-
公开(公告)号:US12073386B1
公开(公告)日:2024-08-27
申请号:US17370545
申请日:2021-07-08
发明人: Todd Steven Biggs , Phillip H. Griffin , Upul D. Hanwella , Mabel Oza , Luiz Silva , Jeff J. Stapleton , Richard Stec , Kurt Paul Stevens , Luis A. Suarez , Sean Xiang Zhang
CPC分类号: G06Q20/3674 , G06F16/285 , G06Q20/3829 , H04L9/0861 , H04L9/3213 , G06Q40/02 , G06Q40/04 , G06Q50/186
摘要: Securing digital assets in a vault that interfaces with multiple different third-party wallets to store keys/mnemonics. The vault interface accepts input from multiple different party wallets to combine multiple encryptions and secure storage techniques. Numerous cryptographic mechanisms are employed to securely pull a mnemonic phrase from a third-party wallet and into an institution's vault. A customer's mnemonic phrase is securely transported from a personal wallet into a secured institution's encrypted vault using the power of HSM to encrypt and decrypt a customer's mnemonic phrase securely.
-
公开(公告)号:US12047497B2
公开(公告)日:2024-07-23
申请号:US18195160
申请日:2023-05-09
CPC分类号: H04L9/0825 , H04L9/0643 , H04L9/0822 , H04L9/0877 , H04L9/0894
摘要: Methods and systems are described for enhanced-security database encryption via cryptographic software, where key management is carried out, without exporting or exposing cleartext keys, using an independent key manager coupled to a cryptographic hardware security module (HSM).
-
公开(公告)号:US20240187223A1
公开(公告)日:2024-06-06
申请号:US18441324
申请日:2024-02-14
发明人: Phillip H. Griffin
CPC分类号: H04L9/0866 , H04L9/0844 , H04L9/0894 , H04L9/3231
摘要: An example method includes receiving an encrypted biometric enrollment data and user identifier data. The encrypted biometric enrollment data includes at least one biometric enrollment sample from a user encrypted using an encryption key. The encryption key is generated based on a user secret and the user identifier is associated with the user. The user identifier is matched with a stored user secret. A decryption key is generated based on the stored user secret. The encrypted biometric enrollment data is decrypted using the decryption key. The at least one biometric enrollment sample is retrieved from the decrypted biometric enrollment data. The at least one biometric enrollment sample is processed using a biometric processing algorithm to generate a biometric reference template. A biometric reference template identifier uniquely identifying the biometric reference template is generated. An encryption key is generated based on the stored user secret and encrypts an enrollment confirmation message.
-
公开(公告)号:US11936789B1
公开(公告)日:2024-03-19
申请号:US17886370
申请日:2022-08-11
CPC分类号: H04L9/3231 , G06F21/32 , H04L63/0861
摘要: A method includes receiving an update biometric reference sample and a user identifier by a computing system and retrieving a previous biometric reference template record in a storage location based on the user identifier by the computing system. The previous biometric reference template record includes a previous biometric reference template generated using a previous biometric reference sample. The method further includes comparing the update biometric reference sample to the previous biometric reference template by the computing system and, responsive to determining that a biometric data type of the update biometric reference sample is different than that of the previous biometric reference template, generating an update biometric reference template by the computing system. The method further includes generating an update biometric reference template record by the computing system. The method further includes receiving comparing the update biometric reference sample to the biometric authentication sample by the computing system.
-
公开(公告)号:US20240046258A1
公开(公告)日:2024-02-08
申请号:US16719117
申请日:2019-12-18
发明人: Phillip H. Griffin
CPC分类号: G06Q20/3825 , H04L9/3247
摘要: Systems and methods relating to leveraging group signature technology allowing a group manager to control an account with several members whether in a family or business environment. In some instances, this allows for control of a single account verifiable through a digital signature that is presented to the outside, but further allows for great granular control by the group manager on spending and functionality available to each individual member.
-
公开(公告)号:US11843690B1
公开(公告)日:2023-12-12
申请号:US16892881
申请日:2020-06-04
CPC分类号: H04L9/0819 , H04L9/0838 , H04L9/0861 , H04L9/3247 , H04L63/06 , H04L9/0643
摘要: A method for a key management server to manage encryption for data stored by a cloud provider server includes receiving, by the key management server from the cloud provider server, a request for a drop key. The request includes a hash drop identifier that uniquely identifies a cipher drop, and the cipher drop comprises a unit of data stored by the cloud provider server. The method further includes generating the drop key based on at least the hash drop and the drop identifier and encrypting the drop key. A response comprising the encrypted drop key is sent to the cloud provider server.
-
公开(公告)号:US20230327885A1
公开(公告)日:2023-10-12
申请号:US18206959
申请日:2023-06-07
发明人: Phillip H. Griffin
CPC分类号: H04L9/3247 , G06F21/602 , G06F21/64 , H04L9/50
摘要: Arrangements of the present disclosure relate to a method for securing data located in a blockchain having a plurality of blocks. The method includes creating a pointer within a block of the plurality of blocks, the pointer pointing to a security vault located external to the blockchain. The method further includes securing a copy of the block within the security vault by wrapping the security vault in a plurality of layers of different digital signatures.
-
公开(公告)号:US20230261861A1
公开(公告)日:2023-08-17
申请号:US18136810
申请日:2023-04-19
CPC分类号: H04L9/0869 , H04L9/0643 , H04L9/085 , H04L9/32
摘要: Systems and methods for securely sharing and authenticating a last secret can include generating, by a cryptographic module on a first network node, a seed configured for deriving or recovering a last secret, the last secret providing access to a secure entity and being a last cryptographic element controlling access to the secure entity, creating, by the cryptographic module, an envelope for the seed, enveloping the seed by the envelope, and transmitting, by the cryptographic module, the seed to a computing system on a second node different than the first node, the computing system being configured to decrypt the envelope of the enveloped seed to recover the seed, and obtain the last secret based on the seed, where the cryptographic module is prevented from deriving the last secret.
-
公开(公告)号:US20230208622A1
公开(公告)日:2023-06-29
申请号:US18117976
申请日:2023-03-06
CPC分类号: H04L9/0825 , H04L9/0822 , H04L9/0643 , H04L9/0869 , H04L9/0877 , H04L9/0894
摘要: A unique transaction key (Tk) is established amongst multiple entities using a common hardware security module (HSM) with a common HMAC key (HK) and transaction scheme name (T). The transaction key (Tk) can be used for various cryptographic functions (e.g. encryption, MAC, HMAC, key management) with one or more messages at the transaction or session level.
-
公开(公告)号:US11652644B1
公开(公告)日:2023-05-16
申请号:US17878720
申请日:2022-08-01
发明人: Phillip H. Griffin
CPC分类号: H04L9/3247 , H04L9/0825 , H04L9/0861 , H04L9/3236 , H04L63/123 , H04L63/126
摘要: A method includes verifying a digital signature on a dual-signed message by a relying party computing system. Verifying the digital signature on the dual-signed message includes generating a cryptographic hash of content identified in the dual-signed message and signing the cryptographic hash using public key of a signing party computing system to generate a verifying hash. Verifying the digital signature on the dual-signed message further includes comparing the verifying hash to a value of the dual-signed message. Verifying the digital signature on the dual-signed message further includes, responsive to the verifying hash matching the value of the dual-signed message, determining that the digital signature on the dual-signed message is valid. The method further includes identifying an attribute of the dual-signed message by the relying party computing system. The method further includes, based on identifying the attribute, receiving a verification notification for the dual-signed message by the relying party computing system.
-
-
-
-
-
-
-
-
-