WO2023154419A3 - Access control systems and methods for cryptowallets - Google Patents

Access control systems and methods for cryptowallets Download PDF

Info

Publication number
WO2023154419A3
WO2023154419A3 PCT/US2023/012738 US2023012738W WO2023154419A3 WO 2023154419 A3 WO2023154419 A3 WO 2023154419A3 US 2023012738 W US2023012738 W US 2023012738W WO 2023154419 A3 WO2023154419 A3 WO 2023154419A3
Authority
WO
WIPO (PCT)
Prior art keywords
methods
access control
wallet
crypto
cryptowallets
Prior art date
Application number
PCT/US2023/012738
Other languages
French (fr)
Other versions
WO2023154419A2 (en
Inventor
Nabil Wasily
Michael Atef Ayoub
Original Assignee
Thirdwayv, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thirdwayv, Inc. filed Critical Thirdwayv, Inc.
Priority to EP23753452.4A priority Critical patent/EP4476674A2/en
Priority to CN202380020879.3A priority patent/CN118696327A/en
Priority to JP2024547219A priority patent/JP2025506141A/en
Priority to AU2023219009A priority patent/AU2023219009A1/en
Priority to US18/726,280 priority patent/US20250117778A1/en
Priority to IL314753A priority patent/IL314753A/en
Publication of WO2023154419A2 publication Critical patent/WO2023154419A2/en
Publication of WO2023154419A3 publication Critical patent/WO2023154419A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4012Verifying personal identification numbers [PIN]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Burglar Alarm Systems (AREA)
  • Telephone Function (AREA)

Abstract

Systems, methods, and devices for access control of crypto wallets. A crypto wallet may interoperate with multiple wallet controller devices. By implementing various key exchange mechanisms, instructions from the wallet controller devices may be securely provided to the crypto wallets, and the crypto wallets may verify the source of the instructions. By implementing these mechanisms, a risk of theft or unauthorized transfer of cryptocurrency associated with the hardware wallet is ameliorated.
PCT/US2023/012738 2022-02-09 2023-02-09 Access control systems and methods for cryptowallets WO2023154419A2 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
EP23753452.4A EP4476674A2 (en) 2022-02-09 2023-02-09 Access control systems and methods for cryptowallets
CN202380020879.3A CN118696327A (en) 2022-02-09 2023-02-09 Access control system and method for crypto wallet
JP2024547219A JP2025506141A (en) 2022-02-09 2023-02-09 Access control system and method for crypto wallets
AU2023219009A AU2023219009A1 (en) 2022-02-09 2023-02-09 Access control systems and methods for cryptowallets
US18/726,280 US20250117778A1 (en) 2022-02-09 2023-02-09 Access control systems and methods for cryptowallets
IL314753A IL314753A (en) 2022-02-09 2023-02-09 Access control systems and methods for crypto wallets

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202263308469P 2022-02-09 2022-02-09
US63/308,469 2022-02-09

Publications (2)

Publication Number Publication Date
WO2023154419A2 WO2023154419A2 (en) 2023-08-17
WO2023154419A3 true WO2023154419A3 (en) 2023-09-21

Family

ID=87564995

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2023/012738 WO2023154419A2 (en) 2022-02-09 2023-02-09 Access control systems and methods for cryptowallets

Country Status (7)

Country Link
US (1) US20250117778A1 (en)
EP (1) EP4476674A2 (en)
JP (1) JP2025506141A (en)
CN (1) CN118696327A (en)
AU (1) AU2023219009A1 (en)
IL (1) IL314753A (en)
WO (1) WO2023154419A2 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190220857A1 (en) * 2018-01-17 2019-07-18 Medici Ventures, Inc. Multi-approval system using m of n keys to generate a transaction address
US20200226586A1 (en) * 2017-08-14 2020-07-16 Feitian Technologies Co., Ltd. Method for realizing digital currency wallet by using hardware, and hardware wallet
US20200372495A1 (en) * 2019-05-20 2020-11-26 Mastercard International Incorporated Authenticating a user for a transaction based on device-based authentication data by a payment network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200226586A1 (en) * 2017-08-14 2020-07-16 Feitian Technologies Co., Ltd. Method for realizing digital currency wallet by using hardware, and hardware wallet
US20190220857A1 (en) * 2018-01-17 2019-07-18 Medici Ventures, Inc. Multi-approval system using m of n keys to generate a transaction address
US20200372495A1 (en) * 2019-05-20 2020-11-26 Mastercard International Incorporated Authenticating a user for a transaction based on device-based authentication data by a payment network

Also Published As

Publication number Publication date
CN118696327A (en) 2024-09-24
IL314753A (en) 2024-10-01
US20250117778A1 (en) 2025-04-10
EP4476674A2 (en) 2024-12-18
AU2023219009A1 (en) 2024-07-25
WO2023154419A2 (en) 2023-08-17
JP2025506141A (en) 2025-03-07

Similar Documents

Publication Publication Date Title
WO2017193108A3 (en) Encryption for distributed storage and processing
EP4451611A3 (en) Computer-implemented systems and methods for using a blockchain to perform an atomic swap
CN105246026B (en) A secure pairing method between smart wearable devices and other devices
WO2015102694A3 (en) Streaming authentication and multi-level security for communications networks using quantum cryptography
WO2015103206A3 (en) Bluetooth verification for vehicle access systems
CN104883681B (en) A kind of mobile RFID mutual authentication method based on Dynamic-shared key
NO20051666L (en) Procedure and system for secure deposition of private keys within a public key infrastructure (PKI)
MX2017012445A (en) Systems and methods for personal identification and verification.
WO2015023332A3 (en) Incorruptible public key using quantum cryptography for secure wired and wireless communications
MY151900A (en) Chaotic asymmetric encryption process for data security
AU2016200943A1 (en) Method to use a payment gateway as contextual enabler between different parties
CN103136830A (en) Communication-free hopping code generation method of access control system
MX2019002131A (en) Locking system for a door.
WO2014201585A1 (en) Rfid bidirectional authentication method based on asymmetric key and hash function
WO2023154419A3 (en) Access control systems and methods for cryptowallets
Chen et al. Application of homomorphic encryption in blockchain data security
CN101552776B (en) Fuzzy Vault encrypting method based on secrete sharing
CN1953366A (en) Password management method and system for intelligent secret key device
CN108122307A (en) Access control management method, apparatus and system
CN203520482U (en) Cooperative lockset system with asymmetric encryption technology
CA3156255A1 (en) Multi-locking device using random password
EP2756486B1 (en) Code hopping based system with increased security
CN202672887U (en) Coded lock
CN105298250A (en) Door lock remote control system
CN110086605A (en) In a kind of application of block chain on chain data encipherment protection and cipher text retrieval method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23753452

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 18726280

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: AU2023219009

Country of ref document: AU

ENP Entry into the national phase

Ref document number: 2023219009

Country of ref document: AU

Date of ref document: 20230209

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2024547219

Country of ref document: JP

Ref document number: 202380020879.3

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2023753452

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2023753452

Country of ref document: EP

Effective date: 20240909

WWP Wipo information: published in national office

Ref document number: 18726280

Country of ref document: US

WWW Wipo information: withdrawn in national office

Ref document number: 2023753452

Country of ref document: EP