Abstract: Exemplary embodiments provided herein include a method for safe creation, custody, recovery and management of a digital asset, agnostic to an underlying blockchain technology, the method including establishing a virtual layer where three private keys are generated, transacting the digital asset by using two of three of the private keys and multi-party computation techniques, abstracting interactions between the three private keys from the underlying blockchain technology, having a digital asset transaction considered as a single-signature by the underlying blockchain technology, and recovering the digital asset if any of the three private keys is no longer available. Additionally, the digital asset may be a cryptocurrency, and a party may be disconnected from any network during the normal user operation phases. Furthermore, the digital asset transaction may be considered as a single-signature, as seen by the underlying blockchain technology, and is associated to a public key PK_ABC.
Type:
Grant
Filed:
November 18, 2020
Date of Patent:
February 27, 2024
Assignee:
Conio Inc.
Inventors:
Vincenzo Di Nicola, Massimiliano Sala, Alessio Meneghetti, Riccardo Longo
Abstract: Embodiments of the present technology pertain to systems and methods for secure creation, custody, recovery, and management of a digital asset. Embodiments include receiving a custody request for a master private key. Embodiments further include dividing the master private key into a plurality master private key portions using a cryptographic algorithm, the cryptographic algorithm comprising a threshold number of the plurality master private key portions necessary for later reconstruction of the master private key, the threshold number of the plurality master private key portions being a subset of the plurality master private key portions.
Abstract: A method and apparatus may include receiving a request to restore access to digital assets of a digital wallet. The digital assets are accessed via M-number of cryptographic keys. Access to at least N-out-of-M keys is necessary in order to access the digital assets at a given time. N is a number less than M. The M-number of keys include at least a first key, a second key, and a third key. One of the M keys is stored on a first server. One of the M keys is stored on a second server. The key stored on the first server corresponds to the second key. The key stored on the second server corresponds to the third key. The second server is separated from the first server. With certain embodiments, the second server is totally disconnected from any network.