Method and apparatus for restoring access to digital assets
First Claim
1. A method for restoring access to a digital asset, the method comprising:
- receiving at a first server a request to restore access to a digital asset of a digital wallet, the digital wallet having had a first cryptographic key that is no longer available;
generating at the first server a first representation of the request to restore access to the digital asset, the first server having a second cryptographic key;
presenting the first representation to a second server having a third cryptographic key, the third cryptographic key cryptographically signing the first representation if a condition is met;
if the condition is met, retrieving a second representation from the second server;
determining if the second representation meets a condition on the first server;
if the condition is met, the second cryptographic key cryptographically signing the second representation;
generating an indication that the request is cryptographically approved; and
using the indication to restore access to the digital asset of the digital wallet.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus may include receiving a request to restore access to digital assets of a digital wallet. The digital assets are accessed via M-number of cryptographic keys. Access to at least N-out-of-M keys is necessary in order to access the digital assets at a given time. N is a number less than M. The M-number of keys include at least a first key, a second key, and a third key. One of the M keys is stored on a first server. One of the M keys is stored on a second server. The key stored on the first server corresponds to the second key. The key stored on the second server corresponds to the third key. The second server is separated from the first server. With certain embodiments, the second server is totally disconnected from any network.
-
Citations
17 Claims
-
1. A method for restoring access to a digital asset, the method comprising:
-
receiving at a first server a request to restore access to a digital asset of a digital wallet, the digital wallet having had a first cryptographic key that is no longer available; generating at the first server a first representation of the request to restore access to the digital asset, the first server having a second cryptographic key; presenting the first representation to a second server having a third cryptographic key, the third cryptographic key cryptographically signing the first representation if a condition is met; if the condition is met, retrieving a second representation from the second server; determining if the second representation meets a condition on the first server; if the condition is met, the second cryptographic key cryptographically signing the second representation; generating an indication that the request is cryptographically approved; and using the indication to restore access to the digital asset of the digital wallet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for restoring access to a digital asset, the method comprising:
-
receiving at a third server a request to restore access to a digital asset of a digital wallet, the receiving from the digital wallet having a first cryptographic key, the first cryptographic key previously used with a second private cryptographic key that was on a first server to access the digital asset and now the second private cryptographic key is no longer available on the first server and the digital asset is no longer accessible; generating at the third server a first representation of the request to restore access to the digital asset, the third server having a copy of a second public cryptographic key that was available on the first server and a copy of a third public cryptographic key that is available on the second server; presenting the first representation to the digital wallet having the first cryptographic key, the first cryptographic key cryptographically signing the first representation; generating at the digital wallet a second representation with the content resulting from the step above; presenting a second representation to the third server, the third server determining if the second representation meets a condition of the first cryptographic key; if the condition is met, presenting the second representation to the second server, and having its third public cryptographic key cryptographically sign the second representation; generating an indication that the request is cryptographically approved; and using the indication to restore access to the digital asset of the digital wallet. - View Dependent Claims (14, 15, 16, 17)
-
Specification