MULTI-APPROVAL SYSTEM USING M OF N KEYS TO RESTORE A CUSTOMER WALLET
First Claim
1. A computing system comprising:
- at least one processor;
at least one memory communicatively coupled to the at least one processor;
at least one network interface communicatively coupled to the at least one processor and configured to communicate with a customer device and a trusted third party;
wherein the at least one network interface is configured to receive, from the customer device, identity data for a customer and a request to restore a customer wallet;
wherein the at least one processor is configured to verify the identity data for the customer received from the customer device;
when the at least one processor verifies the identity data for the customer received from the customer device, the at least one network interface is configured to communicate a request for a first key associated with the customer wallet to a key repository for the trusted third party; and
wherein the at least one processor is configured to restore the customer wallet using the first key associated with the customer wallet and a second key associated with the customer wallet.
3 Assignments
0 Petitions
Accused Products
Abstract
A computing system that includes processor(s), memory(s) and a network interface that communicates with a customer device and a trusted third party. The at least one network interface is configured to receive, from the customer device, identity data for a customer and a request to restore a customer wallet. The at least one processor is configured to verify the identity data for the customer received from the customer device. When the at least one processor verifies the identity data for the customer received from the customer device, the at least one network interface is configured to communicate a request for a first key associated with the customer wallet to a key repository for the trusted third party. The at least one processor is configured to restore the customer wallet using the first key associated with the customer wallet and a second key associated with the customer wallet.
-
Citations
33 Claims
-
1. A computing system comprising:
-
at least one processor; at least one memory communicatively coupled to the at least one processor; at least one network interface communicatively coupled to the at least one processor and configured to communicate with a customer device and a trusted third party; wherein the at least one network interface is configured to receive, from the customer device, identity data for a customer and a request to restore a customer wallet; wherein the at least one processor is configured to verify the identity data for the customer received from the customer device; when the at least one processor verifies the identity data for the customer received from the customer device, the at least one network interface is configured to communicate a request for a first key associated with the customer wallet to a key repository for the trusted third party; and wherein the at least one processor is configured to restore the customer wallet using the first key associated with the customer wallet and a second key associated with the customer wallet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
a computing device configured to communicate with a trusted third party and a customer device for a customer; and a key repository communicatively coupled with the computing device; wherein the computing device is configured to receive, from a customer device, identity data for a customer and a request to restore a customer wallet; wherein the computing device is configured to verify the identity data for the customer received from the customer device; wherein the computing device is configured to communicate a request for a first key associated with the customer wallet to a key repository for the trusted third party; and wherein the computing device restores the customer wallet using the first key associated with the customer wallet and a second key associated with the customer wallet. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computerized method comprising:
-
receiving, at a computing device, identity data for a customer and a request to restore a customer wallet from a customer device; verifying, at the computing device, the identity data for the customer received from the customer device; when the identity data for the customer received from the customer device is verified, communicating a request for a first key associated with the customer wallet to a key repository for a trusted third party; receiving the first key associated with the customer wallet from the key repository for the trusted third party; and wherein the customer wallet can be restored using the first key associated with the customer wallet and a second key associated with the customer wallet. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification