[go: up one dir, main page]

FR3144465B1 - Method for the personalized backup and restoration of a secret held by a cryptoasset wallet - Google Patents

Method for the personalized backup and restoration of a secret held by a cryptoasset wallet Download PDF

Info

Publication number
FR3144465B1
FR3144465B1 FR2214387A FR2214387A FR3144465B1 FR 3144465 B1 FR3144465 B1 FR 3144465B1 FR 2214387 A FR2214387 A FR 2214387A FR 2214387 A FR2214387 A FR 2214387A FR 3144465 B1 FR3144465 B1 FR 3144465B1
Authority
FR
France
Prior art keywords
backup
cryptoasset
wallet
secret
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
FR2214387A
Other languages
French (fr)
Other versions
FR3144465A1 (en
Inventor
Laurent Castillo
Andrianina Sandra Rasoamiaramanana
Furtado Daniel Rocha
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to FR2214387A priority Critical patent/FR3144465B1/en
Application filed by Individual filed Critical Individual
Priority to KR1020257024356A priority patent/KR20250151372A/en
Priority to EP23847745.9A priority patent/EP4639838A1/en
Priority to EP23844173.7A priority patent/EP4639835A1/en
Priority to KR1020257024355A priority patent/KR20250151371A/en
Priority to CN202380091515.4A priority patent/CN120604492A/en
Priority to KR1020257024354A priority patent/KR20250151370A/en
Priority to EP23847744.2A priority patent/EP4639837A1/en
Priority to PCT/FR2023/000195 priority patent/WO2024134037A1/en
Priority to PCT/FR2023/000197 priority patent/WO2024134039A1/en
Priority to KR1020257024353A priority patent/KR20250153184A/en
Priority to PCT/FR2023/000196 priority patent/WO2024134038A1/en
Priority to EP23847639.4A priority patent/EP4639836A1/en
Priority to CN202380090498.2A priority patent/CN120530599A/en
Priority to PCT/FR2023/000198 priority patent/WO2024134040A1/en
Priority to CN202380090497.8A priority patent/CN120642292A/en
Priority to CN202380089757.XA priority patent/CN120530598A/en
Publication of FR3144465A1 publication Critical patent/FR3144465A1/en
Application granted granted Critical
Publication of FR3144465B1 publication Critical patent/FR3144465B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/363Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

Procédé pour la sauvegarde et la restauration d’un secret (S) détenu par un premier portefeuille de cryptoactifs (CW1), comprenant les étapes consistant à générer, au moyen du portefeuille de cryptoactifs, une pluralité de données secrètes (Si) à partir du secret (S), sauvegarder les données secrètes dans une pluralité de serveurs de sauvegarde (BCKi), et restaurer le secret dans un deuxième portefeuille de cryptoactifs à partir des données secrètes détenues par les serveurs de sauvegarde. L’étape de sauvegarde est précédée d’une étape initiale de collecte d'informations relatives à l’identité de l’utilisateur, et d'une étape de communication, à chaque serveur de sauvegarde, des informations relatives à l’identité de l’utilisateur. L’étape de restauration est précédée d’une pluralité d’étapes de vérification de l’identité de l’utilisateur par des serveurs de sauvegarde, ces derniers étant configurés pour refuser de restituer la donnée secrète qu’ils détiennent si la vérification de l’identité de l’utilisateur n’est pas concluante. Figure pour l'abrégé : Fig. 3AMethod for backing up and restoring a secret (S) held by a first cryptoasset wallet (CW1), comprising the steps of generating, by means of the cryptoasset wallet, a plurality of secret data (Si) from the secret (S), backing up the secret data in a plurality of backup servers (BCKi), and restoring the secret in a second cryptoasset wallet from the secret data held by the backup servers. The backup step is preceded by an initial step of collecting information relating to the identity of the user, and a step of communicating, to each backup server, information relating to the identity of the user. The restoration step is preceded by a plurality of steps of verifying the identity of the user by backup servers, the latter being configured to refuse to restore the secret data that they hold if the verification of the identity of the user is not conclusive. Abstract: Fig. 3A

FR2214387A 2022-12-23 2022-12-23 Method for the personalized backup and restoration of a secret held by a cryptoasset wallet Active FR3144465B1 (en)

Priority Applications (17)

Application Number Priority Date Filing Date Title
FR2214387A FR3144465B1 (en) 2022-12-23 2022-12-23 Method for the personalized backup and restoration of a secret held by a cryptoasset wallet
EP23847639.4A EP4639836A1 (en) 2022-12-23 2023-12-22 Method for securely saving and restoring a seed held by a cryptoasset wallet
EP23844173.7A EP4639835A1 (en) 2022-12-23 2023-12-22 Method for establishing a secure data link between an electronic device and a server
KR1020257024355A KR20250151371A (en) 2022-12-23 2023-12-22 Method for establishing a secure data link between an electronic device and a server
CN202380091515.4A CN120604492A (en) 2022-12-23 2023-12-22 Method for backing up and securely restoring seeds held by a crypto-asset wallet
KR1020257024354A KR20250151370A (en) 2022-12-23 2023-12-22 How to back up and restore confidential information held by your cryptocurrency wallet.
EP23847744.2A EP4639837A1 (en) 2022-12-23 2023-12-22 Method for saving and restoring a secret held by a cryptoasset wallet
PCT/FR2023/000195 WO2024134037A1 (en) 2022-12-23 2023-12-22 Method for saving and restoring a secret held by a cryptoasset wallet
KR1020257024356A KR20250151372A (en) 2022-12-23 2023-12-22 How to safely store and restore seeds held by cryptocurrency wallets
KR1020257024353A KR20250153184A (en) 2022-12-23 2023-12-22 How to back up and restore confidential information held by a cryptocurrency wallet
PCT/FR2023/000196 WO2024134038A1 (en) 2022-12-23 2023-12-22 Method for backing up and restoring a secret held by a cryptoasset wallet
EP23847745.9A EP4639838A1 (en) 2022-12-23 2023-12-22 Method for backing up and restoring a secret held by a cryptoasset wallet
CN202380090498.2A CN120530599A (en) 2022-12-23 2023-12-22 A method for customizing the backup and recovery of secrets held by crypto-asset wallets
PCT/FR2023/000198 WO2024134040A1 (en) 2022-12-23 2023-12-22 Method for securely saving and restoring a seed held by a cryptoasset wallet
CN202380090497.8A CN120642292A (en) 2022-12-23 2023-12-22 Method for backing up and restoring secrets held by crypto-asset wallets
CN202380089757.XA CN120530598A (en) 2022-12-23 2023-12-22 A method for establishing a secure data connection between an electronic device and a server
PCT/FR2023/000197 WO2024134039A1 (en) 2022-12-23 2023-12-22 Method for establishing a secure data link between an electronic device and a server

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR2214387 2022-12-23
FR2214387A FR3144465B1 (en) 2022-12-23 2022-12-23 Method for the personalized backup and restoration of a secret held by a cryptoasset wallet

Publications (2)

Publication Number Publication Date
FR3144465A1 FR3144465A1 (en) 2024-06-28
FR3144465B1 true FR3144465B1 (en) 2025-01-03

Family

ID=86272391

Family Applications (1)

Application Number Title Priority Date Filing Date
FR2214387A Active FR3144465B1 (en) 2022-12-23 2022-12-23 Method for the personalized backup and restoration of a secret held by a cryptoasset wallet

Country Status (1)

Country Link
FR (1) FR3144465B1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102013100635A1 (en) * 2013-01-22 2014-07-24 IDnow GmbH User identification
EP3767878A1 (en) * 2015-03-27 2021-01-20 Black Gold Coin, Inc. A system and a method for personal identification and verification
KR20220016910A (en) * 2019-06-10 2022-02-10 티제로 아이피, 엘엘씨 Key recovery using encrypted secret share
US11626997B2 (en) * 2020-03-06 2023-04-11 Vaultie, Inc. System and method for authenticating digitally signed documents

Also Published As

Publication number Publication date
FR3144465A1 (en) 2024-06-28

Similar Documents

Publication Publication Date Title
AU2021201911B2 (en) Methods and devices for acquiring and recording tracking information on blockchain
US20250274450A1 (en) Systems and methods for providing block chain-based multifactor personal identity verification
CN108536521B (en) Simulation platform-based offline environment checking method and device
EP3665600A1 (en) Method for electronic signing of a document by a plurality of signatories
WO2020233149A1 (en) Method, apparatus and device for timing authentication in blockchain account book
FR3144465B1 (en) Method for the personalized backup and restoration of a secret held by a cryptoasset wallet
KR20240077337A (en) System for verifying video data integrity using bitmap serial and method thereof
FR3144463B1 (en) Method for saving and restoring a secret held by a cryptoasset wallet
CN113129132A (en) Credit credit product application method and device based on block chain
AU2018100477A4 (en) Systems and methods for providing block chain-based multifactor personal identity verification
KR101561979B1 (en) Centralized server using personal information service delete and restore and certification system of mobile terminal and method of the same
CN115733657B (en) Data verification method, device, electronic equipment and storage medium
CN114862392A (en) Evidence generation method, device, storage medium and equipment
WO2024211203A1 (en) System and method for token-based transaction processing
CN117409786A (en) Voiceprint recognition model training data generation method and device, electronic equipment and medium
CN112950205A (en) Financial information acquisition method and system based on big data server
HK40099381A (en) Method and apparatus for playing video ringtone nft, device and medium
HK40099381B (en) Method and apparatus for playing video ringtone nft, device and medium
CN119883364A (en) Environment detection and restoration method and related device
CN116846585A (en) Digital identity and account authentication method and device thereof and storage medium
CN115171301A (en) Identity verification method and device
Wang et al. A novel security mobile payment system based on watermarked voice cheque
CN115601038A (en) Transaction certificate generation method, system, electronic device and storage medium

Legal Events

Date Code Title Description
PLFP Fee payment

Year of fee payment: 2

PLSC Publication of the preliminary search report

Effective date: 20240628

PLFP Fee payment

Year of fee payment: 3

PLFP Fee payment

Year of fee payment: 4