FR3144465B1 - Method for the personalized backup and restoration of a secret held by a cryptoasset wallet - Google Patents
Method for the personalized backup and restoration of a secret held by a cryptoasset wallet Download PDFInfo
- Publication number
- FR3144465B1 FR3144465B1 FR2214387A FR2214387A FR3144465B1 FR 3144465 B1 FR3144465 B1 FR 3144465B1 FR 2214387 A FR2214387 A FR 2214387A FR 2214387 A FR2214387 A FR 2214387A FR 3144465 B1 FR3144465 B1 FR 3144465B1
- Authority
- FR
- France
- Prior art keywords
- backup
- cryptoasset
- wallet
- secret
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/363—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Procédé pour la sauvegarde et la restauration d’un secret (S) détenu par un premier portefeuille de cryptoactifs (CW1), comprenant les étapes consistant à générer, au moyen du portefeuille de cryptoactifs, une pluralité de données secrètes (Si) à partir du secret (S), sauvegarder les données secrètes dans une pluralité de serveurs de sauvegarde (BCKi), et restaurer le secret dans un deuxième portefeuille de cryptoactifs à partir des données secrètes détenues par les serveurs de sauvegarde. L’étape de sauvegarde est précédée d’une étape initiale de collecte d'informations relatives à l’identité de l’utilisateur, et d'une étape de communication, à chaque serveur de sauvegarde, des informations relatives à l’identité de l’utilisateur. L’étape de restauration est précédée d’une pluralité d’étapes de vérification de l’identité de l’utilisateur par des serveurs de sauvegarde, ces derniers étant configurés pour refuser de restituer la donnée secrète qu’ils détiennent si la vérification de l’identité de l’utilisateur n’est pas concluante. Figure pour l'abrégé : Fig. 3AMethod for backing up and restoring a secret (S) held by a first cryptoasset wallet (CW1), comprising the steps of generating, by means of the cryptoasset wallet, a plurality of secret data (Si) from the secret (S), backing up the secret data in a plurality of backup servers (BCKi), and restoring the secret in a second cryptoasset wallet from the secret data held by the backup servers. The backup step is preceded by an initial step of collecting information relating to the identity of the user, and a step of communicating, to each backup server, information relating to the identity of the user. The restoration step is preceded by a plurality of steps of verifying the identity of the user by backup servers, the latter being configured to refuse to restore the secret data that they hold if the verification of the identity of the user is not conclusive. Abstract: Fig. 3A
Priority Applications (17)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR2214387A FR3144465B1 (en) | 2022-12-23 | 2022-12-23 | Method for the personalized backup and restoration of a secret held by a cryptoasset wallet |
| EP23847639.4A EP4639836A1 (en) | 2022-12-23 | 2023-12-22 | Method for securely saving and restoring a seed held by a cryptoasset wallet |
| EP23844173.7A EP4639835A1 (en) | 2022-12-23 | 2023-12-22 | Method for establishing a secure data link between an electronic device and a server |
| KR1020257024355A KR20250151371A (en) | 2022-12-23 | 2023-12-22 | Method for establishing a secure data link between an electronic device and a server |
| CN202380091515.4A CN120604492A (en) | 2022-12-23 | 2023-12-22 | Method for backing up and securely restoring seeds held by a crypto-asset wallet |
| KR1020257024354A KR20250151370A (en) | 2022-12-23 | 2023-12-22 | How to back up and restore confidential information held by your cryptocurrency wallet. |
| EP23847744.2A EP4639837A1 (en) | 2022-12-23 | 2023-12-22 | Method for saving and restoring a secret held by a cryptoasset wallet |
| PCT/FR2023/000195 WO2024134037A1 (en) | 2022-12-23 | 2023-12-22 | Method for saving and restoring a secret held by a cryptoasset wallet |
| KR1020257024356A KR20250151372A (en) | 2022-12-23 | 2023-12-22 | How to safely store and restore seeds held by cryptocurrency wallets |
| KR1020257024353A KR20250153184A (en) | 2022-12-23 | 2023-12-22 | How to back up and restore confidential information held by a cryptocurrency wallet |
| PCT/FR2023/000196 WO2024134038A1 (en) | 2022-12-23 | 2023-12-22 | Method for backing up and restoring a secret held by a cryptoasset wallet |
| EP23847745.9A EP4639838A1 (en) | 2022-12-23 | 2023-12-22 | Method for backing up and restoring a secret held by a cryptoasset wallet |
| CN202380090498.2A CN120530599A (en) | 2022-12-23 | 2023-12-22 | A method for customizing the backup and recovery of secrets held by crypto-asset wallets |
| PCT/FR2023/000198 WO2024134040A1 (en) | 2022-12-23 | 2023-12-22 | Method for securely saving and restoring a seed held by a cryptoasset wallet |
| CN202380090497.8A CN120642292A (en) | 2022-12-23 | 2023-12-22 | Method for backing up and restoring secrets held by crypto-asset wallets |
| CN202380089757.XA CN120530598A (en) | 2022-12-23 | 2023-12-22 | A method for establishing a secure data connection between an electronic device and a server |
| PCT/FR2023/000197 WO2024134039A1 (en) | 2022-12-23 | 2023-12-22 | Method for establishing a secure data link between an electronic device and a server |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR2214387 | 2022-12-23 | ||
| FR2214387A FR3144465B1 (en) | 2022-12-23 | 2022-12-23 | Method for the personalized backup and restoration of a secret held by a cryptoasset wallet |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| FR3144465A1 FR3144465A1 (en) | 2024-06-28 |
| FR3144465B1 true FR3144465B1 (en) | 2025-01-03 |
Family
ID=86272391
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| FR2214387A Active FR3144465B1 (en) | 2022-12-23 | 2022-12-23 | Method for the personalized backup and restoration of a secret held by a cryptoasset wallet |
Country Status (1)
| Country | Link |
|---|---|
| FR (1) | FR3144465B1 (en) |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE102013100635A1 (en) * | 2013-01-22 | 2014-07-24 | IDnow GmbH | User identification |
| EP3767878A1 (en) * | 2015-03-27 | 2021-01-20 | Black Gold Coin, Inc. | A system and a method for personal identification and verification |
| KR20220016910A (en) * | 2019-06-10 | 2022-02-10 | 티제로 아이피, 엘엘씨 | Key recovery using encrypted secret share |
| US11626997B2 (en) * | 2020-03-06 | 2023-04-11 | Vaultie, Inc. | System and method for authenticating digitally signed documents |
-
2022
- 2022-12-23 FR FR2214387A patent/FR3144465B1/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| FR3144465A1 (en) | 2024-06-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2021201911B2 (en) | Methods and devices for acquiring and recording tracking information on blockchain | |
| US20250274450A1 (en) | Systems and methods for providing block chain-based multifactor personal identity verification | |
| CN108536521B (en) | Simulation platform-based offline environment checking method and device | |
| EP3665600A1 (en) | Method for electronic signing of a document by a plurality of signatories | |
| WO2020233149A1 (en) | Method, apparatus and device for timing authentication in blockchain account book | |
| FR3144465B1 (en) | Method for the personalized backup and restoration of a secret held by a cryptoasset wallet | |
| KR20240077337A (en) | System for verifying video data integrity using bitmap serial and method thereof | |
| FR3144463B1 (en) | Method for saving and restoring a secret held by a cryptoasset wallet | |
| CN113129132A (en) | Credit credit product application method and device based on block chain | |
| AU2018100477A4 (en) | Systems and methods for providing block chain-based multifactor personal identity verification | |
| KR101561979B1 (en) | Centralized server using personal information service delete and restore and certification system of mobile terminal and method of the same | |
| CN115733657B (en) | Data verification method, device, electronic equipment and storage medium | |
| CN114862392A (en) | Evidence generation method, device, storage medium and equipment | |
| WO2024211203A1 (en) | System and method for token-based transaction processing | |
| CN117409786A (en) | Voiceprint recognition model training data generation method and device, electronic equipment and medium | |
| CN112950205A (en) | Financial information acquisition method and system based on big data server | |
| HK40099381A (en) | Method and apparatus for playing video ringtone nft, device and medium | |
| HK40099381B (en) | Method and apparatus for playing video ringtone nft, device and medium | |
| CN119883364A (en) | Environment detection and restoration method and related device | |
| CN116846585A (en) | Digital identity and account authentication method and device thereof and storage medium | |
| CN115171301A (en) | Identity verification method and device | |
| Wang et al. | A novel security mobile payment system based on watermarked voice cheque | |
| CN115601038A (en) | Transaction certificate generation method, system, electronic device and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PLFP | Fee payment |
Year of fee payment: 2 |
|
| PLSC | Publication of the preliminary search report |
Effective date: 20240628 |
|
| PLFP | Fee payment |
Year of fee payment: 3 |
|
| PLFP | Fee payment |
Year of fee payment: 4 |