WO2024186642A1 - Digital wallet management - Google Patents
Digital wallet management Download PDFInfo
- Publication number
- WO2024186642A1 WO2024186642A1 PCT/US2024/018089 US2024018089W WO2024186642A1 WO 2024186642 A1 WO2024186642 A1 WO 2024186642A1 US 2024018089 W US2024018089 W US 2024018089W WO 2024186642 A1 WO2024186642 A1 WO 2024186642A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- end user
- user
- platform
- computing system
- digital wallet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/363—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Definitions
- the present disclosure relates to a system and method for managing one or more digital wallets.
- a digital wallet is a software-based tool that allows users to send, receive, and manage digital assets such as cryptocurrencies, non-fungible tokens (NFTs), and the like.
- the digital wallet holds a pair of cryptographic keys: a private key, which must be kept secret, and a public key, which can be freely shared. Transactions are signed with the private key and can be verified with the public key.
- Blockchain technology has, in recent years, rapidly gained popularity in a variety 7 of sectors. With this growth, the need for user-friendly and secure tools for managing digital assets has also grown.
- FIG. 1 is an exemplary computing system that can be used to implement a digital wallets management system according to aspects of the present disclosure.
- FIG. 2 is a flow chart of a method for executing a transaction in accordance with an exemplary aspect of the present disclosure.
- FIG. 3 is a flow diagram of a method for managing one or more digital wallets in accordance with an exemplary aspect of the present disclosure.
- FIG. 4 is an exemplary computing system that can be used to implement a digital wallets management system according to another aspect of the present disclosure.
- FIG. 5 is a flow chart of a method for executing a transaction in accordance with another exemplary aspect of the present disclosure.
- the present disclosure relates to a concept of a central business or platform (hereinafter referred to as “the platform”) that manages digital wallets for end users, and in particular custodial wallets for end users, and allows the end users to convert the custodial wallets to non-custodial wallets when the end users are ready.
- the platform manages digital wallets for end users, and in particular custodial wallets for end users, and allows the end users to convert the custodial wallets to non-custodial wallets when the end users are ready.
- a digital wallet is generally a software-based system that securely stores users’ digital assets like cryptocurrencies, non-fungible token (“NFTs”), and the like.
- Digital wallets allow users to manage and conduct transactions using these assets on various blockchain networks. More specifically, digital wallets allow end users to make electronic transactions and can store digital information about currency, such as cryptocurrencies (e.g., Bitcoin, Ethereum, etc.), as well as credit card and loyalty card information.
- Each digital wallet is generally accessed using a private key.
- a private key is a unique, secret alphanumeric codes that enable access to the assets within the digital wallet. They are fundamental to the operation and security of the digital wallet, serving as the cryptographic underpinning for asset control and transaction authorization.
- a custodial digital wallet (or simply “custodial wallet'’)
- a third-party like the platform, has control or “custody” over the user’s private keys (akin to banks).
- This setup is advantageous because the user does not have to worry about securing their private key, and as noted above, if a user’s private key is lost, there currently is no reliable way to recover the private key, and all assets on the blockchain associated with that private key are essentially unrecoverable.
- the custodial wallet arrangement offers a safety net against the loss or theft of the keys and provides an easy-to-use interface for those that may be less technically versed.
- a downside of a custodial wallet is that the end user depends on the platform’s security measures and business acumen. For example, if the platform is compromised, so are the user’s digital assets. Further, at least certain platforms rehypothecate cryptocurrency assets of their users. Such may have further negative implications for the users of the platform.
- a non-custodial wallet allows a user to have sole custody of their private keys. Such an arrangement effectively eliminates a risk of custodial malfeasance.
- the cost is that it places the onus of securing the private key on the user.
- a platform hosting a digital wallet may have a recovery process for a user that loses their authentication data (e.g., user name and password, or the like), if a user of a non-custodial wallet loses their personal key. the asset associated with that personal key are in essentially unrecoverable.
- One option for a user is to open a custodial wallet with a platform to leam how the environment of digital transactions associated with cryptocurrencies. NFTs, and the like operate, and once they are comfortable, transfer all of their assets to a new, non-custodial wallet.
- a user s private and public keys are generally used to identify the creator.
- an end user s public key is generated from the corresponding private key using cryptographic algorithms to ensure the private and public keys are intrinsically linked.
- the public key (or wallet address) may be shared publicly and used to. e.g., send and receive funds.
- NFT NFT
- a user when a user creates an NFT or any other transaction on the blockchain, they will sign the transaction with their private key.
- This provides security and non-repudiation, as it ties the transaction irrefutably to the owner of the private key.
- each token is unique and is identified by its own distinct token ID on the blockchain.
- a user mints (i.e., creates) an NFT a record is created on the blockchain that links the NFT to the user's wallet address (or public key), establishing them as the original creator or owner.
- the present disclosure generally provides for a computer- implemented method for managing one or more digital wallets.
- the method includes obtaining, by a computing system of a platform, an end user request to create a user digital wallet on behalf of the end user.
- the method includes generating, by the computing system of the platform, the user digital wallet for the end user.
- Generating, by the computing system of the platform, the user digital wallet includes obtaining a user private key and a user public key. and obtaining user authentication data.
- the public key and the user authentication data is provided to the end user.
- the private key may optionally be provided to the end user.
- the method further includes maintaining, by the platform, the user digital wallet for the end user. Maintaining, by the platform, the user digital wallet for the end user may include securely storing the private key as a separate and unique private key relative to all other private keys stored by the platform.
- the method includes obtaining, by the computing system of the platform, a request from the end user to transfer custody of the user digital wallet to a recipient; and in response providing, by the computing system of the platform, the user private key to the recipient.
- FIG. 1 depicts an exemplary computing system 100 that can be used to implement a digital wallets management system (system 100) according to aspects of the present disclosure.
- the system 100 has a platform server architecture that includes a server 110 that communicates with one or more end user computing systems 130 over a network 160.
- the server 110 is generally associated with a platform.
- the platform may be a centralized entity that performs the operations and provides the services described herein, such as custodial wallet services and wallet transfer services (e.g., performs the operations of methods 300. 400).
- the server 110 may be, for example, a web-based server.
- the server 110 can be one or more computing devices that are implemented as a parallel or distributed computing system. In particular, multiple computing devices can act together as a single server 110.
- the server 110 can have one or more processor(s) 112 and a memory 114.
- the server 110 also includes a network interface 120 used to communicate with one or more remote computing devices (e.g., one or more end user computing systems 130, described below) over a network 160.
- the processor(s) 112 can be any suitable processing device, such as a microprocessor, microcontroller, integrated circuit, or other suitable processing device.
- the memory 1 14 can include any suitable computing system or media, including, but not limited to, non-transitory computer-readable media, RAM, ROM, hard drives, flash drives, or other memory devices.
- the memory 114 can store information accessible by processor(s) 112, including instructions 116 that can be executed by processor(s) 112.
- the instructions 116 can be any set of instructions that when executed by the processor(s) 112, cause the processor(s) 112 to provide desired functionality.
- the instructions 116 can be executed by the processors) 112 to implement a user interface 120, a digital wallet module 200, or both.
- the user interface 120 can be configured to provide an interface for collecting input data of one or more end users, as will be described in more detail below.
- the user interface 120 can be provided for interaction with an end user using an end user computing system 130 that communicates with the server 110 of the platform via the network 160.
- the user interface 120 can be configured to communicate with the digital wallet module 200.
- module refers to a distinct functional unit or component within a controller or control system (e.g.. the server 110) that is devised to perform a specific subset of tasks related to the management and operation of a system as a whole.
- a module may consist of hardware elements, software routines, or a combination of both, and is configured to integrate and cooperate with other modules within the controller or control system to facilitate desired processing and operational functions.
- the module may be responsible for various tasks, including but not limited to, receiving input signals, executing predetermined algorithms, and generating output signals, communicating output signals or both.
- the digital wallet module 200 may, for example, store data relating to one or more end users (e.g., end user one through end user N); store data relating to one or more digital wallets (each digital wallet associated with a single end user of the one or more end users); obtain (e.g., receive, access, or the like) authentication data, blockchain transaction data, etc. from the one or more end users through the user interface 120; and provide account data to the end users through the user interface 120.
- the digital wallet module 200 may provide data to a blockchain 170, receive data from the blockchain 170, etc.
- the platform hosting the server 110 is arranged as a custodian for the one or more digital wallets associated with the respective one or more end users, e.g.. maintaining data of the one or more end users.
- the digital wallet module 200 of the server 110 stores end user one user data 206, including a user private key 208, a user public key 210, and user authentication information 212.
- the digital wallet module 200 further separately stores data for each end user of the one or more end user, e.g., up to end user N user data 202.
- the end user N user data 202 may include the same type of information as the end user one user data 206, but for the respective end user (e.g., private key, public key, and authentication information for end user N).
- N may be between at least 10, such that the server 110 of the platform is further configured to store unique end user data for end user two. end user three, end user four, end user five, end user six, end user seven, end user eight, end user nine, and end user ten.
- N may be at least 100 and up to 100 million.
- the server of the platform may further be configured to store unique end user data for each individual end user represented by N.
- the platform hosting the server 110 is configured to separately create and maintain digital wallet data for each of the end users, such that each end user has an individual and unique private key and public key (e.g., user private key 206 and public key 208 for end user one) associated solely with that end user.
- the user private key and user public key of each end user is stored at a unique location for that specific end user.
- each end user has a custodial digital wallet with the platform hosting the server 110 in FIG. 1.
- the digital wallet data may be represented at least in part by one or more aspects of the end user data in FIG. 1 (e.g.. end user one data 206 may represent a custodial digital w allet for user one).
- the digital w allet module 200 may further allow' for the end user to check and receive account data, such as transaction data, balances of digital assets, etc.
- the digital wallet module 200 may include account data in the stored end user data, and the account data may be provided to the end user through the user interface 120.
- the digital wallet module 200 depicted includes user one account data 214 in the stored end user one user data 206.
- the end user may initiate and execute transactions using the server 110, such as using the digital w allet module 200 of the server 110, and the server 110, such as the digital w allet module 200 of the server 110 may provide data to the blockchain 170, receive data from the blockchain 170. etc. associated with the transactions.
- the digital wallet module 200 may provide data to the blockchain 170 associated with the transaction and associated with the end user digital wallet (e.g.. private and public keys) to execute the transaction (e.g., the user private key 206 and public key 210 stored in end user one data 206 for the first user).
- aspects of the digital wallet module 200 can be stored in one or more databases.
- the one or more databases can be connected to the server 110 by a high bandwidth LAN or WAN, or can also be connected to server 110 through the network 160.
- the one or more databases can be split up so that they are located in multiple locales, or cany be co-located.
- the server 1 10 can exchange data with one or more end user computing systems 130 over the network 160. Although two end user computing systems 130 are illustrated in FIG. 1, any number of end user computing systems 130 can be connected to the server 110 over the network 160.
- the end user computing systems 130 can be any suitable type of computing device, such as a general purpose computer, special purpose computer, navigational device, laptop, desktop, integrated circuit, mobile device, smartphone, tablet, wearable-computing devices, a display with one or more processors coupled thereto and/or embedded therein, or other suitable computing device. Further, an end user computing system 130 can be multiple computing devices acting together to perform operations or computing actions.
- the end user computing systems 130 can each include a processor(s) 132 and a memory 134.
- the memory 134 can store information accessible by processor(s) 132, including instructions that can be executed by processor(s) and data.
- memory 134 can store data 136 and instructions 138.
- the end user computing system 130 can further include various user input devices 150, or input components, for receiving information from a user, such as a touch screen, touch pad, data entry’ keys, speakers, mouse, motion sensor, and/or a microphone suitable for voice recognition.
- the end user computing system 130 can have a display 146 for presenting information, such as account data associated with the end user’s digital wallet.
- the display 146 can be a visual display including a plurality of visual components for providing the graphical elements of the plate user interface to a user.
- the visual display can include a liquid cry stal display (LCD), a light-emitting diode display (LED), a plasma display, an organic light-emitting diode display (OLED), and/or a cathode ray tube display (CRT).
- LCD liquid cry stal display
- LED light-emitting diode display
- OLED organic light-emitting diode display
- CRT cathode ray tube display
- the end user computing system 130 can further include a graphics processing unit 152.
- Graphics processing unit 152 can be used by processor 132 to provide an intermediary 7 third party 7 interface.
- the graphics processing unit 152 can be used by processor 132 to provide an interface to one or more aspects of the server 110.
- the end user computing system 130 can include a network interface 154 for communicating with the server 110 over the network 160 (and/or with the blockchain 170).
- Network interface 154 can include any components or configuration suitable for communication over network 160. including, for example, one or more ports, transmitters, wireless cards, controllers, physical layer components, or other items for communication according to any currently known or future developed communications protocol or technology.
- the network 160 can be any type of communications network, such as a local area network (e.g., intranet), wide area network (e.g., Internet), or some combination thereof.
- the netw ork 160 can also include a direct connection between an end user computing system 130 and the platform server 110.
- communication between the platform server 110 and the end user computing system 130 can be carried via network interface using any type of wired and/or wireless connection, using a variety 7 of communication protocols (e.g., TCP/IP, HTTP), encodings or formats (e.g., HTML, XML), and/or protection schemes (e.g., VPN, secure HTTP, SSL).
- the network 160 can be used to transfer communication betw een the end user computing system 130 and/or the server 110 to the blockchain 170.
- the communicarions can be transaction data or the like.
- one or more non-transitory computer readable media that collectively store instructions that, when executed by the one or more processors, cause the blockchain computing system to perform operations can be included in the computing system.
- the memon components of the end user computing system 130 and the server 110 can include the one or more non-transitory computer readable media.
- the stored instructions can include instructions that cause one or more of the computing systems to perform operations that can include the methods and processes disclosed herein.
- FIG. 2 a flow diagram 300 depicting a method for completing a transaction using a custodial digital wallet stored and/or maintained by a serv er of a platform for an end user, as is depicted in FIG. 1, is provided.
- the method 300 includes at (302) obtaining authentication information from the end user.
- Obtaining authentication information from the end user at (302) includes at (304) providing, by an end user, authentication information using a user input device on a user computing device, at (306) communicating the provided authentication information to a user interface of a server of a platform across a network, and at (308) obtaining the authentication information with the user interface.
- the authentication information may include a username and password of the end user, but not a private key associated with a digital wallet of the end user.
- the method 300 further includes at (310) authenticating the end user with a digital wallet module of the server of the platform based on the obtained authentication information of the end user.
- authenticating the end user at (310) may include at (311) comparing the obtained authentication information to authentication information associated with the end user stored in a digital while module of the server of the platform.
- the method 300 further includes at (312) obtaining transaction data from the end user.
- Obtaining transaction data from the end user at (312) includes at (314) providing, by an end user, transaction data using the user input device one the user computing device, at (316) communicating the provided transaction data to the user interface of the server of the platform across the network, and at (318) obtaining the transaction data with the user interface.
- the transaction data may include a public key or wallet address of a transaction recipient, data indicative of the asset to be transferred (e.g., an amount of cryptocurrency), or the like.
- the method 300 further includes at (320) signing, by the server of the platform, a transaction corresponding to the transaction data obtained at (312). Signing, by the server of the platform, the transaction at (320) may include (322) signing, by the server of the platform, the transaction using a private key of the end user stored in the digital wallet module of the server of the platform, e.g.. without obtaining the private key from the end user.
- the method 300 includes at (324) broadcasting, by the server of the platform, the transaction to a blockchain.
- FIG. 3 a flow diagram of a method 400 for managing one or more digital wallets in accordance with an exemplary aspect of the present disclosure is provided.
- the method 400 may be utilized with one or more the exemplary systems and methods described herein (e.g.. systems 100 of FIGS. 1 and 4) to transfer custody of a digital wallet of an end user to the end user, transforming the digital wallet from a custodial digital wallet (FIG. 1) to a noncustodial digital wallet (FIG. 4; discussed below).
- the method 400 includes at (402) obtaining, by a computing system of a platform, an end user request to create an end user digital wallet on behalf of the end user, and at (404) generating, by the computing system of the platform, the end user digital wallet for the end user.
- the computing system of the platform may include a server of the platform (see. e.g., FIG. 1).
- Generating the end user digital wallet for the end user at (404) includes at (406) obtaining a user private key and a user public key, and at (408) obtaining user authentication information.
- Obtaining the user private key and the user public key at (406) may include generating the user private key and the user public key with the computing system of the platform, or may include receiving the user private key. the user public key, or both from a separate computing system (such as a third-party computing system) in response to providing, by the computing system of the platform, a request to the separate computing system to generate the user private key, the user public key, or both.
- the user private key and the user public key obtained at (406) may be obtained specifically for the end user and may only be associated with the end user digital wallet of the end user.
- Obtaining the user authentication information at (408) may include obtaining the user authentication information from the end user, generating the user authentication information with the computing system of the platform, or a combination thereof.
- obtaining the user authentication information at (408) may include at (410) providing to the end user the user authentication information.
- the user authentication information may include a username and a password, two factor authentication infonnation, or other identifying information.
- generating the end user digital wallet for the end user may include providing, by the computing system of the platform, the public key associated with the user private key of the end user digital wallet to the end user.
- the method 400 further includes at (412) maintaining, by the platform (such as by the computing system of the platform), the end user digital wallet for the end user.
- Maintaining the end user digital wallet for the end user at (412) may include storing in user data associated with the end user digital wallet, and maintaining the end user data separate from end user data of other end users and separate from end user digital wallets of other end users.
- the user private key associated with the end user digital wallet may be solely associated with the end user digital wallet of the end user, and the end user digital wallet may be solely associated with the end user.
- the user private key, the end user digital wallet, or both may not be shared across multiple end users.
- the method 400 further includes at (414) obtaining, by the computing system of the platform, a request from the end user to transfer custody of the end user digital wallet to a recipient.
- the recipient may be the end user.
- the recipient may be an individual or entity separate from the end user.
- obtaining, by the computing system of the platform, the request from the end user to transfer custody of the end user digital wallet to the recipient at (414) may include at (416) obtaining the request from a user computing device across a network.
- the method 400 includes at (418) providing, by the computing system of the platform, the user private key to the recipient.
- providing the user private key to the recipient and (418) includes at (420) providing the user private key to the recipient in response to obtaining the request from the end user to transfer custody of the end user digital wallet to the recipient.
- providing the user private key to the recipient at (418) further includes at (422) providing to the recipient the public key, authentication information, account data, other data associated with the end user digital wallet, or a combination thereof.
- providing the user private key to the recipient at (418) includes at (424) providing custody of the end user digital wallet to the recipient.
- steps (418)-(424) may be enabled by the generation and maintenance of the end user digital wallet unique for the end user, not having certain shared information (e.g., private keys) with other end users of the platform.
- FIG. 4 an exemplary computing system 100 that can be used to implement a digital wallets management system in accordance with another example aspect of the present disclosure is provided.
- the system 100 may, in certain exemplary aspects, be configured in a similar manner as the exemplary system 100 of FIG. 1, following a providing of a user private key to a recipient (see, e.g., steps (418)-(424) of the method 400 in FIG. 3).
- the system 100 includes a platform server architecture that includes a server 110 that communicates with one or more end user computing systems 130 over a network 160.
- the end user computing systems 130 includes user one computing system 130 A, which may be configured in a similar manner as the exemplary end user computing system 130 described above with reference to FIG. 1.
- the end user computing system 130 A includes one or more processors 132 and memory 134.
- the user one computing system 130A includes a digital wallet module 200’.
- the digital wallet module stores user one digital wallet data, or rather end user one user data 206’, with the end user one user data 206’ including a user one private key 208’, a user one public key 210’, and user one account data 214’.
- the end user one user data 206’ may have been obtained from the digital wallet module 200 of the server 110 (compare with the digital wallet module 200 of FIG. 1).
- the digital wallet module 200 of the server 1 10 not longer contains user one digital wallet data (but may maintain, e.g., end user two user data 204, end user N user data 202). Accordingly, the server 110 may have deleted the end user one user data 206 (compare with the digital wallet module of FIG. 1).
- the user one computing system 130 A may be in sole custody of user one, and as such, the digital wallet of user one may be referred to as a non-custodial digital wallet.
- user one can sign transactions directly on a blockchain using end user one user data 206’ (e.g., the user one private key 208’ and the user one public key 210’).
- end user (user one), in such a scenario, has the complete autonomy of managing their wallet, thereby embracing the decentralization principle of cryptocurrencies while having total control of their private key.
- FIG. 5 a flow 7 diagram is provided depicting a method 500 for completing a transaction using a non-custodial digital wallet stored by an end user, e.g., as in the exemplary system 100 depicted in FIG. 4 and described above.
- the method 500 includes at (502) obtaining transaction data from the end user.
- Obtaining transaction data from the end user at (502) includes at (504) obtaining transaction data from a user input device of a user computing device.
- the transaction data may include a public key or wallet address of a transaction recipient, data indicative of the asset to be transferred (e.g., an amount of cryptocurrency), or the like.
- the method 500 further includes at (506) signing, by the user computing device, a transaction corresponding to the transaction data obtained at (502). Signing, by the user computing device, the transaction at (506) may include (508) signing, by the user computing device, the transaction using a private key of the end user stored by the user computing device or obtained by the user computing device.
- the method 500 includes at (510) broadcasting, by the user computing device, the transaction to a blockchain.
- the end user digital wallet when the end user digital wallet is arranged as a custodial digital wallet, the end user may be solely responsible for storing and safeguarding the private key associated with the end user digital wallet.
- the present disclosure offers a unique solution that addresses the challenges associated with both custodial and non-custodial wallets.
- the present disclosure provides end users the flexibility to enjoy the benefits of both wallet types as per their comfort and experience level.
- the present disclosure disclosed empowers end users with the freedom to choose the wallet type that best suits their needs, while preserving the security and ease of use associated with custodial wallets, and the autonomy and control of non-custodial wallets. Notably, this is all accomplished without the end user having to change their private key or public key when transitioning custodial wallet arrangement (provided by platform) to the noncustodial wallet arrangement.
- This approach provides a highly beneficial tool for cryptocurrency users, enhancing the overall user experience and further promoting the adoption of cryptocurrencies.
- a computer-implemented method for managing one or more digital wallets comprising: obtaining, by a computing system of a platform, an end user request to create an end user digital wallet on behalf of the end user; generating, by the computing system of the platform, the end user digital wallet for the end user, wherein generating, by the computing system of the platform, the end user digital wallet comprises obtaining a user private key and a user public key.
- a computing system of a platform for managing one or more digital wallets comprising: one or more processors; and one or more non- transitory computer-readable media that collectively store instructions that, when executed by the one or more processors, cause the computing system to perform operations, the operations, comprising: obtaining, by a computing system of a platform, an end user request to create an end user digital wallet on behalf of the end user; generating, by the computing system of the platform, the end user digital wallet for the end user, wherein generating, by the computing system of the platform, the end user digital wallet comprises obtaining a user private key and a user public key, and generating user authentication information; maintaining, by the platform, the end user digital wallet for the end user; obtaining, by the computing system of the platform, a request from the end user to transfer custody of the end user digital wallet to a recipient; and providing, by the computing system of the platform, the user private key to the recipient.
- the operations further include: obtaining, by the computing system of the platform, end user transaction data from the end user; confirming, by the computing system of the platform, the end user initiated a transaction according to the end user transaction data; signing, by the computing system of the platform, the transaction with the user private key; and broadcasting, by the computing system of the platform, the transaction to a blockchain.
- One or more non-transitory computer-readable media that collectively store instructions that, when executed by one or more computing devices, cause the one or more computing devices to perform operations, the operations comprising: receiving, by a platform, an end user request to create a user digital wallet on behalf of the end user; generating, by of the platform, the user digital wallet for the end user, wherein generating, by the platform, the user digital wallet comprises obtaining a user private key and a user public key, generating user login data, and providing to the end user the public key and the user login data; maintaining, by the platform, the user digital wallet for the end user; receiving, by the platform, a request from the end user to transfer custody of the user digital wallet to a recipient; and providing, by the platform, the user private key to the recipient.
- a computing system of a platform for managing one or more digital wallets comprising: a digital wallet module comprising user data for N number of end users, the user data for each end user being stored separately from the remaining end users, the user data of each end user comprising a private key associated wi th the respective end user, a public associated with the respective end user, and authentication information associated with the respective end user, the digital wallet module configured to conduct a transaction on behalf of a first end user using user data of the first end user in response to a transaction request obtained by the first end user, the digital wallet further configured to transfer the user data of the first end user to a recipient designated by the first end user in response to a transfer request obtained from the first end user.
- the digital wallet module is configured to delete the user data of the first end user concurrently with, or following, the transfer of the user data of the first end user to the recipient designated by the first end user.
- the computing system of one or more of these clauses wherein the transaction request is a cryptocurrency transfer request.
- the digital wallet module configured to conduct the transaction on behalf of the first end user without receiving the private key of the first end user from the first end user.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP24716935.2A EP4677518A1 (en) | 2023-03-03 | 2024-03-01 | Digital wallet management |
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202363488251P | 2023-03-03 | 2023-03-03 | |
| US63/488,251 | 2023-03-03 | ||
| US18/401,915 US20240296442A1 (en) | 2023-03-03 | 2024-01-02 | Digital wallet management |
| US18/401,915 | 2024-01-02 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024186642A1 true WO2024186642A1 (en) | 2024-09-12 |
Family
ID=90718952
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2024/018089 Ceased WO2024186642A1 (en) | 2023-03-03 | 2024-03-01 | Digital wallet management |
Country Status (2)
| Country | Link |
|---|---|
| EP (1) | EP4677518A1 (en) |
| WO (1) | WO2024186642A1 (en) |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2015142765A1 (en) * | 2014-03-17 | 2015-09-24 | Coinbase, Inc | Bitcoin host computer system |
| US20150365283A1 (en) * | 2014-06-16 | 2015-12-17 | Bank Of America Corporation | Cryptocurrency offline vault storage system |
| EP3358515A1 (en) * | 2017-02-03 | 2018-08-08 | PLC Group AG | Method for cryptographically signing a transaction |
| CN109214816A (en) * | 2018-09-13 | 2019-01-15 | 贝富(广州)新技术有限公司 | Cold wallet equipment and hot money packet equipment |
| CN109934582A (en) * | 2019-02-25 | 2019-06-25 | 矩阵元技术(深圳)有限公司 | Digital cash transaction data processing method, server, client and system |
| US20200334674A1 (en) * | 2019-04-19 | 2020-10-22 | Coinbase, Inc. | Systems and methods for blockchain administration |
| US20210027283A1 (en) * | 2019-07-22 | 2021-01-28 | Visa International Service Association | Federated custodian |
| US20220405749A1 (en) * | 2019-09-17 | 2022-12-22 | nChain Holdings Limited | Allocation of a digital asset using blockchain transactions |
-
2024
- 2024-03-01 WO PCT/US2024/018089 patent/WO2024186642A1/en not_active Ceased
- 2024-03-01 EP EP24716935.2A patent/EP4677518A1/en active Pending
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2015142765A1 (en) * | 2014-03-17 | 2015-09-24 | Coinbase, Inc | Bitcoin host computer system |
| US20150365283A1 (en) * | 2014-06-16 | 2015-12-17 | Bank Of America Corporation | Cryptocurrency offline vault storage system |
| EP3358515A1 (en) * | 2017-02-03 | 2018-08-08 | PLC Group AG | Method for cryptographically signing a transaction |
| CN109214816A (en) * | 2018-09-13 | 2019-01-15 | 贝富(广州)新技术有限公司 | Cold wallet equipment and hot money packet equipment |
| CN109934582A (en) * | 2019-02-25 | 2019-06-25 | 矩阵元技术(深圳)有限公司 | Digital cash transaction data processing method, server, client and system |
| US20200334674A1 (en) * | 2019-04-19 | 2020-10-22 | Coinbase, Inc. | Systems and methods for blockchain administration |
| US20210027283A1 (en) * | 2019-07-22 | 2021-01-28 | Visa International Service Association | Federated custodian |
| US20220405749A1 (en) * | 2019-09-17 | 2022-12-22 | nChain Holdings Limited | Allocation of a digital asset using blockchain transactions |
Also Published As
| Publication number | Publication date |
|---|---|
| EP4677518A1 (en) | 2026-01-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20240296442A1 (en) | Digital wallet management | |
| Samir et al. | DT-SSIM: A decentralized trustworthy self-sovereign identity management framework | |
| EP3721578B1 (en) | Methods and systems for recovering data using dynamic passwords | |
| AU2018200611B2 (en) | Image based key derivation function | |
| Li et al. | A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments | |
| US20220123931A1 (en) | Technologies for private key recovery in distributed ledger systems | |
| US8423774B2 (en) | Integrity protected smart card transaction | |
| US9614847B2 (en) | User authentication | |
| CN102148685B (en) | Method and system for dynamically authenticating password by multi-password seed self-defined by user | |
| CN102170356B (en) | Authentication system realizing method supporting exclusive control of digital signature key | |
| CA3014385A1 (en) | Platform for generating authenticated data objects | |
| CN105491077B (en) | A kind of system of authentication | |
| Saranya et al. | Efficient mobile security for E health care application in cloud for secure payment using key distribution | |
| CN108985100A (en) | Element Security Proof method, apparatus, equipment and medium based on block chain | |
| CN109815051A (en) | The data processing method and system of block chain | |
| CN110401542A (en) | Electronic identity voucher generation method, terminal and server | |
| CN109064113A (en) | A kind of electronic contract management method and system based on block chain | |
| CN101272248B (en) | Dynamic cipher authentication system | |
| CN114424200B (en) | Method, system, and computer program product for securely rendering sensitive data | |
| WO2024186642A1 (en) | Digital wallet management | |
| US20140090040A1 (en) | System and method for real time secure image based key generation using partial polygons assembled into a master composite image | |
| CN115280309A (en) | Method, system and computer program product for authentication | |
| CN119766425B (en) | A verifiable cloud outsourcing inner product function encryption method | |
| GR et al. | Decentralized Finance Using Blockchain (DApp) | |
| Karunakar et al. | Secure Card Generation and Access Scheme for e-Seva Applications |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24716935 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2024716935 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 2024716935 Country of ref document: EP Effective date: 20251006 |
|
| ENP | Entry into the national phase |
Ref document number: 2024716935 Country of ref document: EP Effective date: 20251006 |
|
| ENP | Entry into the national phase |
Ref document number: 2024716935 Country of ref document: EP Effective date: 20251006 |
|
| ENP | Entry into the national phase |
Ref document number: 2024716935 Country of ref document: EP Effective date: 20251006 |
|
| WWP | Wipo information: published in national office |
Ref document number: 2024716935 Country of ref document: EP |