Secure Key Wallet

Business excelenece

Balance Scroecards
Task & Project Control

Let us know what you're looking for

Do you prefer to ask us directly?

Call us +420 605 203 938 (the Czech Republic)

or use this contacts

Secure Key Wallet

A Secure Key Wallet is a tool for securely storing passwords that help keep all company information safe.

What Is a Cryptographic Data Wallet

A cryptographic data wallet, in short a Secure Key Wallet, is a personal storage for keys and passwords that provide access to data vaults. You can use it on all your devices, while its security is reliably ensured.
The Secure Key Wallet stores access codes to data vaults. For each vault you have access to, an unlocking key is required. You receive the key in encrypted form, and it always remains stored in your Secure Key Wallet.

What Does the Secure Key Wallet Secure

The wallet itself allows you to store passwords, but that is not its primary purpose. Its main purpose is the secure management of keys to data vaults. Indirectly, it therefore secures everything that can be stored in vaults – notes, messages, discussions and comments, information, project requests, etc.

Does the Secure Key Wallet Allow File Encryption?

Yes, regular files can be encrypted using end-to-end encryption with the help of keys stored in the Secure Key Wallet.

How to Activate the Secure Key Wallet

To use the wallet, it must be enabled for your organization. If necessary, contact your administrator. You can activate the wallet on a trusted device that you have named and verified.

On the Settings and Security page, you will find the Activate wallet function for your trusted device. After entering your password, the wallet will be activated.

FAQ – Frequently Asked Questions

FAQ – Frequently Asked Questions

Frequently Asked Questions About the Secure Key Wallet

Can Someone Remove Keys from My Wallet?

No one can access your wallet, and no one can remove anything from it without you. A vault administrator can revoke your access to a vault. To access a data vault, you must have the appropriate permissions (granted by the administrator) and the access code.

If the administrator revokes your permission, the key remains in your wallet, but you cannot use it. It is like having a key to a door, but there is also a gate in front of it and you do not have the key to that gate.

The key is automatically removed from your wallet when you unlock the Secure Key Wallet yourself. After unlocking, the application verifies:

  1. Whether new keys are waiting to be added to the Secure Key Wallet
  2. Whether any keys have become invalid because the administrator has revoked access to the vault

Can I Use My Login Password as the Code?

The system never stores passwords in an unencrypted form. From the system’s perspective, it makes no difference if you use the same password. However, we strongly discourage this. Doing so reduces your security on your side – if you log in to AyMINE in front of someone, they may capture your password and then gain access to both the system and the wallet. If you use a different code for the wallet, this risk is eliminated.

How Much Does Wallet Security Depend on Password Length?

As with any password, if someone gains the ability to attempt a brute-force attack, a shorter password may eventually be guessed. Even though it can only be used on your unlocked device, a short password creates risk. The system does not allow passwords shorter than 6 characters.

The Password Is Labeled as a PIN. Does It Have to Be Numeric?

Access to the wallet is labeled as a PIN specifically to avoid confusion with the system login password. The PIN/password can consist of any characters, including diacritics and special characters; you are not limited to numbers.

Why Is a Fingerprint Not Used?

The password is the code the Secure Key Wallet uses for decryption. Without the password, it cannot be opened. Therefore, you must enter it consistently on every device.

A fingerprint verifies your identity, but the code itself cannot be derived from it. It can therefore never serve as a password for decrypting content. (If some applications claim otherwise, they are not encrypting with your unique password.)

Mobile phones from reputable manufacturers allow you to store a password after entering it into the password field and protect it with a fingerprint. Many laptops offer the same function. You can then open the Secure Key Wallet easily using your fingerprint. However, do not forget your password. When accessing from a new device, you will need to enter it.

Does the Application Store the Wallet Password Anywhere?

While the wallet is unlocked in the application, a decoding string is stored in the application’s memory, but it is never stored in a way that makes it accessible outside the application. It is automatically removed when you are not using access to encrypted data. The application then locks itself and removes the Secure Key Wallet password. To use it again, you must re-enter the password.

The login PIN is never transmitted from your device – see more below in the security section.

Can I Store Bitcoins in the Secure Key Wallet?

The Secure Key Wallet can only be used for keys to data vaults and possibly your own passwords. However, in AyMINE you can create your own data vaults and store any data in them – in principle, even bitcoins. Please note that AyMINE and data vaults are not designed for storing cryptocurrencies, and the operator is not liable for any potential damages.

Secure Key Wallet Security in Detail

Secure Key Wallet Security in Detail

How the Secure Key Wallet Is Secured

Security Overview

  1. It is always protected by strong encryption resistant even to quantum attacks
  2. It is opened only for the purpose of using a stored key
  3. It is synchronized between the user’s trusted devices. Synchronization always transfers the wallet in a locked state
  4. The wallet code is always used locally on the device and is never transmitted anywhere (not even in encrypted form)

Security Details

Encryption

The Secure Key Wallet is encrypted using very strong AES 512 encryption. It is fully resistant even to quantum attacks. There is no known way to break the encryption without knowledge of the code.

Password Strength

Security naturally also depends on password complexity. The password you enter to access the wallet is extended multiple times using unique codes tied to your account, login credentials, and your company account. Knowing your password alone is not sufficient for someone to use the Secure Key Wallet unless they are also using your account.

Account protection itself is secured by two-factor authentication and the requirement to register a device as secure and trusted (third verification step). Without these steps, it is not possible to activate the Secure Key Wallet.

Physical Location

The Secure Key Wallet is stored on your device in encrypted form. If you do not use the device for more than one day, it is automatically removed. It is automatically downloaded from the server after successful verification.

If someone steals your device, they cannot access the wallet without the access codes. If they attempt a brute-force attack, access will be blocked. Additionally, you can block the device from any other trusted device, making access to the wallet completely impossible on that device.

Secure Handling of the Key

Your personal key is never transmitted over the Internet and is never stored anywhere – not even in encrypted form. Therefore, it cannot be obtained through network interception or any server-side procedure.

What is transmitted over the Internet between the device and the server is the encrypted Secure Key Wallet. However, it can only be decrypted on your device.