Processing

Please wait...

Settings

Settings

Goto Application

1. WO2022115559 - CRYPTOGRAPHIC KEY STORAGE SYSTEM AND METHOD

Publication Number WO/2022/115559
Publication Date 02.06.2022
International Application No. PCT/US2021/060759
International Filing Date 24.11.2021
IPC
H04L 9/32 2006.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system
CPC
G06Q 20/065
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
04Payment circuits
06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
065using e-cash
G06Q 20/3227
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
30characterised by the use of specific devices ; or networks
32using wireless devices
322Aspects of commerce using mobile devices [M-devices]
3227using secure elements embedded in M-devices
G06Q 20/363
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
30characterised by the use of specific devices ; or networks
36using electronic wallets or electronic money safes
363with the personal data of a user
G06Q 20/3678
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
30characterised by the use of specific devices ; or networks
36using electronic wallets or electronic money safes
367involving electronic purses or money safes
3678e-cash details, e.g. blinded, divisible or detecting double spending
G06Q 20/38215
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
382insuring higher security of transaction
3821Electronic credentials
38215Use of certificates or encrypted proofs of transaction rights
G06Q 20/3823
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
382insuring higher security of transaction
3823combining multiple encryption tools for a transaction
Applicants
  • COINBASE, INC. [US]/[US]
Inventors
  • SUURKIVI, Jeremy
  • PAU, Andrew
  • JAYAKUMARAN, Jayasudha
Agents
  • KELLY, Scott M.
Priority Data
63/118,18025.11.2020US
63/118,19125.11.2020US
63/189,42117.05.2021US
63/189,42817.05.2021US
Publication Language English (en)
Filing Language English (EN)
Designated States
Title
(EN) CRYPTOGRAPHIC KEY STORAGE SYSTEM AND METHOD
(FR) SYSTÈME ET PROCÉDÉ DE STOCKAGE DE CLÉS CRYPTOGRAPHIQUES
Abstract
(EN) Aspects of the disclosure relate to storing sensitive information. A computing platform may split a signature key into shares, which may be used to regenerate the signature key. The computing platform may encrypt these shares using corresponding SEKs, and may subsequently encrypt the SEKs using corresponding operator keys. The computing platform may distribute the operator keys to user devices via corresponding HSMs. The computing platform may store the encrypted shares, encrypted SEKs, and identifiers of the user devices. The computing platform may receive requests for the encrypted SEKs from the user devices, and may send the respective encrypted SEKs accordingly. The user devices may return, to the computing platform, corresponding decrypted SEKs. The computing platform may use the SEKs to decrypt the encrypted shares, which may then be used to reconstruct the signature key.
(FR) Des aspects de la présente divulgation concernent le stockage d'informations sensibles. Une plate-forme informatique peut diviser une clé de signature en partitions, qui peuvent être utilisées pour régénérer la clé de signature. La plate-forme informatique peut chiffrer ces partitions à l'aide de SEK correspondantes, et peut ensuite chiffrer les SEK à l'aide de clés d'opérateur correspondantes. La plate-forme informatique peut distribuer les clés d'opérateur à des dispositifs utilisateurs par l'intermédiaire de HSM correspondants. La plate-forme informatique peut stocker les partitions chiffrées, les clés chiffrées et les identifiants des dispositifs utilisateurs. La plate-forme informatique peut recevoir des demandes pour les SEK chiffrées, en provenance des dispositifs utilisateurs, et peut envoyer les SEK chiffrées respectives en conséquence. Les dispositifs utilisateurs peuvent retourner, à la plate-forme informatique, les SEK déchiffrées correspondantes. La plate-forme informatique peut utiliser les SEK pour déchiffrer les partitions chiffrées, qui peuvent ensuite être utilisées pour reconstruire la clé de signature.
Latest bibliographic data on file with the International Bureau