Rezaeighaleh, 2020 - Google Patents
Improving security of crypto wallets in Blockchain technologiesRezaeighaleh, 2020
View PDF- Document ID
- 17650376474041433316
- Author
- Rezaeighaleh H
- Publication year
External Links
Snippet
A big challenge in blockchain and cryptocurrency is securing the private key from potential hackers. Nobody can rollback a transaction made with a stolen key once the network confirms it. The technical solution to protect private keys is the cryptocurrency wallet …
- 238000011084 recovery 0 abstract description 122
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bhutta et al. | A survey on blockchain technology: Evolution, architecture and security | |
| Ahmed et al. | Security in next generation mobile payment systems: A comprehensive survey | |
| US20220277307A1 (en) | Systems and methods for personal identification and verification | |
| Boireau | Securing the blockchain against hackers | |
| US20230412358A1 (en) | Blockchain-implemented security systems and methods for blinded outcome selection | |
| Yang | Security Enhanced EMV‐Based Mobile Payment Protocol | |
| KR20210040078A (en) | Systems and methods for safe storage services | |
| Saranya et al. | Efficient mobile security for E health care application in cloud for secure payment using key distribution | |
| Rezaeighaleh et al. | Deterministic sub-wallet for cryptocurrencies | |
| CN110417557B (en) | Intelligent terminal peripheral data security control method and device | |
| Ahmed et al. | A self-sovereign identity architecture based on blockchain and the utilization of customer’s banking cards: The case of bank scam calls prevention | |
| Wazid et al. | Generic quantum blockchain-envisioned security framework for iot environment: Architecture, security benefits and future research | |
| WO2019199813A2 (en) | Managed high integrity blockchain and blockchain communications that utilize containers | |
| Rezaeighaleh et al. | Multilayered defense-in-depth architecture for cryptocurrency wallet | |
| CN113302876A (en) | Offline non-interception interaction with cryptocurrency network using network-disabled devices | |
| Yi et al. | Blockchain foundations and applications | |
| Rezaeighaleh | Improving security of crypto wallets in Blockchain technologies | |
| Noam et al. | Realizing privacy aspects in blockchain networks | |
| Park et al. | OPERA: A Complete Offline and Anonymous Digital Cash Transaction System with a One-Time Readable Memory | |
| Wilusz et al. | Secure protocols for smart contract based insurance services | |
| Yang et al. | Aep-m: Practical anonymous e-payment for mobile devices using arm trustzone and divisible e-cash | |
| Rezaeighaleh et al. | Efficient off-chain transaction to avoid inaccessible coins in cryptocurrencies | |
| Reddy et al. | ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System | |
| Khan et al. | Digital Currency Issues in the Metaverse | |
| Fritsche | Recommendations for implementing a Bitcoin wallet using smart card |