WO2020230695A1 - デジタルアセット譲渡方法、デジタルアセット譲渡装置、及びプログラム - Google Patents
デジタルアセット譲渡方法、デジタルアセット譲渡装置、及びプログラム Download PDFInfo
- Publication number
- WO2020230695A1 WO2020230695A1 PCT/JP2020/018545 JP2020018545W WO2020230695A1 WO 2020230695 A1 WO2020230695 A1 WO 2020230695A1 JP 2020018545 W JP2020018545 W JP 2020018545W WO 2020230695 A1 WO2020230695 A1 WO 2020230695A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- digital asset
- transfer
- database
- information
- private key
- Prior art date
Links
- 238000012546 transfer Methods 0.000 title claims abstract description 222
- 238000000034 method Methods 0.000 title claims abstract description 70
- 238000012545 processing Methods 0.000 claims description 75
- 230000010365 information processing Effects 0.000 claims description 44
- 230000008569 process Effects 0.000 claims description 19
- 238000004364 calculation method Methods 0.000 claims description 8
- 230000001343 mnemonic effect Effects 0.000 claims description 5
- 238000004891 communication Methods 0.000 description 56
- 238000010586 diagram Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 4
- 230000008520 organization Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 230000001151 other effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3678—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/223—Payment schemes or models based on the use of peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/363—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/16—Real estate
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
- G06Q50/186—Estate planning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
Definitions
- This disclosure relates to digital asset transfer methods, digital asset transfer devices, and programs.
- Non-Patent Document 1 services using peer-to-peer databases such as blockchain disclosed in Non-Patent Document 1 below have been developed.
- Bitcoin of Non-Patent Document 2 below which uses a blockchain for exchanging virtual currencies, can be mentioned.
- Services that use peer-to-peer databases such as blockchain can prevent falsification of data registered in peer-to-peer databases and ensure the authenticity of data. Due to this feature, services for managing assets using peer-to-peer databases have been developed. For example, services have been developed to manage digital assets such as virtual currencies and financial products by registering information on tokenized digital assets in a peer-to-peer database.
- Cold wallets such as hardware wallets have been developed to securely manage private keys.
- the cold wallet can securely manage the private key while isolated from the network.
- the existing technology it may not be possible to properly transfer the digital assets managed by the peer-to-peer database.
- the private key is not shared with other users (for example, heirs) in advance.
- the other user may not be able to receive the transfer of digital assets.
- the private key is shared with other users, the other users may not be able to properly transfer the digital assets due to lack of knowledge about the cold wallet.
- an object of the present invention is to more appropriately transfer the digital assets managed by the peer-to-peer database at the time of the death of the user.
- acquisition of death information of a user who owns a cold wallet identification of transfer conditions of digital assets registered in an account related to the cold wallet based on the death information, and the above-mentioned
- the registration data registered in the P2P database is signed with the private key associated with the cold wallet, and the private key used for the signature is used.
- a computer-executed method of transferring digital assets is provided with and with deletion.
- the user information processing unit that acquires the death information of the user who owns the cold wallet and the transfer conditions of the digital assets registered in the account related to the cold wallet based on the death information are specified.
- a registration data processing unit that signs the registration data registered in the P2P database using the private key related to the cold wallet in order to transfer the digital asset based on the transfer conditions.
- a digital asset transfer device comprising a key processing unit for deleting the private key used for the signature.
- the death information of the user who owns the cold wallet is acquired, and the transfer conditions of the digital assets registered in the account related to the cold wallet are specified based on the death information.
- the registration data registered in the P2P database is signed using the private key associated with the cold wallet, and the secret used for the signature.
- a program is provided to remove the key and make the computer realize.
- a decentralized peer-to-peer database included in the peer-to-peer network is used.
- the peer-to-peer network is sometimes called a peer-to-peer distributed file system.
- the peer-to-peer network will be referred to as a “P2P network” and the peer-to-peer database will be referred to as a “P2P database”.
- An example of a P2P database is a blockchain. Therefore, first, the outline of the blockchain will be described as an example of the P2P database.
- a blockchain is data in which a plurality of blocks are continuously included as if they were chains.
- one or more target data can be stored as transaction data (transaction).
- Examples of the blockchain include a public blockchain that is used for exchanging virtual currency data such as Bitcoin and can be used by an unspecified number of nodes.
- a consortium blockchain that can be used only by a specific plurality of nodes, a private blockchain that can be used only within a specific organization, and the like.
- Each block of the blockchain used for exchanging virtual currency data includes, for example, a hash of the immediately preceding block and a value called a nonce.
- the hash of the immediately preceding block is information used to determine whether or not the block is a "correct block" that is correctly connected to the immediately preceding block.
- the nonce is information used to prevent spoofing in authentication using a hash, and falsification is prevented by using the nonce.
- Examples of the nonce include a character string, a number string, data indicating a combination thereof, and the like.
- each transaction data in the blockchain is signed using the private key.
- each transaction data is made public and shared throughout the P2P network.
- FIG. 2 is a diagram showing how the target data is registered by the user A in the blockchain system.
- User A digitally signs the transaction data registered in the blockchain using the user A's private key. Then, the user A broadcasts the electronically signed transaction data on the P2P network. As a result, it is guaranteed that the owner of the target data included in the transaction data is user A.
- FIG. 3 is a diagram showing how the target data is transferred from user A to user B in the blockchain system.
- the user A digitally signs the transaction data using the user A's private key, and includes the user B's public key in the transaction data.
- the target data has been transferred from the user A to the user B.
- the user B may acquire the public key of the user A from the user A and acquire the target data included in the electronically signed transaction data when the target data is traded.
- FIG. 4 is a block diagram showing a configuration example of the information processing system according to the present embodiment.
- the information processing system according to the present embodiment includes a digital asset transfer device 100, a cold wallet 200, and a node device 300. Further, each of the plurality of node devices 300 is connected to the P2P network 400.
- the node device 300 is an information processing device that is connected to the P2P network 400 and has a P2P database.
- the node device 300 manages transaction data (registration data) related to digital assets in a P2P database.
- Digital assets are tokenized at least one of assets such as movables including virtual currency or financial products, and real estate.
- Tokenization refers to the conversion of these assets into some kind of information, regardless of the content or format of the converted information.
- the node device 300 manages transaction data (for example, the digital asset itself or information indicating the digital asset) related to the digital assets owned by each account of the user or the like in the P2P database, thereby falsifying the transaction data. It can be prevented and the authenticity of transaction data can be guaranteed.
- the node device 300 can perform processing related to the transfer of the digital asset based on the request from the digital asset transfer device 100. Specifically, the node device 300 generates transaction data for transfer of digital assets based on a request from the digital asset transfer device 100, signs the transaction data with a private key, and other node devices. Broadcast to 300. As a result, transaction data is registered in the P2P database of each node device 300 through processing based on a predetermined consensus algorithm such as Proof of Work.
- a predetermined consensus algorithm such as Proof of Work.
- the node device 300 executes a predetermined process when a predetermined digital asset is received by using a predetermined program (for example, a smart contract or the like) executed on the P2P database included in the node device 300. It is possible to execute a predetermined program such as By using the program, various processes including, for example, trading of digital assets are realized according to predetermined rules.
- a predetermined program provided in the P2P database and executed on the P2P database is referred to as a "P2P database program".
- the node device 300 may realize various processes by appropriately using a program other than the P2P database program.
- the cold wallet 200 manages the private key used for managing digital assets in a state of being isolated from the network.
- the cold wallet 200 is a hardware wallet in which information about a private key is recorded (for example, an IC card type hardware wallet or a terminal type hardware wallet), and a wallet in which information about a private key is written on the surface (for example, For example, it can be at least one of (for example, a paper wallet, etc.), and is not necessarily limited to these.
- the cold wallet 200 may be realized by storage isolated from the network or the like.
- the private key When a hot wallet that manages the private key is used while connected to the network, the private key may be leaked due to unauthorized access to the hot wallet, but the cold wallet 200 prevents the occurrence of unauthorized access. It is possible to prevent the leakage of the private key.
- the digital asset transfer device 100 is an information processing device that controls the transfer of digital assets managed in a P2P database under predetermined conditions such as when a user dies or when property is seized. Specifically, first, the digital asset transfer device 100 acquires the death information of the user who owns the cold wallet 200 from an external database or the like, and digitally registered in the account related to the cold wallet 200 based on the death information. Identify the terms of the asset transfer.
- “Death information” is some information indicating that the user has died. For example, information generated by various procedures that occur when a user dies is included in the death information. Specifically, when an account of a financial institution is frozen due to the death of a user, information indicating the freeze of the account is included in the death information. In this case, the digital asset transfer device 100 acquires death information by communication cooperation with an external device (for example, a server or the like) managed by a financial institution.
- an external device for example, a server or the like
- Transfer conditions are information about the digital assets to be transferred (for example, the amount of virtual currency, the amount converted in legal tender, the contents of financial products, or the contents of real estate, etc.), and the information about the conditions of transfer (for example, the contents of real estate). It includes information about the status of the heir, the use of the digital asset after the transfer, etc.) and information about the transferee (for example, information indicating the user or organization that is the heir).
- the digital asset transfer device 100 requests the node device 300 to generate transaction data to be registered in the P2P database in order to transfer the digital asset based on the transfer conditions. Further, the digital asset transfer device 100 may generate transaction data. After that, the digital asset transfer device 100 receives the transaction data generated by the node device 300, and signs the transaction data using the private key associated with the cold wallet 200. For example, the hardware wallet and the digital asset transfer device 100 may temporarily communicate with each other (for example, when the IC card type hardware wallet is held over the card reader, the communication cooperation with the digital asset transfer device 100 is performed, etc. ), The private key written on the surface of the paper wallet is manually input, so that the digital asset transfer device 100 acquires the private key and signs using the private key. Alternatively, the digital asset transfer device 100 may transmit the generated transaction data to the cold wallet 200, and the cold wallet 200 may sign the transaction data using the private key. In that case, the cold wallet 200 transmits the signed transaction data to the digital asset transfer device 100.
- the digital asset transfer device 100 transmits the signed transaction data to the node device 300 in order to register it in the P2P database. As a result, the signed transaction data is registered in the P2P database through processing based on a predetermined consensus algorithm. Further, the digital asset transfer device 100 deletes the private key used for the signature. As a result, the digital asset transfer device 100 can prevent the leakage of the private key. Further, the digital asset transfer device 100 may include the function of the node device 300, and the digital asset transfer device 100 may record the signed transaction data in the P2P database.
- the digital asset transfer device 100 realizes the transfer of digital assets
- the digital asset transfer device 100 does not necessarily have to transfer the digital assets.
- the digital asset transfer device 100 may perform various processes using the private key, such as restoring an account included in an existing wallet using the private key.
- the P2P network 400 is a network in which data registered in the P2P database is distributed. As described above, by connecting each node device 300 to the P2P network 400, the P2P database can be updated while maintaining consistency with the P2P database owned by the other node devices 300.
- the type of P2P network 400 is not particularly limited.
- the P2P network 400 may be of any type: a consortium type operated by a plurality of organizations, a private type operated by a single organization, or a public type in which participants are not particularly limited.
- the communication method and line type used for the P2P network 400 are not particularly limited.
- the P2P network 400 may be realized by a dedicated line network such as IP-VPN (Internet Protocol-Virtual Private Network).
- IP-VPN Internet Protocol-Virtual Private Network
- the P2P network 400 is realized by a public network such as the Internet, a telephone line network, a satellite communication network, and various LANs (Local Area Network) including Ethernet (registered trademark), WAN (Wide Area Network), and the like. May be good.
- the P2P network 400 may be realized by a wireless communication network such as Wi-Fi (registered trademark) or Bluetooth (registered trademark).
- the configuration example of the information processing system according to this embodiment has been described above.
- the above configuration described with reference to FIG. 4 is merely an example, and the configuration of the information processing system according to the present embodiment is not limited to such an example.
- some or all of the functions of the digital asset transfer device 100 may be realized by the node device 300.
- a part or all of the functions of the node device 300 may be realized by the digital asset transfer device 100.
- the configuration of the information processing system according to the present embodiment can be flexibly modified according to specifications and operations.
- FIG. 5 is a block diagram showing a functional configuration example of the digital asset transfer device 100.
- the digital asset transfer device 100 includes a control unit 110, a storage unit 120, and a communication unit 130.
- the control unit 110 includes a user information processing unit 111, a transfer condition processing unit 112, a registration data processing unit 113, and a key processing unit 114.
- the storage unit 120 includes a user information storage unit 121 and a transfer condition storage unit 122.
- the control unit 110 has a functional configuration that comprehensively controls all the processing performed by the digital asset transfer device 100.
- the control unit 110 controls the start and stop of each functional configuration based on the information received by the communication unit 130, the information input via the input unit (not shown), and the like, or the output unit (not shown). It is possible to control the output etc. by (none).
- the control content of the control unit 110 is not limited to these.
- the control unit 110 may control processes generally performed in various servers, general-purpose computers, PCs, tablet PCs, and the like (for example, processes related to an OS (Operating System) and the like).
- the user information processing unit 111 has a functional configuration for processing user information.
- the "user information" may be any information about the user (for example, the user's name, age, gender, address, occupation, financial institution account number, etc.), and includes at least death information.
- an external device for example, a user-owned smartphone
- the user information processing unit 111 uses the external device 111. These information are acquired by communication cooperation with and stored in the user information storage unit 121.
- the user information processing unit 111 obtains the death information of the user by communication cooperation with an external device (for example, a server) managed by the financial institution. It is acquired and the death information is provided to the transfer condition processing unit 112.
- an external device for example, a server
- the content of the user information is not necessarily limited to the above.
- the transfer condition processing unit 112 has a functional configuration for performing processing related to the transfer condition.
- the details of the transfer conditions are as described above.
- the transfer condition processing unit 112 acquires the transfer condition by communication cooperation with the external device and stores it in the transfer condition storage unit 122. To do.
- the transfer condition processing unit 112 provides the user's death information from the user information processing unit 111
- the transfer condition processing unit 112 is a digital asset (registered in the account related to the cold wallet 200 owned by the user) based on the death information.
- the transfer conditions of the above are specified, and the transfer conditions are provided to the registration data processing unit 113.
- the registration data processing unit 113 has a functional configuration for processing transaction data (registration data). Specifically, when the transfer condition is provided by the transfer condition processing unit 112, the registration data processing unit 113 generates information requesting the generation of transaction data (hereinafter, generation request) based on the transfer condition. The generation request is provided to the node device 300 via the communication unit 130. As a result, the node device 300 generates transaction data and provides the transaction data to the digital asset transfer device 100.
- the registration data processing unit 113 signs the transaction data registered in the P2P database in order to transfer the digital asset based on the transfer conditions, using the private key related to the cold wallet 200.
- the hardware wallet and the digital asset transfer device 100 may temporarily communicate with each other (for example, the IC card type hardware wallet is held over a card reader to perform communication cooperation), or on the surface of a paper wallet.
- the registration data processing unit 113 acquires the private key and signs using the private key.
- the registration data processing unit 113 provides the transaction data after the signature to the node device 300 via the communication unit 130.
- the signed transaction data can be registered in the P2P database after the node device 300 performs processing based on a predetermined consensus algorithm.
- the key processing unit 114 has a functional configuration for performing processing related to various keys. Specifically, the key processing unit 114 performs processing related to the private key. For example, after the registered data processing unit 113 signs the transaction data using the private key, the key processing unit 114 deletes the private key used for the signature. As a result, the key processing unit 114 can prevent the leakage of the private key.
- the private key does not necessarily have to be deleted.
- the storage unit 120 has a functional configuration for storing various types of information.
- the storage unit 120 stores a program or parameter used by each functional configuration of the digital asset transfer device 100, or stores transaction data provided by the node device 300.
- the information stored in the storage unit 120 is not limited to these.
- the user information storage unit 121 has a functional configuration for storing user information.
- the user information storage unit 121 stores the user's name, age, gender, address, occupation, financial institution account number, and the like provided by the user information processing unit 111 as user information.
- the transfer condition storage unit 122 has a functional configuration for storing transfer conditions.
- the transfer condition storage unit 122 contains information on the digital assets to be transferred (for example, the amount of virtual currency, the amount converted in legal tender, the contents of financial products, the contents of real estate, etc.), and the information on the conditions of transfer (for example).
- the state of the heir, the use of the digital asset after the transfer, etc.) and the information indicating the transferee are stored as the transfer conditions.
- the communication unit 130 has a functional configuration for performing various communications with the node device 300. For example, the communication unit 130 transmits a transaction data generation request to the node device 300, and receives the transaction data from the node device 300. Further, the communication unit 130 transmits the signed transaction data to the node device 300 after the transaction data is signed.
- the communication content of the communication unit 130 is not limited to these.
- the functional configuration example of the digital asset transfer device 100 has been described above.
- the above-mentioned functional configuration described with reference to FIG. 5 is merely an example, and the functional configuration of the digital asset transfer device 100 is not limited to such an example.
- the digital asset transfer device 100 does not necessarily have all of the functional configurations shown in FIG. 5, or may have functional configurations not shown in FIG.
- the functional configuration of the digital asset transfer device 100 can be flexibly modified according to specifications and operations.
- FIG. 6 is a block diagram showing a functional configuration example of the node device 300.
- the node device 300 includes a control unit 310, a P2P database 320, and a communication unit 330.
- the P2P database 320 includes a P2P database program 321.
- the control unit 310 has a functional configuration that comprehensively controls all the processing performed by the node device 300.
- the control unit 310 controls the transaction data generation process by inputting a transaction data generation request provided by the digital asset transfer device 100 into a predetermined program (for example, a program recorded in a memory). To do.
- the control unit 310 inputs the signed transaction data provided by the digital asset transfer device 100 into a predetermined program (for example, a program recorded in the memory), so that the P2P database 320 of the signed transaction data Control the process of registering with (in other words, control the process of transferring digital assets).
- the control content of the control unit 310 is not limited to these.
- the control unit 310 may control processes generally performed in various servers, general-purpose computers, PCs, tablet PCs, and the like (for example, processes related to the OS and the like).
- the P2P database 320 is a database held in the node device 300, and is, for example, a part of the blockchain. As described above, transaction data (for example, the digital asset itself or information indicating the digital asset) related to the digital asset owned by each account such as a user is registered in the P2P database 320. The data registered in the P2P database 320 is not limited to these. Further, various data registered in the P2P database 320 may be encrypted using an encryption key.
- the P2P database program 321 is a predetermined program provided in the P2P database 320 and executed on the P2P database 320. By using the P2P database program 321, various processes associated with the transfer of digital assets are realized while maintaining consistency according to predetermined rules. Further, by providing the P2P database program 321 in the P2P database 320, the risk of the program being tampered with is reduced.
- the P2P database program 321 may be a chain code or the like in Hyperledger, but is not necessarily limited to this. For example, the P2P database program 321 may point to a smart contract.
- the processing realized by the P2P database program 321 is not particularly limited.
- the development language of the P2P database program 321 or the number of P2P database programs 321 provided on the P2P database 320 is not particularly limited.
- the communication unit 330 has a functional configuration for controlling various communications with an external device. For example, regarding communication with the digital asset transfer device 100, the communication unit 330 receives a transaction data generation request from the node device 300 and transmits the transaction data to the digital asset transfer device 100. Further, the communication unit 330 receives the signed transaction data from the digital asset transfer device 100 after the transaction data is signed. Further, regarding communication with the other node device 300, the communication unit 330 transmits / receives information or the like used for updating the P2P database 320 (for example, information used for consensus). The communication content of the communication unit 330 is not limited to these.
- the functional configuration example of the node device 300 has been described above.
- a part or all of the functions of the digital asset transfer device 100 may be realized by the node device 300.
- at least one of the user information processing unit 111, the transfer condition processing unit 112, the registration data processing unit 113, and the key processing unit 114 of the digital asset transfer device 100 is provided in the P2P database 320 and is provided in the P2P database 320. It may be implemented by a predetermined program executed above, namely the P2P database program 321.
- the above functional configuration described with reference to FIG. 6 is merely an example, and the functional configuration of the node device 300 is not limited to such an example.
- the node device 300 does not necessarily have all of the functional configurations shown in FIG. 6, and may have functional configurations not shown in FIG.
- the functional configuration of the node device 300 can be flexibly modified according to the specifications and operation.
- FIG. 7 is a flowchart showing an example of a processing flow related to pre-registration for performing transfer processing of a digital asset due to the death of a user or the like.
- step S1000 the user information processing unit 111 of the digital asset transfer device 100 registers user information including account information of a financial institution. For example, when the name, age, gender, address, occupation, financial institution account number, etc. of the user who owns the cold wallet 200 are input to an external device (for example, a user-owned smartphone) as prior information, user information processing is performed.
- the unit 111 acquires such information by communication cooperation with an external device and stores it in the user information storage unit 121.
- the private key is managed in a state of being isolated from the network.
- the cold wallet 200 itself may be managed by a financial institution or the like, the same private key as the user-owned cold wallet 200, a part of the private key secretly shared by Shamir's Secret Sharing Law, or a multi-signature.
- a part of the private key used may be stored in a storage isolated from the network.
- the transfer condition processing unit 112 registers the transfer conditions of the digital asset. Specifically, when the transfer condition is input to an external device (for example, a user-owned smartphone or the like) as prior information, the transfer condition processing unit 112 acquires the transfer condition by communication cooperation with the external device, and the transfer condition is transferred. It is stored in the storage unit 122.
- each step in the flowchart of FIG. 7 does not necessarily have to be processed in chronological order in the order described. That is, each step in the flowchart may be processed in an order different from the order described or may be processed in parallel (the same applies to the sequence diagram of FIG. 8 described later).
- FIG. 8 is a sequence diagram showing an example of a processing flow relating to the transfer of digital assets.
- step S1100 the user information processing unit 111 of the digital asset transfer device 100 acquires the user's death information. For example, when an account of a financial institution is frozen due to the death of a user, the user information processing unit 111 obtains the death information of the user by communication cooperation with an external device (for example, a server) managed by the financial institution. get.
- an external device for example, a server
- step S1104 the transfer condition processing unit 112 specifies the transfer condition of the digital asset (registered in the account related to the cold wallet 200 owned by the user) based on the death information.
- step S1108 the registration data processing unit 113 generates a transaction data generation request based on the transfer condition, and provides the generation request to the node device 300 via the communication unit 130.
- step S1112 the control unit 310 of the node device 300 generates transaction data based on the transaction data generation request, and in step S1116, the transaction data is provided to the digital asset transfer device 100 via the communication unit 330.
- step S1120 the registration data processing unit 113 of the digital asset transfer device 100 acquires the private key from the cold wallet 200.
- the hardware wallet and the digital asset transfer device 100 may temporarily communicate with each other (for example, the IC card type hardware wallet is held over a card reader to perform communication cooperation with the digital asset transfer device 100, etc.). ),
- the registered data processing unit 113 acquires the private key by manually inputting the private key written on the surface of the paper wallet.
- the cold wallet 200 from which the registration data processing unit 113 acquires the private key is assumed to be managed by a financial institution or the like, for example, as described in step S1004 of FIG. That is, the private key (or at least a part of the distributed private key) is doubly managed by the deceased user, the financial institution, etc., and the registration data processing unit 113 acquires the private key from the financial institution, etc. ..
- step S1124 the registered data processing unit 113 signs the transaction data using the private key.
- step S1128 the registration data processing unit 113 provides the signed transaction data to the node device 300 via the communication unit 130.
- step S1132 the control unit 310 of the node device 300 registers the signed transaction data in the P2P database 320 by performing a process based on a predetermined consensus algorithm. As a result, the digital assets are properly transferred based on the transfer conditions.
- step S1136 the key processing unit 114 of the digital asset transfer device 100 deletes the private key used for signing. As a result, the key processing unit 114 can prevent the leakage of the private key. This completes a series of processes related to the transfer of digital assets.
- the private key described above may be a key in a so-called Hierarchy Deterministic wallet.
- FIG. 9 is a diagram showing a key structure in BIP32, which is a standard for a hierarchical deterministic wallet.
- each key is configured in a hierarchical manner.
- the key of the lower layer is generated by the calculation formula of the elliptic curve based on the key called Seed (seed) in the Master Seed layer (denoted as "S” in FIG. 9).
- seed seed
- S Master Seed layer
- the key below Seed is a reproducible derivative key generated based on Seed.
- a master key (denoted as “M” in FIG. 9) in the Master Node layer is generated from Seed.
- a child key in the Wallets / Acccounts layer (denoted as "M / 0" to "M / i” in FIG. 9) is generated from the master key, and another child key in the Wallet Chains layer (Fig. In 9, “M / 0/0” to "M / i / 1" are generated), and so on.
- the child key in the Adsresses layer (in FIG. 9, "M / 0 /") It can be generated from “0/0" to "M / i / 1 / k").
- the private key described above may be any one of all the keys from the Seed in the Master Seed layer to the child key in the Adlesses layer shown in FIG. That is, the secret key is at least one of the information used to generate another key by the elliptic curve calculation formula and the information generated from another key by the elliptic curve calculation formula.
- the user can use different keys properly according to the target or use of the digital asset. For example, the user can use one child key for the transfer of virtual currency and another child key for the transfer of real estate. By properly using different keys depending on the target or purpose of the digital asset, the damage caused by the leakage of some keys is limited.
- the Seed according to the present embodiment may be represented by a mnemonic code (ideographic code).
- the "mnemonic code” refers to some information (here, a private key including Seed) replaced with a simplified combination of letters or symbols so that a person can easily understand and describe it.
- the private key according to the present embodiment may be at least one of two or more private keys used for signatures performed for registering transaction data (registered data) in the P2P database 320.
- the private key according to the present embodiment is among the plurality of private keys used for the plurality of signatures. It may be at least one of them.
- the private key according to the present embodiment may be a part of the secret key that is secretly distributed by Shamir's Secret Sharing Law or the like.
- the digital asset transfer device 100 may perform processing related to the legal procedure required for the transfer of the digital asset according to the target of the digital asset. Specifically, the digital asset transfer device 100 provides information on legal procedures required for the transfer of digital assets (for example, the contents of data used in legal procedures and the destination of the data) of the digital assets. It is recognized for each object. Then, the digital asset transfer device 100 not only realizes the registration of the signed transaction data in the P2P database 320, but also requests information (hereinafter, a predetermined legal procedure such as registration) according to the target of the digital asset. (Procedure request) is generated, and the procedure request is provided to a predetermined external device that performs a statutory procedure via the communication unit 130. The transfer of digital assets is legally realized by the external device performing legal procedures.
- a predetermined legal procedure such as registration
- the legal procedure itself required for the transfer of digital assets may be realized by a P2P database such as a blockchain.
- the digital asset transfer device 100 requests the device that holds the P2P database to generate transaction data.
- the digital asset may be transferred to a transferee account after being transferred to a certain account by registering transaction data (registration data) in the P2P database 320.
- a digital asset is once transferred to an account of a financial institution that controls the transfer process, and is transferred to the transferee account after various procedures (for example, evaluation of the digital asset, tax processing, registration, etc.) are completed. May be good.
- the private key is properly managed by the cold wallet 200, the possibility of the private key being leaked is low, but if the private key is leaked to a third party, the digital asset is before the transfer. It may be illegally acquired by a third party. Therefore, as described above, such a risk can be prevented by temporarily transferring the digital asset to an account of a financial institution or the like before the transfer.
- the type of account to which digital assets are transferred before transfer is not particularly limited.
- a digital asset is a tokenized form of at least one of movable property including virtual currency or financial product, and real estate.
- the content of the digital asset is not necessarily limited to these, and some information about the user may be tokenized, such as personal information.
- the personal information itself or the information indicating the personal information may be appropriately encrypted and registered in the P2P database 320. Then, this information may be transferred to one or more other users or the like based on the transfer conditions by the digital asset transfer device 100 after the death of the user.
- Personal information has an increasing utility value for various businesses such as behavior history, purchase history, search history, and the like.
- the personal information itself or the information indicating the personal information is registered in the P2P database 320, and the digital asset transfer device 100 transfers the information after the death of the user, so that the user can transfer the personal information. It can be managed appropriately and used as an asset. It does not matter whether the personal information after the transfer is operated according to the transfer conditions set before the user dies or according to the intention of the transferee user. For example, if a transfer condition is set that personal information is not disclosed to anyone other than the transferee user, the personal information after the transfer is operated without being disclosed to anyone other than the transferee user according to this transfer condition. It does not matter whether it is open to the public or operated if the transferee user permits it.
- FIG. 10 is a block diagram showing a hardware configuration example of the information processing device 900 that realizes the digital asset transfer device 100 or the node device 300.
- the information processing device 900 includes, for example, an MPU 901, a ROM 902, a RAM 903, a recording medium 904, an input / output interface 905, an operation input device 906, a display device 907, and a communication interface 908. Further, the information processing apparatus 900 connects each component with, for example, a bus 909 as a data transmission path.
- the MPU 901 is composed of, for example, one or more processors composed of arithmetic circuits such as MPU, various processing circuits, and the like, and serves as a control unit 110 of the digital asset transfer device 100 or a control unit 310 of the node device 300. Function. Note that these functional configurations may be configured by a dedicated (or general-purpose) circuit (for example, a processor separate from the MPU 901) capable of realizing the various processes described above.
- the ROM 902 stores control data such as programs and calculation parameters used by the MPU 901.
- the RAM 903 temporarily stores, for example, a program executed by the MPU 901.
- the recording medium 904 functions as a storage unit 120 of the digital asset transfer device 100 or a P2P database 320 of the node device 300, and stores various data such as information processing data and various programs according to the present embodiment.
- examples of the recording medium 904 include a magnetic recording medium such as a hard disk and a non-volatile memory such as a flash memory. Further, the recording medium 904 may be detachable from the information processing device 900.
- the input / output interface 905 connects, for example, an operation input device 906 and a display device 907.
- examples of the input / output interface 905 include a USB (Universal Serial Bus) terminal, a DVI (Digital Visual Interface) terminal, an HDMI (High-Definition Multimedia Interface) (registered trademark) terminal, and various processing circuits. ..
- the operation input device 906 is provided on the information processing device 900, for example, and is connected to the input / output interface 905 inside the information processing device 900.
- Examples of the operation input device 906 include a keyboard, a mouse, a keypad, a touch panel, a microphone, an operation button, a rotary selector such as a direction key or a jog dial, or a combination thereof.
- the display device 907 is provided on the information processing device 900, for example, and is connected to the input / output interface 905 inside the information processing device 900.
- Examples of the display device 907 include a liquid crystal display (Liquid Crystal Display) and an organic EL display (Organic Electro-Luminence Display).
- the input / output interface 905 can be connected to an external device such as an external operation input device or an external display device of the information processing device 900.
- the display device 907 may be a device capable of displaying and operating the user, such as a touch panel.
- the communication interface 908 is a communication means included in the information processing device 900, and functions as a communication unit 130 of the digital asset transfer device 100 or a communication unit 330 of the node device 300. Further, the communication interface 908 may have a function of communicating wirelessly or by wire with an arbitrary external device such as a server via an arbitrary network (or directly).
- examples of the communication interface 908 include a communication antenna and an RF (Radio Frequency) circuit (wireless communication), an IEEE802.5.1 port and a transmission / reception circuit (wireless communication), an IEEE802.11 port and a transmission / reception circuit (wireless communication). ), LAN (Local Area Network) terminal, transmission / reception circuit (wired communication), and the like.
- the hardware configuration of the information processing device 900 is not limited to the configuration shown in FIG.
- the information processing device 900 does not have to include the communication interface 908 when communicating via an external communication device to which the information processing device 900 is connected.
- the communication interface 908 may have a configuration capable of performing communication by a plurality of communication methods.
- the information processing device 900 may not include, for example, an operation input device 906 or a display device 907.
- a part or all of the configuration shown in FIG. 10 may be realized by one or two or more ICs (Integrated Circuits).
- the digital asset transfer device 100 acquires the death information of the user who owns the cold wallet 200, and transfers the digital assets registered in the account related to the cold wallet 200 based on the death information. Identify the conditions. Further, the digital asset transfer device 100 signs the transaction data registered in the P2P database 320 using the private key related to the cold wallet 200 in order to transfer the digital assets based on the transfer conditions. Then, the digital asset transfer device 100 transmits the signed transaction data to the node device 300 in order to register it in the P2P database 320. As a result, the digital asset transfer device 100 can appropriately transfer the digital asset. Finally, the digital asset transfer device 100 deletes the private key used for signing. As a result, the digital asset transfer device 100 can prevent the leakage of the private key.
- the following configurations also belong to the technical scope of the present disclosure.
- the registration data registered in the P2P database is signed with the private key associated with the cold wallet.
- a method of transferring digital assets performed by a computer.
- (2) The signed registration data is transmitted to an external device for registration in the P2P database.
- (3) The death information is acquired by communicating with an external device managed by a financial institution.
- the cold wallet is at least one of a hardware wallet in which information about the private key is recorded and a wallet in which information about the private key is written on the surface.
- the digital asset transfer method according to any one of (1) to (3) above.
- the target of the digital asset is at least one of movables including virtual currency or financial products, and real estate.
- the digital asset transfer method according to any one of (1) to (4) above. (6) Processes related to legal procedures required for the transfer of the digital asset according to the subject of the digital asset.
- the secret key is at least one of information used to generate another key by the elliptic curve calculation formula and information generated from another key by the elliptic curve calculation formula.
- the digital asset transfer method according to any one of (1) to (6) above.
- the private key is represented by a mnemonic code.
- the digital asset transfer method according to any one of (1) to (7) above.
- the private key is at least one of two or more private keys used for the signature performed for the registration data to be registered in the P2P database.
- the digital asset transfer method according to any one of (1) to (8) above.
- the digital asset is transferred to a certain account and then to the transferee account by registering the registration data in the P2P database.
- the digital asset transfer method according to any one of (1) to (9) above.
- At least a part of the processing is realized by a predetermined program provided in the P2P database and executed on the P2P database.
- the digital asset transfer method according to any one of (1) to (10) above.
- the P2P database is realized by blockchain.
- the user information processing department that acquires the death information of the user who owns the cold wallet,
- a transfer condition processing unit that specifies transfer conditions for digital assets registered in the account related to the cold wallet based on the death information.
- a registration data processing unit that signs the registration data registered in the P2P database using the private key associated with the cold wallet in order to transfer the digital asset based on the transfer conditions.
- a key processing unit for deleting the private key used for the signature is provided.
- Digital asset transfer device Digital asset transfer device.
- Control unit 111 User information processing unit 112 Transfer condition processing unit 113 Registered data processing unit 114 Key processing unit 120 Storage unit 121 User information storage unit 122 Transfer condition storage unit 130 Communication unit 200 Cold wallet 300 Node device 310 Control unit 320 P2P database 321 P2P database program 330 Communication unit 400 P2P network
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Tourism & Hospitality (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Marketing (AREA)
- Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Human Resources & Organizations (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Operations Research (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
1.ピアツーピアデータベースの概要
2.実施形態
2.1.システム構成例
2.2.デジタルアセット譲渡装置の機能構成例
2.3.ノード装置の機能構成例
2.4.処理フロー例
2.5.備考
3.ハードウェア構成例
4.むすび
本開示の一実施形態について説明する前に、まず、ピアツーピアデータベースの概要について説明する。
上記では、P2Pデータベースの概要について説明した。続いて、本開示の一実施形態について説明する。
図4を参照して、本実施形態に係る情報処理システムの構成例について説明する。図4は、本実施形態に係る情報処理システムの構成例を示すブロック図である。図4に示すように、本実施形態に係る情報処理システムは、デジタルアセット譲渡装置100と、コールドウォレット200と、ノード装置300と、を備える。また、複数のノード装置300は、それぞれP2Pネットワーク400に接続している。
ノード装置300は、P2Pネットワーク400に接続しており、P2Pデータベースを保有している情報処理装置である。ノード装置300は、デジタルアセットに関するトランザクションデータ(登録データ)をP2Pデータベースにて管理している。
コールドウォレット200は、デジタルアセットの管理に用いられる秘密鍵をネットワークから隔離された状態で管理するものである。例えば、コールドウォレット200は、秘密鍵に関する情報が記録されたハードウェアウォレット(例えば、ICカード型ハードウェアウォレット、又は端末型ハードウェアウォレット等)、及び秘密鍵に関する情報が表面に記載されたウォレット(例えば、ペーパーウォレット等)のうちの少なくともいずれか一つであり得、かつ、必ずしもこれらに限定されない。例えば、コールドウォレット200は、ネットワークから隔離されたストレージ等によって実現されてもよい。ネットワークと接続された状態で秘密鍵を管理するホットウォレットが用いられる場合、ホットウォレットへの不正アクセスにより秘密鍵が漏洩する可能性があるが、コールドウォレット200は、不正アクセスの発生を防ぐことにより秘密鍵の漏洩を防ぐことができる。
デジタルアセット譲渡装置100は、ユーザの死亡時や財産の取り押さえ時等の所定の条件下において、P2Pデータベースで管理されているデジタルアセットの譲渡を制御する情報処理装置である。具体的には、まず、デジタルアセット譲渡装置100は、コールドウォレット200を所有するユーザの死亡情報を外部データベース等から取得し、当該死亡情報に基づいてコールドウォレット200に関連するアカウントに登録されたデジタルアセットの譲渡条件を特定する。
P2Pネットワーク400は、P2Pデータベースに登録されたデータが流通しているネットワークである。上記のとおり、各ノード装置300は、P2Pネットワーク400に接続することで、他のノード装置300が保有するP2Pデータベースと整合性を保ちながら、P2Pデータベースを更新することができる。
上記では、本実施形態に係る情報処理システムの構成例について説明した。続いて、図5を参照して、デジタルアセット譲渡装置100の機能構成例について説明する。図5は、デジタルアセット譲渡装置100の機能構成例を示すブロック図である。
上記では、デジタルアセット譲渡装置100の機能構成例について説明した。続いて、図6を参照して、ノード装置300の機能構成例について説明する。図6は、ノード装置300の機能構成例を示すブロック図である。
上記では、ノード装置300の機能構成例について説明した。続いて、情報処理システムにおける各装置の処理フロー例について説明する。
図7は、ユーザの死亡等に伴うデジタルアセットの譲渡処理を行うための事前登録に関する処理フロー例を示すフローチャートである。
図8は、デジタルアセットの譲渡に関する処理フロー例を示すシーケンス図である。
上記では、情報処理システムにおける各装置の処理フロー例について説明した。続いて、本実施形態に係るその他の事項について説明する。
上記で説明してきた秘密鍵は、いわゆる階層的決定性(Hierarchy Deterministic)ウォレットにおける鍵であってもよい。
本実施形態のように資産がデジタルアセットとしてP2Pデータベース320で管理される場合、デジタルアセットの対象に応じて法的手続きも考慮することが求められる場合がある。例えば、デジタルアセットの対象が不動産である場合、物権の得喪及び変更は、不動産の登記法その他の登記に関する法律の定めるところに従い登記が行われなければ、第三者に対抗することができない。不動産に限らず、動産であっても所定の法律に従い所定の法的手続きが求められる場合があることは言うまでもない(例えば、自動車の名義変更手続き等)。
デジタルアセットは、P2Pデータベース320にトランザクションデータ(登録データ)が登録されることにより、あるアカウントへ移行された後に譲渡先のアカウントへ移行されてもよい。例えば、デジタルアセットは、譲渡処理を制御する金融機関等のアカウントへ一旦移行され、諸手続き(例えば、デジタルアセットの評価、税務処理、又は登記等)が完了した後に譲渡先のアカウントへ移行されてもよい。
上記では、デジタルアセットが、仮想通貨又は金融商品を含む動産、及び不動産のうちの少なくともいずれか一つがトークン化されたものである旨を説明した。ここで、デジタルアセットの内容は必ずしもこれらに限定されず、例えば個人情報等のように、ユーザに関する何らかの情報がトークン化されたものであってもよい。具体的には、個人情報自体、又は個人情報を示す情報は適宜暗号化されてP2Pデータベース320に登録されていてもよい。そして、これらの情報は、ユーザの死後にデジタルアセット譲渡装置100によって譲渡条件に基づいて1又は2以上の他のユーザ等に対して譲渡されてもよい。
上記では、本実施形態に係るその他の機能について説明した。続いて、図10を参照して、各装置のハードウェア構成について説明する。図10は、デジタルアセット譲渡装置100又はノード装置300を実現する情報処理装置900のハードウェア構成例を示すブロック図である。
以上で説明してきたように、デジタルアセット譲渡装置100は、コールドウォレット200を所有するユーザの死亡情報を取得し、当該死亡情報に基づいてコールドウォレット200に関連するアカウントに登録されたデジタルアセットの譲渡条件を特定する。また、デジタルアセット譲渡装置100は、譲渡条件に基づいてデジタルアセットを譲渡するために、P2Pデータベース320に登録されるトランザクションデータにコールドウォレット200に関連する秘密鍵を用いて署名を行う。そして、デジタルアセット譲渡装置100は、署名済みのトランザクションデータを、P2Pデータベース320に登録するためにノード装置300に送信する。これにより、デジタルアセット譲渡装置100は、デジタルアセットを適切に譲渡することができる。最後に、デジタルアセット譲渡装置100は、署名に使用された秘密鍵を削除する。これにより、デジタルアセット譲渡装置100は、当該秘密鍵の漏洩を防ぐことができる。
(1)
コールドウォレットを所有するユーザの死亡情報を取得することと、
前記死亡情報に基づいて前記コールドウォレットに関連するアカウントに登録されたデジタルアセットの譲渡条件を特定することと、
前記譲渡条件に基づいて前記デジタルアセットを譲渡するために、P2Pデータベースに登録される登録データに前記コールドウォレットに関連する秘密鍵を用いて署名を行うことと、
前記署名に使用された前記秘密鍵を削除することと、を有する、
コンピュータにより実行されるデジタルアセット譲渡方法。
(2)
前記署名済みの前記登録データを、前記P2Pデータベースに登録するために外部装置に送信する、
前記(1)に記載のデジタルアセット譲渡方法。
(3)
金融機関により管理される外部装置との通信連携により前記死亡情報を取得する、
前記(1)又は(2)に記載のデジタルアセット譲渡方法。
(4)
前記コールドウォレットは、前記秘密鍵に関する情報が記録されたハードウェアウォレット、及び前記秘密鍵に関する情報が表面に記載されたウォレットのうちの少なくともいずれか一つである、
前記(1)から(3)のいずれか1項に記載のデジタルアセット譲渡方法。
(5)
前記デジタルアセットの対象は、仮想通貨又は金融商品を含む動産、及び不動産のうちの少なくともいずれか一つである、
前記(1)から(4)のいずれか1項に記載のデジタルアセット譲渡方法。
(6)
前記デジタルアセットの対象に応じて、前記デジタルアセットの譲渡に求められる法的手続きに関する処理を行う、
前記(5)に記載のデジタルアセット譲渡方法。
(7)
前記秘密鍵は、楕円曲線の計算式により別の鍵の生成に用いられる情報、及び前記楕円曲線の計算式により別の鍵から生成される情報のうちの少なくともいずれか一方である、
前記(1)から(6)のいずれか1項に記載のデジタルアセット譲渡方法。
(8)
前記秘密鍵は、ニーモニックコードで表される、
前記(1)から(7)のいずれか1項に記載のデジタルアセット譲渡方法。
(9)
前記秘密鍵は、前記登録データが前記P2Pデータベースに登録されるために行われる前記署名に用いられる二以上の秘密鍵のうちの少なくともいずれか一つである、
前記(1)から(8)のいずれか1項に記載のデジタルアセット譲渡方法。
(10)
前記デジタルアセットは、前記P2Pデータベースに前記登録データが登録されることにより、あるアカウントへ移行された後に譲渡先のアカウントへ移行される、
前記(1)から(9)のいずれか1項に記載のデジタルアセット譲渡方法。
(11)
処理の少なくとも一部が、前記P2Pデータベースに設けられ前記P2Pデータベース上で実行される所定のプログラムにより実現される、
前記(1)から(10)のいずれか1項に記載のデジタルアセット譲渡方法。
(12)
前記P2Pデータベースはブロックチェーンにより実現される、
前記(1)から(11)のいずれか1項に記載のデジタルアセット譲渡方法。
(13)
コールドウォレットを所有するユーザの死亡情報を取得するユーザ情報処理部と、
前記死亡情報に基づいて前記コールドウォレットに関連するアカウントに登録されたデジタルアセットの譲渡条件を特定する譲渡条件処理部と、
前記譲渡条件に基づいて前記デジタルアセットを譲渡するために、P2Pデータベースに登録される登録データに前記コールドウォレットに関連する秘密鍵を用いて署名を行う登録データ処理部と、
前記署名に使用された前記秘密鍵を削除する鍵処理部と、を備える、
デジタルアセット譲渡装置。
(14)
コールドウォレットを所有するユーザの死亡情報を取得することと、
前記死亡情報に基づいて前記コールドウォレットに関連するアカウントに登録されたデジタルアセットの譲渡条件を特定することと、
前記譲渡条件に基づいて前記デジタルアセットを譲渡するために、P2Pデータベースに登録される登録データに前記コールドウォレットに関連する秘密鍵を用いて署名を行うことと、
前記署名に使用された前記秘密鍵を削除することと、
をコンピュータに実現させるためのプログラム。
110 制御部
111 ユーザ情報処理部
112 譲渡条件処理部
113 登録データ処理部
114 鍵処理部
120 記憶部
121 ユーザ情報記憶部
122 譲渡条件記憶部
130 通信部
200 コールドウォレット
300 ノード装置
310 制御部
320 P2Pデータベース
321 P2Pデータベースプログラム
330 通信部
400 P2Pネットワーク
Claims (14)
- コールドウォレットを所有するユーザの死亡情報を取得することと、
前記死亡情報に基づいて前記コールドウォレットに関連するアカウントに登録されたデジタルアセットの譲渡条件を特定することと、
前記譲渡条件に基づいて前記デジタルアセットを譲渡するために、P2Pデータベースに登録される登録データに前記コールドウォレットに関連する秘密鍵を用いて署名を行うことと、
前記署名に使用された前記秘密鍵を削除することと、を有する、
コンピュータにより実行されるデジタルアセット譲渡方法。 - 前記署名済みの前記登録データを、前記P2Pデータベースに登録するために外部装置に送信する、
請求項1に記載のデジタルアセット譲渡方法。 - 金融機関により管理される外部装置との通信連携により前記死亡情報を取得する、
請求項1に記載のデジタルアセット譲渡方法。 - 前記コールドウォレットは、前記秘密鍵に関する情報が記録されたハードウェアウォレット、及び前記秘密鍵に関する情報が表面に記載されたウォレットのうちの少なくともいずれか一つである、
請求項1に記載のデジタルアセット譲渡方法。 - 前記デジタルアセットの対象は、仮想通貨又は金融商品を含む動産、及び不動産のうちの少なくともいずれか一つである、
請求項1に記載のデジタルアセット譲渡方法。 - 前記デジタルアセットの対象に応じて、前記デジタルアセットの譲渡に求められる法的手続きに関する処理を行う、
請求項5に記載のデジタルアセット譲渡方法。 - 前記秘密鍵は、楕円曲線の計算式により別の鍵の生成に用いられる情報、及び前記楕円曲線の計算式により別の鍵から生成される情報のうちの少なくともいずれか一方である、
請求項1に記載のデジタルアセット譲渡方法。 - 前記秘密鍵は、ニーモニックコードで表される、
請求項1に記載のデジタルアセット譲渡方法。 - 前記秘密鍵は、前記登録データが前記P2Pデータベースに登録されるために行われる前記署名に用いられる二以上の秘密鍵のうちの少なくともいずれか一つである、
請求項1に記載のデジタルアセット譲渡方法。 - 前記デジタルアセットは、前記P2Pデータベースに前記登録データが登録されることにより、あるアカウントへ移行された後に譲渡先のアカウントへ移行される、
請求項1に記載のデジタルアセット譲渡方法。 - 処理の少なくとも一部が、前記P2Pデータベースに設けられ前記P2Pデータベース上で実行される所定のプログラムにより実現される、
請求項1に記載のデジタルアセット譲渡方法。 - 前記P2Pデータベースはブロックチェーンにより実現される、
請求項1に記載のデジタルアセット譲渡方法。 - コールドウォレットを所有するユーザの死亡情報を取得するユーザ情報処理部と、
前記死亡情報に基づいて前記コールドウォレットに関連するアカウントに登録されたデジタルアセットの譲渡条件を特定する譲渡条件処理部と、
前記譲渡条件に基づいて前記デジタルアセットを譲渡するために、P2Pデータベースに登録される登録データに前記コールドウォレットに関連する秘密鍵を用いて署名を行う登録データ処理部と、
前記署名に使用された前記秘密鍵を削除する鍵処理部と、を備える、
デジタルアセット譲渡装置。 - コールドウォレットを所有するユーザの死亡情報を取得することと、
前記死亡情報に基づいて前記コールドウォレットに関連するアカウントに登録されたデジタルアセットの譲渡条件を特定することと、
前記譲渡条件に基づいて前記デジタルアセットを譲渡するために、P2Pデータベースに登録される登録データに前記コールドウォレットに関連する秘密鍵を用いて署名を行うことと、
前記署名に使用された前記秘密鍵を削除することと、
をコンピュータに実現させるためのプログラム。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/605,142 US20220351188A1 (en) | 2019-05-16 | 2020-05-07 | Digital asset transfer method, digital asset transfer device, and program |
EP20806495.6A EP3972189A4 (en) | 2019-05-16 | 2020-05-07 | DIGITAL ASSETS TRANSFER METHOD, DIGITAL ASSETS TRANSFER DEVICE, AND PROGRAM |
JP2021519396A JP7537429B2 (ja) | 2019-05-16 | 2020-05-07 | デジタルアセット譲渡方法、デジタルアセット譲渡装置、及びプログラム |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2019-093090 | 2019-05-16 | ||
JP2019093090 | 2019-05-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020230695A1 true WO2020230695A1 (ja) | 2020-11-19 |
Family
ID=73289402
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2020/018545 WO2020230695A1 (ja) | 2019-05-16 | 2020-05-07 | デジタルアセット譲渡方法、デジタルアセット譲渡装置、及びプログラム |
Country Status (4)
Country | Link |
---|---|
US (1) | US20220351188A1 (ja) |
EP (1) | EP3972189A4 (ja) |
JP (1) | JP7537429B2 (ja) |
WO (1) | WO2020230695A1 (ja) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7424294B2 (ja) * | 2018-09-04 | 2024-01-30 | ソニーグループ株式会社 | Icカード、処理方法、および情報処理システム |
US11669812B2 (en) * | 2020-06-05 | 2023-06-06 | Serge M Krasnyansky | Contingent payments for virtual currencies |
US20240020779A1 (en) * | 2022-04-14 | 2024-01-18 | Bquest, Llc | Method and system of digitally securing and transferring assets |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018515048A (ja) * | 2015-04-06 | 2018-06-07 | ビットマーク, インコーポレイテッドBitmark, Inc. | 非集中型のタイトル記録および認証のためのシステムならびに方法 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB201710176D0 (en) | 2017-06-26 | 2017-08-09 | Nchain Holdings Ltd | Computer-implemented system and method |
US20190034919A1 (en) * | 2017-12-29 | 2019-01-31 | Intel Corporation | Securing Electronic Wallet Transactions |
KR102656546B1 (ko) * | 2018-02-15 | 2024-04-12 | 갤럭시 디지털 트레이딩 엘엘씨 | 암호화폐 지갑 및 암호화폐 계좌 관리 |
US11157898B2 (en) | 2018-03-30 | 2021-10-26 | Health Alliance Management, LLC | Systems and methods for peer-to-peer transmission of digital assets |
US20190354970A1 (en) * | 2018-05-15 | 2019-11-21 | Decentral Inc. | Cryptographic transaction signing devices and methods therefor |
US11381392B2 (en) * | 2018-05-15 | 2022-07-05 | Mfe Capital, Llc | Device for off-line storage and usage of digital assets |
WO2019224719A1 (en) * | 2018-05-25 | 2019-11-28 | Bitfi, Inc. | Secure multiple cryptocurrency wallet and methods of use thereof |
EP3830779A1 (en) * | 2018-08-03 | 2021-06-09 | Salamantex GmbH | Processing system for processing cryptocurrencies and method for processing cryptocurrencies |
JP6532581B1 (ja) | 2018-08-28 | 2019-06-19 | 株式会社リップル・マーク | 仮想通貨管理システム、仮想通貨管理方法及び仮想通貨管理プログラム |
US20200193420A1 (en) * | 2018-09-04 | 2020-06-18 | Bit Key, Inc. | Data management systems and methods |
US11456869B2 (en) * | 2019-12-16 | 2022-09-27 | The Toronto-Dominion Bank | Secure management of transfers of digital assets between computing devices using permissioned distributed ledgers |
-
2020
- 2020-05-07 JP JP2021519396A patent/JP7537429B2/ja active Active
- 2020-05-07 EP EP20806495.6A patent/EP3972189A4/en active Pending
- 2020-05-07 WO PCT/JP2020/018545 patent/WO2020230695A1/ja active Application Filing
- 2020-05-07 US US17/605,142 patent/US20220351188A1/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018515048A (ja) * | 2015-04-06 | 2018-06-07 | ビットマーク, インコーポレイテッドBitmark, Inc. | 非集中型のタイトル記録および認証のためのシステムならびに方法 |
Non-Patent Citations (3)
Title |
---|
ANDREAS M. ANTONOPOULOS: "Mastering Bitcoin", 1 December 2014, O'REILLY MEDIA |
MELANIE SWAN: "Blockchain", vol. 01 -22, 2015, O'REILLY MEDIA |
See also references of EP3972189A4 |
Also Published As
Publication number | Publication date |
---|---|
EP3972189A4 (en) | 2022-06-15 |
JP7537429B2 (ja) | 2024-08-21 |
EP3972189A1 (en) | 2022-03-23 |
US20220351188A1 (en) | 2022-11-03 |
JPWO2020230695A1 (ja) | 2020-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6302592B2 (ja) | 情報処理装置、情報処理方法およびプログラム | |
US10691835B1 (en) | Verifying integrity of data stored in a consortium blockchain using a public sidechain | |
EP3566391B1 (en) | Parallel execution of transactions in a blockchain network based on smart contract whitelists | |
EP3598336B1 (en) | Information processing device and information processing method | |
US11151559B2 (en) | Blockchain-based remittance method and apparatus | |
CN110881063B (zh) | 一种隐私数据的存储方法、装置、设备及介质 | |
WO2020230695A1 (ja) | デジタルアセット譲渡方法、デジタルアセット譲渡装置、及びプログラム | |
CN110520884A (zh) | 基于可信执行环境的链外智能合约服务 | |
JP2020108044A (ja) | トークン管理システムおよびトークン管理方法 | |
JP6709243B2 (ja) | 情報処理装置 | |
US11423473B2 (en) | Blockchain-based leasing | |
JP2017207979A (ja) | 改ざん検知システム、及び改ざん検知方法 | |
WO2019119632A1 (zh) | 基于区块链的多账本转账方法、电子装置及可读存储介质 | |
KR102125042B1 (ko) | 블록체인 네트워크를 구성하는 노드 장치 및 그 노드 장치의 동작 방법 | |
WO2019158027A1 (zh) | 使用待交换数据来执行机器学习的方法、设备和系统 | |
JP2021103342A (ja) | 情報処理装置、情報処理方法、およびプログラム | |
Shah et al. | M-DPS: a blockchain-based efficient and cost-effective architecture for medical applications | |
US20210064782A1 (en) | Information processing apparatus, information processing method, and program | |
JP2020021205A (ja) | 情報処理方法、情報処理装置、およびプログラム | |
CN111095253A (zh) | 信息处理设备、信息处理方法以及程序 | |
US11354309B2 (en) | Information processing apparatus and information processing method | |
JP2019046262A (ja) | 情報処理装置、情報処理方法、及び情報処理プログラム | |
JP7327384B2 (ja) | 情報処理装置、情報処理方法、およびプログラム | |
Ahmed et al. | Augmenting security and accountability within the eHealth Exchange | |
WO2018211834A1 (ja) | 情報処理装置および情報処理方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20806495 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2021519396 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2020806495 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2020806495 Country of ref document: EP Effective date: 20211216 |