Private key cloud storage
A private key and memory technology, applied in the field of asymmetric encryption system, can solve the problems of bitcoin private key, bitcoin credit and savings loss, etc., achieve reliable monitoring and analysis, and ensure the effect of private key confidentiality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] Unlike the known schemes that usually store the private key in the Secure Execution Environment (SEE) of the device, in this disclosure, the network storage device can store the private key in the network storage device and provide it to the SEE of the device when needed. The key required to participate in private key operations. In this way, the SEE can be used to protect private key operations without permanently storing the private key.
[0035] Examples of SEEs are TPMs, smart cards, secure file systems (e.g. iOS / Android key repositories), Trusted Execution Environments (TEEs), SIMs, eSIMs, contactless security tokens, etc. The SEE can be implemented in hardware and / or software, and can be embedded in, detachably connected to, or communicatively connected to, a device.
[0036] A network storage device may be a computer data storage server accessible via a data network such as a local area network (LAN), wide area network (WAN), the Internet, or a combination there...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


