Search

JP-2026076308-A - BioLockseed

JP2026076308AJP 2026076308 AJP2026076308 AJP 2026076308AJP-2026076308-A

Abstract

[Problem] To provide a method for storing a biometric vault system on a blockchain. [Solution] The biometric vault system comprises one or more biometric vaults, each biometric vault locking its respective secret value, obtaining at least one biometric reading, identifying multiple biometric features from at least one biometric reading, generating one or more first biometric vaults, generating one or more blockchain transactions, and transmitting one or more blockchain transactions to the blockchain network. Each blockchain transaction includes its respective output which includes at least a portion of its respective second biometric vault, and each second biometric vault includes its respective first biometric vault. [Selection Diagram] Figure 13

Inventors

  • セルギエヴァ,アントアネタ
  • ライト,クレイグ,スティーヴン

Assignees

  • エヌチェーン ライセンシング アーゲー

Dates

Publication Date
20260511
Application Date
20260212
Priority Date
20200824

Claims (20)

  1. A computer implementation method for storing a biometric vault system on a blockchain, wherein the biometric vault system comprises one or more biometric vaults, each biometric vault locks its respective secret value, and the method is The steps include obtaining at least one biometric reading, The steps include identifying multiple biological features from at least one biometric reading, A step of generating one or more first biometric vaults, each first biometric vault corresponding to each target biofeature of the plurality of biofeatures, each comprising a plurality of binary data pairs, each data pair comprising a first binary value and a second binary value, at least some of the first binary values being first binary representations of the target biofeatures for each other biofeatures of the identified biofeatures, and at least a first threshold number of the second binary values paired with each of the first binary representations are required to reconstruct each first level secret value, A step of generating one or more blockchain transactions, wherein each blockchain transaction includes an output that includes at least a portion of a second biometric vault, each second biometric vault includes a first biometric vault, and each of the one or more blockchain transactions includes its available output. The steps include sending one or more blockchain transactions to the blockchain network, The steps include revoking at least a portion of each second biometric vault contained within each blockchain transaction by using the respective available outputs, A method that includes this.
  2. The method according to claim 1, wherein at least a portion of each of the second biometric vaults is encrypted with the respective encryption key.
  3. The method according to claim 1 or 2, wherein at least a portion of each of the second biometric vaults is a complete second biometric vault.
  4. The method according to any one of claims 1 to 3, comprising the step of determining a plurality of respective first vectors for each first biometric vault and each target biofeedback, wherein each first vector defines the target biofeedback for each other identified biofeedback, and each respective first binary representation is generated based on the respective first vector.
  5. The method according to claim 4, wherein each first vector comprises values for one, some, or all of the relative distance, relative angle, and/or relative orientation of the target biofeed to each of the other identified biofeeds.
  6. The method according to claim 5, wherein each first binary representation is based on the respective second binary representation of one, some, or all of the relative distances, relative angles, and/or relative orientations of the target biofeed to each of the other identified biofeeds.
  7. For each target biological characteristic, the above method is: The method according to claim 4, comprising the step of applying a respective first transformation to each value of each respective first vector, wherein each first transformation is configured to remove the correlation between the target biofeature and each of the other identified biofeature, and each of the first binary representations is based on the respective transformed values.
  8. The method according to claim 7, wherein, for each target biological feature, the respective first transformation is configured to eliminate the correlation by transforming the distance and/or angle of the respective target biological feature to the respective other identified biological feature.
  9. The method according to claim 8, wherein the relative distance of each of the target biological features is transformed as a function of their respective coordinates and rotation-invariant properties.
  10. The method according to claim 8 or 9, wherein the relative angles of each of the target biological features are transformed as a function of the respective pseudo-randomly generated transformation values.
  11. The method according to any one of claims 1 to 10, wherein, for each first biometric vault, at least some of the first binary values are the respective simulated binary representations of the respective simulated biological features, the simulated biological features being features not present in the biometric readings, and the respective second binary values paired with the respective simulated binary representations are the respective simulated binary values.
  12. The method according to claim 11, comprising the step of determining, for each first biometric vault, a second vector for each of the simulated biological features, such that the minimum distance between each of the first vectors and each of the second vectors exceeds a predetermined threshold, wherein each second binary representation is generated based on the respective second vectors.
  13. The method according to claim 11 or 12, wherein, for each first biometric vault, the total number of simulated biological features is greater than the total number of biological features.
  14. The method according to any one of claims 1 to 13, wherein, for each first biometric vault, the first level secret value is a pseudo-randomly generated value.
  15. For each first biometric vault, The method according to any one of claims 1 to 14, comprising the step of dividing each of the first level secret values into at least the elements of the first threshold number, wherein each of the first level secret values is encoded into a first polynomial function, the coefficients of each of the first polynomial functions are the elements of the elements of the first threshold number, and each of the second binary values paired with each of the first binary representations is generated by evaluating the first polynomial function using each of the first binary representations.
  16. The method according to any one of claims 1 to 15, comprising the step of generating a plurality of first biometric vaults.
  17. The method according to claim 16, as dependent on claim 7, wherein a different first transformation is applied to generate at least one of the plurality of biometric vaults.
  18. The method according to claim 16, wherein the first level secret value is required for generating the second level secret value, a second threshold value.
  19. The method according to claim 18, wherein the second-level secret value is a pseudo-randomly generated value.
  20. The method according to claim 18 or 19, comprising the step of dividing each of the second-level secret values into at least the elements of the second threshold number, wherein the second-level secret values are encoded into a second polynomial function, the coefficients of the second polynomial function are the elements of the elements of the second threshold number, and the second-level secret values can be reconstructed by evaluating the second polynomial function in each of the first-level secret values.

Description

This disclosure relates to a method for storing a biometric vault system on a blockchain. Public-key cryptography is a type of cryptographic system that uses a key pair: a private key known only to its owner, and a public key generated based on the corresponding private key, which can be distributed without compromising the security of the private key. Public-key cryptography allows a sender to encrypt a message using the recipient's public key (i.e., the public key corresponding to the private key known only to the recipient). Therefore, an encrypted message can only be decrypted using the recipient's private key. Similarly, a sender may sign a message using their private key, for example, to prove that the message was sent by them and/or to indicate that the sender agrees to the message. The signer (i.e., the party generating the signature) uses their private key to create a digital signature based on the message. Anyone with the signer's corresponding public key can use the same message and the digital signature on the message to verify whether the signature was validly created, i.e., whether the signature was actually created using the signer's private key. Private keys are typically generated using a "seed." A seed refers to confidential data known only to the owner(s) of the private keys that should be generated by that seed. One or more private keys are generated as a function of the seed. For example, a hash function can be applied to the seed to generate a private key, sometimes called a "master private key." In addition to the initial generation, the same private key can be regenerated, or reconstructed, using the same seed. For example, even if a user loses their private key(s), they can reconstruct those keys as long as they know the seed. One specific area that utilizes public-key cryptography is blockchain technology. In addition to encrypting messages (e.g., data stored in transaction output), public keys are also used to "lock," or assign, the output to the owner of the corresponding private key. Only the owner of the private key can then "unlock" the output. Further details regarding the use of public-key cryptography in the context of blockchain are provided below. One common standard for managing private keys for use on a blockchain is hierarchical deterministic (HD) key management. For example, in BIP (Bitcoin Improvement Proposal) 32, the hierarchical key tree is derived from a single entropy source using a deterministic public algorithm. The first step of the algorithm is to generate a seed. The seed is generated as a random bit string (256 bits recommended) from a pseudo-random number generator (PRNG). HD key management efficiently solves the bag-of-key problem. The remaining challenge is that users need to remember and/or write down the seed, store it securely, and communicate it when they need to reconstruct or share their private key ("wallet," sometimes called a key wallet). Humans tend to fail at these tasks when the seed is a raw bit string. This problem was solved in BIP39. A system was proposed that abstracts the entropy required for the master key into a mnemonic phrase. Mnemonic phrases are easy to manipulate and more user-friendly than raw seeds. The remaining challenge is that security and usability are conflicting objectives. Wallet security increases with increasing seed entropy. This, in turn, increases the number of random words in the mnemonic phrase to such an extent that it becomes increasingly difficult or impossible to remember. To balance this challenge, BIP39 specifies an "acceptable entropy size" in the range of 128 to 256 bits and proposes a dictionary of 2¹¹ words. A phrase length of up to 24 words is then provided. Therefore, the remaining challenge consists of simultaneously achieving the following: Firstly, generating a user-friendly seed that doesn't require memorization and is easy to recall; and secondly, generating a seed with no limitations on entropy size. Therefore, it is desirable to overcome either of these challenges, or even more desirable to achieve the dual objective of overcoming both challenges simultaneously. Similar considerations may apply to other types of hierarchical domain wallets, or more generally, to any method for generating the seed from which the keys are derived. According to one aspect disclosed herein, a computer implementation method for storing a biometric vault system on a blockchain, wherein the biometric vault system comprises one or more biometric vaults, each biometric vault locking its respective secret value, and the method comprises the steps of: obtaining at least one biometric reading; identifying a plurality of biometric features from at least one biometric reading; and generating one or more first biometric vaults, each first biometric vault corresponding to each target biometric feature of the plurality of biometric features, each comprising a plurality of binary data pairs, each data pair comprising a first bi