SEED SPLITTING AND FIRMWARE EXTENSION FOR SECURE CRYPTOCURRENCY KEY BACKUP, RESTORE, AND TRANSACTION SIGNING PLATFORM APPARATUSES, METHODS AND SYSTEMS
First Claim
1. A transaction signing apparatus, comprising:
- a memory;
a component collection in the memory, including;
a secure firmware transaction signing component implemented by a first hardware security module (HSM);
a processor disposed in communication with the memory, and configured to issue a plurality of processing instructions from the component collection stored in the memory,wherein the processor issues instructions from the secure firmware transaction signing component, stored in the memory, to;
receive, via at least one processor, by the first HSM, a transaction signing request message for a transaction from a transaction signing server (TSS), wherein the transaction signing request message includes an encrypted second master key share associated with a second HSM;
retrieve, via at least one processor, from the first HSM'"'"'s tamper-proof storage, a private key decryption key corresponding to a public key encryption key previously provided by the first HSM to the TSS for the second HSM, wherein the encrypted second master key share is encrypted using the public key encryption key by the second HSM;
decrypt, via at least one processor, by the first HSM, the encrypted second master key share using the retrieved private key decryption key;
retrieve, via at least one processor, from the first HSM'"'"'s tamper-proof storage, a first master key share;
recover, via at least one processor, by the first HSM, a master private key from the first master key share and the decrypted second master key share using a secret sharing method;
determine, via at least one processor, by the first HSM, a transaction hash and a keychain path associated with the transaction signing request message;
generate, via at least one processor, by the first HSM, a signing private key for the determined keychain path using the recovered master private key;
sign, via at least one processor, by the first HSM, the determined transaction hash using the generated signing private key to generate a signature; and
return, via at least one processor, the generated signature.
1 Assignment
0 Petitions
Accused Products
Abstract
The Seed Splitting and Firmware Extension for Secure Cryptocurrency Key Backup, Restore, and Transaction Signing Platform Apparatuses, Methods and Systems (“SFTSP”) transforms transaction signing request, key backup request, key recovery request inputs via SFTSP components into transaction signing response, key backup response, key recovery response outputs. A transaction signing request message for a transaction is received by a first HSM and includes an encrypted second master key share from a second HSM whose access is controlled by M-of-N authentication policy. The encrypted second master key share is decrypted. A first master key share is retrieved. A master private key is recovered from the master key shares. A transaction hash and a keychain path is determined. A signing private key for the keychain path is generated using the recovered master private key. The transaction hash is signed using the signing private key, and the generated signature is returned.
86 Citations
18 Claims
-
1. A transaction signing apparatus, comprising:
-
a memory; a component collection in the memory, including; a secure firmware transaction signing component implemented by a first hardware security module (HSM); a processor disposed in communication with the memory, and configured to issue a plurality of processing instructions from the component collection stored in the memory, wherein the processor issues instructions from the secure firmware transaction signing component, stored in the memory, to; receive, via at least one processor, by the first HSM, a transaction signing request message for a transaction from a transaction signing server (TSS), wherein the transaction signing request message includes an encrypted second master key share associated with a second HSM; retrieve, via at least one processor, from the first HSM'"'"'s tamper-proof storage, a private key decryption key corresponding to a public key encryption key previously provided by the first HSM to the TSS for the second HSM, wherein the encrypted second master key share is encrypted using the public key encryption key by the second HSM; decrypt, via at least one processor, by the first HSM, the encrypted second master key share using the retrieved private key decryption key; retrieve, via at least one processor, from the first HSM'"'"'s tamper-proof storage, a first master key share; recover, via at least one processor, by the first HSM, a master private key from the first master key share and the decrypted second master key share using a secret sharing method; determine, via at least one processor, by the first HSM, a transaction hash and a keychain path associated with the transaction signing request message; generate, via at least one processor, by the first HSM, a signing private key for the determined keychain path using the recovered master private key; sign, via at least one processor, by the first HSM, the determined transaction hash using the generated signing private key to generate a signature; and return, via at least one processor, the generated signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A processor-readable transaction signing non-transient physical medium storing processor-executable components, the components, comprising:
a component collection stored in the medium, including; a secure firmware transaction signing component implemented by a first hardware security module (HSM); wherein the secure firmware transaction signing component, stored in the medium, includes processor-issuable instructions to; receive, via at least one processor, by the first HSM, a transaction signing request message for a transaction from a transaction signing server (TSS), wherein the transaction signing request message includes an encrypted second master key share associated with a second HSM; retrieve, via at least one processor, from the first HSM'"'"'s tamper-proof storage, a private key decryption key corresponding to a public key encryption key previously provided by the first HSM to the TSS for the second HSM, wherein the encrypted second master key share is encrypted using the public key encryption key by the second HSM; decrypt, via at least one processor, by the first HSM, the encrypted second master key share using the retrieved private key decryption key; retrieve, via at least one processor, from the first HSM'"'"'s tamper-proof storage, a first master key share; recover, via at least one processor, by the first HSM, a master private key from the first master key share and the decrypted second master key share using a secret sharing method; determine, via at least one processor, by the first HSM, a transaction hash and a keychain path associated with the transaction signing request message; generate, via at least one processor, by the first HSM, a signing private key for the determined keychain path using the recovered master private key; sign, via at least one processor, by the first HSM, the determined transaction hash using the generated signing private key to generate a signature; and return, via at least one processor, the generated signature.
-
17. A processor-implemented transaction signing system, comprising:
secure firmware transaction signing component means implemented by a first hardware security module (HSM), to; receive, via at least one processor, by the first HSM, a transaction signing request message for a transaction from a transaction signing server (TSS), wherein the transaction signing request message includes an encrypted second master key share associated with a second HSM; retrieve, via at least one processor, from the first HSM'"'"'s tamper-proof storage, a private key decryption key corresponding to a public key encryption key previously provided by the first HSM to the TSS for the second HSM, wherein the encrypted second master key share is encrypted using the public key encryption key by the second HSM; decrypt, via at least one processor, by the first HSM, the encrypted second master key share using the retrieved private key decryption key; retrieve, via at least one processor, from the first HSM'"'"'s tamper-proof storage, a first master key share; recover, via at least one processor, by the first HSM, a master private key from the first master key share and the decrypted second master key share using a secret sharing method; determine, via at least one processor, by the first HSM, a transaction hash and a keychain path associated with the transaction signing request message; generate, via at least one processor, by the first HSM, a signing private key for the determined keychain path using the recovered master private key; sign, via at least one processor, by the first HSM, the determined transaction hash using the generated signing private key to generate a signature; and return, via at least one processor, the generated signature.
-
18. A processor-implemented transaction signing method, comprising:
executing processor-implemented secure firmware transaction signing component instructions implemented by a first hardware security module (HSM), to; receive, via at least one processor, by the first HSM, a transaction signing request message for a transaction from a transaction signing server (TSS), wherein the transaction signing request message includes an encrypted second master key share associated with a second HSM; retrieve, via at least one processor, from the first HSM'"'"'s tamper-proof storage, a private key decryption key corresponding to a public key encryption key previously provided by the first HSM to the TSS for the second HSM, wherein the encrypted second master key share is encrypted using the public key encryption key by the second HSM; decrypt, via at least one processor, by the first HSM, the encrypted second master key share using the retrieved private key decryption key; retrieve, via at least one processor, from the first HSM'"'"'s tamper-proof storage, a first master key share; recover, via at least one processor, by the first HSM, a master private key from the first master key share and the decrypted second master key share using a secret sharing method; determine, via at least one processor, by the first HSM, a transaction hash and a keychain path associated with the transaction signing request message; generate, via at least one processor, by the first HSM, a signing private key for the determined keychain path using the recovered master private key; sign, via at least one processor, by the first HSM, the determined transaction hash using the generated signing private key to generate a signature; and return, via at least one processor, the generated signature.
Specification