Abstract: A digital asset custodial system for maintaining custody of, and controlling access to, cryptocurrencies and/or other digital assets, is disclosed. The digital asset custodial system includes multiple layers of security to enable large volumes of digital assets to be maintained in a secure manner. The digital asset custodial system can include a combination of biometric-based multi-user validation, transaction risk analysis, and a hardware security module (HSM) that provides authentication/validation functionality and secure storage of private keys of digital assets.
Type:
Application
Filed:
June 18, 2018
Publication date:
August 29, 2019
Inventors:
Nathan P. McCauley, Diogo Monica, Boaz Avital, Riyaz D. Faizullabhoy, Kristen B. Howard, João M. P. Peixoto, Viktor P. Stanchev
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a cryptoasset custodial system using power down of server computers to protect cryptographic keys. The cryptoasset custodial system includes a plurality of server computers. Each server computer of the plurality of server computers includes a volatile memory configured to store a cryptographic key associated with a cryptographic transaction to be performed, by the server computer, on a blockchain. A computing device is communicatively coupled to the volatile memory and configured to perform, using the cryptographic key, the cryptographic transaction on the blockchain. Responsive to detecting an interruption in an electrical power supply to the server computer, the stored cryptographic key is deleted from the volatile memory to prevent access to the cryptographic key.
Type:
Application
Filed:
January 22, 2019
Publication date:
July 23, 2020
Inventors:
Diogo Monica, Nathan P. McCauley, Riyaz D. Faizullabhoy
Abstract: Methods, systems, and apparatus, including medium-encoded computer program products, for secure storage and retrieval of information, such as private keys, useable to control access to a blockchain, include, in at least one aspect, a method including: receiving a request to take an action with respect to a vault of multiple different vaults in a cryptoasset custodial system; authenticating, by an HSM, the policy map for the vault based on a cryptographic key controlled by the HSM; checking, by the HSM, the action against the policy map for the vault when the policy map for the vault is authenticated based on the cryptographic key controlled by the HSM; and effecting, by the HSM, the action when the action is confirmed to be in accordance with the policy map for the vault.
Type:
Application
Filed:
January 23, 2019
Publication date:
August 29, 2019
Inventors:
Diogo Monica, Nathan P. McCauley, Boaz Avital, Riyaz D. Faizullabhoy
Abstract: An approval request is transmitted for a cryptoasset transaction in accordance with a policy stored in a hardware security module (“HSM”). The policy specifies at least one specific approver required for approval of the cryptoasset transaction. The approval request is transmitted to a computer device associated with the specific approver and is configured to cause the computer device to prompt the specific approver to approve the cryptoasset transaction. A security key is received from a hardware security token associated with the specific approver. The security key indicates an approval of the cryptoasset transaction. A risk analysis module authenticates an identity of the specific approver based on the security key. Responsive to the authenticating of the identity of the specific approver, the HSM signs the cryptoasset transaction using a cryptographic key stored in the HSM.
Type:
Application
Filed:
March 4, 2022
Publication date:
June 16, 2022
Inventors:
Nathan P. McCauley, Diogo Monica, Boaz Avital, Riyaz D. Faizullabhoy
Abstract: A method of establishing secure communication between a first mobile computing device and a second mobile computing device includes receiving a first request from the first mobile computing device to securely communicate with the second mobile computing device via a Wi Fi hot spot, verifying that the first mobile computing device is trusted, generating a public key and a private key based on a trusted certificate, sending the private key to the first mobile computing device via the Wi-Fi hot spot, receiving a second request from the second mobile computing device to securely communicate with the first mobile computing device, verifying that the second mobile computing device is trusted, and sending the public key to the second mobile computing device.
Abstract: An approval request is transmitted for a cryptoasset transaction in accordance with a policy stored in a hardware security module (“HSM”). The policy specifies at least one specific approver required for approval of the cryptoasset transaction. The approval request is transmitted to a computer device associated with the specific approver and is configured to cause the computer device to prompt the specific approver to approve the cryptoasset transaction. A security key is received from a hardware security token associated with the specific approver. The security key indicates an approval of the cryptoasset transaction. A risk analysis module authenticates an identity of the specific approver based on the security key. Responsive to the authenticating of the identity of the specific approver, the HSM signs the cryptoasset transaction using a cryptographic key stored in the HSM.
Type:
Application
Filed:
July 28, 2021
Publication date:
November 18, 2021
Inventors:
Nathan P. McCauley, Diogo Monica, Boaz Avital, Riyaz D. Faizullabhoy
Abstract: An approval request is transmitted for a cryptoasset transaction in accordance with a policy stored in a hardware security module (“HSM”). The policy specifies at least one specific approver required for approval of the cryptoasset transaction. The approval request is transmitted to a computer device associated with the specific approver and is configured to cause the computer device to prompt the specific approver to approve the cryptoasset transaction. A security key is received from a hardware security token associated with the specific approver. The security key indicates an approval of the cryptoasset transaction. A risk analysis module authenticates an identity of the specific approver based on the security key. Responsive to the authenticating of the identity of the specific approver, the HSM signs the cryptoasset transaction using a cryptographic key stored in the HSM.
Type:
Application
Filed:
September 24, 2019
Publication date:
February 25, 2021
Inventors:
Nathan P. McCauley, Diogo Monica, Boaz Avital, Riyaz D. Faizullabhoy
Abstract: Methods, systems, and apparatus for risk mitigation for a cryptoasset custodial system include transmitting an endorsement request for a cryptoasset transaction to a user device configured to cause the user device to prompt a user to endorse the cryptoasset transaction. Multiple data points are collected from mobile devices associated with the user. The data points indicate an identity of the user. A cryptographic endorsement of the cryptoasset transaction is received from the user device. A graphical visualization including a risk metric is generated based on the data points. The risk metric indicates a risk of accepting the cryptographic endorsement from the user device. Generating the graphical visualization includes determining whether the plurality of data points matches expected values.
Type:
Application
Filed:
September 20, 2019
Publication date:
February 25, 2021
Inventors:
Nathan P. McCauley, Diogo Monica, Boaz Avital, Riyaz D. Faizullabhoy, Joao Manuel Pinto Peixoto, Kristen B. Howard
Abstract: Methods and systems for secure storage and retrieval of information, such as private keys, useable to control access to a blockchain, include: receiving, in a cryptoasset custodial system, a request to authorize a staking operation associated with a blockchain, wherein the staking operation is associated with a private key of an asymmetric cryptographic key pair, the private key is usable to control ownership of a cryptoasset recorded in the blockchain, and the private key is securely held in the custodial system; performing, in response to the request, a portion of the proof-of-stake protocol in a hardware security module using logic designed for the protocol, wherein the logic in the hardware security module is configured to authorize the staking operation by digitally signing an associated staking transaction; and sending the digitally signed staking transaction to another computer to effect the staking operation on behalf of the user.
Type:
Application
Filed:
April 7, 2022
Publication date:
September 1, 2022
Inventors:
Diogo Monica, Nathan P. McCauley, Boaz Avital, Riyaz D. Faizullabhoy
Abstract: A method of establishing secure communication between a first mobile computing device and a second mobile computing device includes receiving a first request from the first mobile computing device to securely communicate with the second mobile computing device via a Wi Fi hot spot, verifying that the first mobile computing device is trusted, generating a public key and a private key based on a trusted certificate, sending the private key to the first mobile computing device via the Wi-Fi hot spot, receiving a second request from the second mobile computing device to securely communicate with the first mobile computing device, verifying that the second mobile computing device is trusted, and sending the public key to the second mobile computing device.
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a cryptoasset custodial system using power down of server computers to protect cryptographic keys. The cryptoasset custodial system includes a plurality of server computers. Each server computer of the plurality of server computers includes a volatile memory configured to store a cryptographic key associated with a cryptographic transaction to be performed, by the server computer, on a blockchain. A computing device is communicatively coupled to the volatile memory and configured to perform, using the cryptographic key, the cryptographic transaction on the blockchain. Responsive to detecting an interruption in an electrical power supply to the server computer, the stored cryptographic key is deleted from the volatile memory to prevent access to the cryptographic key.
Type:
Grant
Filed:
January 22, 2019
Date of Patent:
August 16, 2022
Assignee:
Anchor Labs, Inc.
Inventors:
Diogo Monica, Nathan P. McCauley, Riyaz D. Faizullabhoy
Abstract: Methods, and systems for secure storage and retrieval of information, such as private keys, useable to control access to a blockchain, include: receiving a request to take an action with respect to a vault of multiple different vaults in a cryptoasset custodial system, and each of the multiple different vaults has an associated policy map that defines vault control rules; authenticating, by a hardware security module, a policy map for the vault on which the action is requested based on a cryptographic key controlled by the hardware security module; checking the action against the policy map for the vault when the policy map for the vault is authenticated based on the cryptographic key controlled by the hardware security module; and effecting the action when the action is confirmed to be in accordance with the policy map for the vault.
Type:
Application
Filed:
June 30, 2022
Publication date:
October 20, 2022
Inventors:
Diogo Monica, Nathan P. McCauley, Boaz Avital, Riyaz D. Faizullabhoy
Abstract: Methods, and systems for secure storage and retrieval of information, such as private keys, useable to control access to a blockchain, include: receiving a request to take an action with respect to a vault of multiple different vaults in a cryptoasset custodial system, and each of the multiple different vaults has an associated policy map that defines vault control rules; authenticating, by a hardware security module, a policy map for the vault on which the action is requested based on a cryptographic key controlled by the hardware security module; checking the action against the policy map for the vault when the policy map for the vault is authenticated based on the cryptographic key controlled by the hardware security module; and effecting the action when the action is confirmed to be in accordance with the policy map for the vault.
Type:
Application
Filed:
August 19, 2019
Publication date:
December 5, 2019
Inventors:
Diogo Monica, Nathan P. McCauley, Boaz Avital, Riyaz D. Faizullabhoy
Abstract: Methods, and systems for secure storage and retrieval of information, such as private keys, useable to control access to a blockchain, include: receiving a request to take an action with respect to a vault of multiple different vaults in a cryptoasset custodial system, and each of the multiple different vaults has an associated policy map that defines vault control rules; authenticating, by a hardware security module, a policy map for the vault on which the action is requested based on a cryptographic key controlled by the hardware security module; checking the action against the policy map for the vault when the policy map for the vault is authenticated based on the cryptographic key controlled by the hardware security module; and effecting the action when the action is confirmed to be in accordance with the policy map for the vault.
Type:
Application
Filed:
July 2, 2021
Publication date:
October 28, 2021
Inventors:
Diogo Monica, Nathan P. McCauley, Boaz Avital, Riyaz D. Faizullabhoy
Abstract: Methods, systems, and apparatus for risk mitigation for a cryptoasset custodial system include transmitting an endorsement request for a cryptoasset transaction to a user device configured to cause the user device to prompt a user to endorse the cryptoasset transaction. Multiple data points are collected from mobile devices associated with the user. The data points indicate an identity of the user. A cryptographic endorsement of the cryptoasset transaction is received from the user device. A graphical visualization including a risk metric is generated based on the data points. The risk metric indicates a risk of accepting the cryptographic endorsement from the user device.
Type:
Application
Filed:
December 21, 2022
Publication date:
April 27, 2023
Inventors:
Nathan P. McCauley, Diogo Monica, Boaz Avital, Riyaz D. Faizullabhoy, Joao Manuel Pinto Peixoto, Kristen B. Howard
Abstract: Methods and systems for secure storage and retrieval of information, such as private keys, useable to control access to a blockchain, include: receiving, in a cryptoasset custodial system, a request to authorize a staking operation associated with a blockchain, wherein the staking operation is associated with a private key of an asymmetric cryptographic key pair, the private key is usable to control ownership of a cryptoasset recorded in the blockchain, and the private key is securely held in the custodial system; performing, in response to the request, a portion of the proof-of-stake protocol in a hardware security module using logic designed for the protocol, wherein the logic in the hardware security module is configured to authorize the staking operation by digitally signing an associated staking transaction; and sending the digitally signed staking transaction to another computer to effect the staking operation on behalf of the user.
Type:
Application
Filed:
August 19, 2019
Publication date:
February 25, 2021
Inventors:
Diogo Monica, Nathan P. McCauley, Boaz Avital, Riyaz D. Faizullabhoy
Abstract: A method of establishing secure communication between a first mobile computing device and a second mobile computing device includes receiving a first request from the first mobile computing device to securely communicate with the second mobile computing device via a Wi Fi hot spot, verifying that the first mobile computing device is trusted, generating a public key and a private key based on a trusted certificate, sending the private key to the first mobile computing device via the Wi-Fi hot spot, receiving a second request from the second mobile computing device to securely communicate with the first mobile computing device, verifying that the second mobile computing device is trusted, and sending the public key to the second mobile computing device.
Abstract: An approval request is transmitted for a cryptoasset transaction in accordance with a policy stored in a hardware security module (“HSM”). The policy specifies at least one specific approver required for approval of the cryptoasset transaction. The approval request is transmitted to a computer device associated with the specific approver and is configured to cause the computer device to prompt the specific approver to approve the cryptoasset transaction. A security key is received from a hardware security token associated with the specific approver. The security key indicates an approval of the cryptoasset transaction. A risk analysis module authenticates an identity of the specific approver based on the security key. Responsive to the authenticating of the identity of the specific approver, the HSM signs the cryptoasset transaction using a cryptographic key stored in the HSM.
Type:
Grant
Filed:
March 4, 2022
Date of Patent:
December 12, 2023
Assignee:
Anchor Labs, Inc.
Inventors:
Nathan P. McCauley, Diogo Monica, Boaz Avital, Riyaz D. Faizullabhoy
Abstract: An approval request is transmitted for a cryptoasset transaction in accordance with a policy stored in a hardware security module (“HSM”). The policy specifies at least one specific approver required for approval of the cryptoasset transaction. The approval request is transmitted to a computer device associated with the specific approver and is configured to cause the computer device to prompt the specific approver to approve the cryptoasset transaction. A security key is received from a hardware security token associated with the specific approver. The security key indicates an approval of the cryptoasset transaction. A risk analysis module authenticates an identity of the specific approver based on the security key. Responsive to the authenticating of the identity of the specific approver, the HSM signs the cryptoasset transaction using a cryptographic key stored in the HSM.
Type:
Grant
Filed:
July 28, 2021
Date of Patent:
April 12, 2022
Assignee:
Anchor Labs, Inc.
Inventors:
Nathan P. McCauley, Diogo Monica, Boaz Avital, Riyaz D. Faizullabhoy
Abstract: An approval request is transmitted for a cryptoasset transaction in accordance with a policy stored in a hardware security module (“HSM”). The policy specifies at least one specific approver required for approval of the cryptoasset transaction. The approval request is transmitted to a computer device associated with the specific approver and is configured to cause the computer device to prompt the specific approver to approve the cryptoasset transaction. A security key is received from a hardware security token associated with the specific approver. The security key indicates an approval of the cryptoasset transaction. A risk analysis module authenticates an identity of the specific approver based on the security key. Responsive to the authenticating of the identity of the specific approver, the HSM signs the cryptoasset transaction using a cryptographic key stored in the HSM.
Type:
Grant
Filed:
September 24, 2019
Date of Patent:
August 24, 2021
Assignee:
Anchor Labs, Inc.
Inventors:
Nathan P. McCauley, Diogo Monica, Boaz Avital, Riyaz D. Faizullabhoy