装置 | |
CN111163063B (zh) | 边缘应用管理方法及相关产品 | |
WO2017183799A1 (ko) | 데이터 확인 장치 및 이를 이용하여 데이터를 확인하는 방법 | |
JP6988525B2 (ja) | 登録システムおよび登録方法 | |
WO2016204700A1 (en) | System for secure transmission of voice communication via communication network and method of secure transmission of voice communication | |
CN114595465A (zh) | 数据加密处理方法、装置及电子设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18876059 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18876059 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25.01.2021) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18876059 Country of ref document: EP Kind code of ref document: A1 |