Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography
First Claim
1. A method for distributing multiple cryptographic keys used to access data, comprising:
- receiving, by a receiving device of a processing server, a data signal superimposed with an access key request, wherein the access key request includes at least a number, n, greater than 2, of requested keys;
generating, by the processing server, n key pairs using a key pair generation algorithm, wherein each key pair includes a private key and a public key;
deriving, by the processing server, an access private key by applying the private key included in each of the n key pairs to a key derivation algorithm;
generating, by the processing server, an access public key corresponding to the derived access private key using the key pair generation algorithm;
electronically transmitting, by a transmitting device of the processing server, a data signal superimposed with a private key included in one of the n key pairs for each of the n key pairs;
storing, in a memory of the processing server, a transfer key pair including a transfer public key and a transfer private key;
receiving, by the receiving device of the processing server, a data signal superimposed with a shared public key from each of n computing devices;
generating, by the processing server, n shared secrets, wherein each shared secret is generated using a shared public key of the n shared public keys and the transfer private key and the key pair generation algorithm; and
encrypting, by the processing server, the private key included in each of the n key pairs with one of the n shared secrets using an encryption algorithm, whereinthe private key included superimposed in the electronically transmitted data signal is the respective encrypted private key.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for distributing multiple cryptographic keys used to access data includes: receiving a data signal superimposed with an access key request, wherein the access key request includes at least a number, n, greater than 1, of requested keys; generating n key pairs using a key pair generation algorithm, wherein each key pair includes a private key and a public key; deriving an access private key by applying the private key included in each of the n key pairs to a key derivation algorithm; generating an access public key corresponding to the derived access private key using the key pair generation algorithm; and electronically transmitting a data signal superimposed with a private key included in one of the n key pairs for each of the n key pairs.
6 Citations
24 Claims
-
1. A method for distributing multiple cryptographic keys used to access data, comprising:
-
receiving, by a receiving device of a processing server, a data signal superimposed with an access key request, wherein the access key request includes at least a number, n, greater than 2, of requested keys; generating, by the processing server, n key pairs using a key pair generation algorithm, wherein each key pair includes a private key and a public key; deriving, by the processing server, an access private key by applying the private key included in each of the n key pairs to a key derivation algorithm; generating, by the processing server, an access public key corresponding to the derived access private key using the key pair generation algorithm; electronically transmitting, by a transmitting device of the processing server, a data signal superimposed with a private key included in one of the n key pairs for each of the n key pairs; storing, in a memory of the processing server, a transfer key pair including a transfer public key and a transfer private key; receiving, by the receiving device of the processing server, a data signal superimposed with a shared public key from each of n computing devices; generating, by the processing server, n shared secrets, wherein each shared secret is generated using a shared public key of the n shared public keys and the transfer private key and the key pair generation algorithm; and encrypting, by the processing server, the private key included in each of the n key pairs with one of the n shared secrets using an encryption algorithm, wherein the private key included superimposed in the electronically transmitted data signal is the respective encrypted private key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for distributing multiple cryptographic keys used to access data, comprising:
-
receiving, by a receiving device of a processing server, a data signal superimposed with an access key request, wherein the access key request includes at least a number, n, greater than 2, of requested keys; generating, by the processing server, n key pairs using a key pair generation algorithm, wherein each key pair includes a private key and a public key; deriving, by the processing server, an access private key by applying the private key included in each of the n key pairs to a key derivation algorithm; generating, by the processing server, an access public key corresponding to the derived access private key using the key pair generation algorithm; electronically transmitting, by a transmitting device of the processing server, a data signal superimposed with a private key included in one of the n key pairs for each of the n key pairs; and electronically transmitting, by the transmitting device of the processing server, a data signal superimposed with a transaction request to a node in a blockchain network, wherein the transaction request includes at least a destination address signed using the derived access private key. - View Dependent Claims (19, 20, 21)
-
-
10. A system for distributing multiple cryptographic keys used to access data, comprising:
-
a transmitting device of a processing server; a memory of the processing server configured to store a transfer key pair including a transfer public key and a transfer private key; a receiving device of the processing server configured to receive a data signal superimposed with an access key request, wherein the access key request includes at least a number, n, greater than 2, of requested keys; and a processor of the processing server configured to generate n key pairs using a key pair generation algorithm, wherein each key pair includes a private key and a public key, derive an access private key by applying the private key included in each of the n key pairs to a key derivation algorithm, and generate an access public key corresponding to the derived access private key using the key pair generation algorithm, wherein the transmitting device of the processing server is configured to electronically transmit a data signal superimposed with a private key included in one of the n key pairs for each of the n key pairs, the receiving device of the processing server is further configured to receive a data signal superimposed with a shared public key from each of n computing devices, the processor of the processing server is further configured to generate n shared secrets, wherein each shared secret is generated using a shared public key of the n shared public keys and the transfer private key and the key pair generation algorithm, and encrypt the private key included in each of the n key pairs with one of the n shared secrets using an encryption algorithm, and the private key included superimposed in the electronically transmitted data signal is the respective encrypted private key. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for distributing multiple cryptographic keys used to access data, comprising:
-
a transmitting device of a processing server; a receiving device of the processing server configured to receive a data signal superimposed with an access key request, wherein the access key request includes at least a number, n, greater than 2, of requested keys; and a processor of the processing server configured to generate n key pairs using a key pair generation algorithm, wherein each key pair includes a private key and a public key, derive an access private key by applying the private key included in each of the n key pairs to a key derivation algorithm, and generate an access public key corresponding to the derived access private key using the key pair generation algorithm, wherein the transmitting device of the processing server is configured to electronically transmit a data signal superimposed with a private key included in one of the n key pairs for each of the n key pairs, and electronically transmit a data signal superimposed with a transaction request to a node in a blockchain network, wherein the transaction request includes at least a destination address signed using the derived access private key. - View Dependent Claims (22, 23, 24)
-
Specification