Unlock instant, AI-driven research and patent intelligence for your innovation.

Private key cloud storage

A private key and memory technology, applied in the field of asymmetric encryption system, can solve the problems of bitcoin private key, bitcoin credit and savings loss, etc., achieve reliable monitoring and analysis, and ensure the effect of private key confidentiality

Inactive Publication Date: 2021-08-13
NAGRAVISION SA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the theft or loss of a Bitcoin private key often results in a clear loss of Bitcoin credit and savings

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private key cloud storage
  • Private key cloud storage
  • Private key cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Unlike the known schemes that usually store the private key in the Secure Execution Environment (SEE) of the device, in this disclosure, the network storage device can store the private key in the network storage device and provide it to the SEE of the device when needed. The key required to participate in private key operations. In this way, the SEE can be used to protect private key operations without permanently storing the private key.

[0035] Examples of SEEs are TPMs, smart cards, secure file systems (e.g. iOS / Android key repositories), Trusted Execution Environments (TEEs), SIMs, eSIMs, contactless security tokens, etc. The SEE can be implemented in hardware and / or software, and can be embedded in, detachably connected to, or communicatively connected to, a device.

[0036] A network storage device may be a computer data storage server accessible via a data network such as a local area network (LAN), wide area network (WAN), the Internet, or a combination there...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system (1) for asymmetrical cryptography, comprises a device (10) and a network storage (30), wherein the device is communicatively connected to the network storage, wherein the network storage is configured to store a private key, the device is configured to retrieve the private key from the network storage to perform a cryptographic operation using the private key in a secure execution environment (12) of the device, and the secure execution environment is configured to only temporarily store the private key for the cryptographic operation.

Description

technical field [0001] The present invention relates to a system for asymmetric encryption, a device used in the system for asymmetric encryption, a network storage device used in the system for asymmetric encryption and a device for asymmetric encryption A computer-implemented method of symmetric encryption. Background technique [0002] In an asymmetric encryption system, the private key is usually stored and used in a secure execution environment such as TPM, smart card, secure file system (iOS / Android keystore), trusted execution environment, etc. Private keys are often tied to escrow, making cryptographic operations prone to potential problems. For example, in the event of a device being lost or stolen, all bound private keys stored in the device's secure execution environment are also lost. Furthermore, device failure can result in loss or unavailability of private keys, for example resulting in the inability to sign documents / transactions or authenticate related ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04W12/041H04W12/03H04W12/40
CPCH04L63/0442H04L63/06H04W12/04H04L9/0897H04L9/0825H04L9/085H04L9/0894
Inventor 阿尔夫·勒托罗安东尼·切莱蒂
Owner NAGRAVISION SA