×

Secure Escrow Service

  • US 20140093084A1
  • Filed: 02/14/2013
  • Published: 04/03/2014
  • Est. Priority Date: 09/30/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method of restoring a set of confidential information items of a first device to a second device using a set of servers, the method comprising:

  • generating a public and private key pair;

    storing the private key and a corresponding access control on the set of servers, the access control allowing access to the private key only to executable code having a same hash value as a hash value of executable code running on the set of server at a time of generating the public and private key pair;

    receiving a request to restore the set of confidential information items to the second device, the request comprising a first secure object, the first secure object comprising a second secure object encrypted with said private key, the second object comprising a recovery key encrypted with a first user-specific key, the recovery key encrypting the confidential information requested by the second device, the first user-specific key generated by the first device based on answers to a set of user-specific questions;

    decrypting the first secure object using the private key to access the second secure object, the private key accessible only when a hash value of the executable code running on the set of servers at a time of accessing the private key matches the first hash of the executable code running on the set of servers at the time of generating the private key;

    receiving a second user-specific key from the second device, the second user-specific key generated based on a same set of user-specific questions used to generate the first user-specific key by the first device;

    generating a progressively increasing timeout each time the second user-specific key received from the second device does not match the first user-specific key;

    repeating said receiving the second user-specific key and said generating the progressively increasing timeout as long as the second user-specific key received from the second device does not match the first user-specific key;

    decrypting the second secure object with the second user-specific key to get the recovery key when the second user-specific key received from the second device matches the first user-specific key; and

    sending the recovery key to the second device after the second secure object is decrypted.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×