[go: up one dir, main page]

SG11202103511WA - Encrypted asset encryption key parts allowing for assembly of an asset encryption key using a subset of the encrypted asset encryption key parts - Google Patents

Encrypted asset encryption key parts allowing for assembly of an asset encryption key using a subset of the encrypted asset encryption key parts

Info

Publication number
SG11202103511WA
SG11202103511WA SG11202103511WA SG11202103511WA SG11202103511WA SG 11202103511W A SG11202103511W A SG 11202103511WA SG 11202103511W A SG11202103511W A SG 11202103511WA SG 11202103511W A SG11202103511W A SG 11202103511WA SG 11202103511W A SG11202103511W A SG 11202103511WA
Authority
SG
Singapore
Prior art keywords
encryption key
asset encryption
key parts
encrypted
subset
Prior art date
Application number
SG11202103511WA
Inventor
Stephen Christensen
Denny Becker
Tron Black
Tyler Perkins
Original Assignee
Tzero Ip Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tzero Ip Llc filed Critical Tzero Ip Llc
Publication of SG11202103511WA publication Critical patent/SG11202103511WA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Algebra (AREA)
  • Storage Device Security (AREA)
SG11202103511WA 2018-10-12 2019-10-07 Encrypted asset encryption key parts allowing for assembly of an asset encryption key using a subset of the encrypted asset encryption key parts SG11202103511WA (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201862744886P 2018-10-12 2018-10-12
US201962830272P 2019-04-05 2019-04-05
US201962853231P 2019-05-28 2019-05-28
PCT/US2019/055034 WO2020076722A1 (en) 2018-10-12 2019-10-07 Encrypted asset encryption key parts allowing for assembly of an asset encryption key using a subset of the encrypted asset encryption key parts

Publications (1)

Publication Number Publication Date
SG11202103511WA true SG11202103511WA (en) 2021-05-28

Family

ID=70159251

Family Applications (2)

Application Number Title Priority Date Filing Date
SG11202103517TA SG11202103517TA (en) 2018-10-12 2019-10-07 Doubly-encrypted secret parts allowing for assembly of a secret using a subset of the doubly-encrypted secret parts
SG11202103511WA SG11202103511WA (en) 2018-10-12 2019-10-07 Encrypted asset encryption key parts allowing for assembly of an asset encryption key using a subset of the encrypted asset encryption key parts

Family Applications Before (1)

Application Number Title Priority Date Filing Date
SG11202103517TA SG11202103517TA (en) 2018-10-12 2019-10-07 Doubly-encrypted secret parts allowing for assembly of a secret using a subset of the doubly-encrypted secret parts

Country Status (6)

Country Link
US (4) US11601264B2 (en)
EP (2) EP3864793A4 (en)
JP (3) JP7104248B2 (en)
KR (2) KR20210066867A (en)
SG (2) SG11202103517TA (en)
WO (2) WO2020076722A1 (en)

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3864793A4 (en) 2018-10-12 2022-08-10 tZERO IP, LLC ENCRYPTED FACILITIES KEY PARTS THAT ALLOW THE ARRANGEMENT OF A FACILITIES KEY KEY USING A SUBSET OF THE ENCRYPTED FACILITIES KEY PARTS
US12307439B2 (en) * 2018-10-19 2025-05-20 Bell Identification B.V. Secure digital wallet processing system
IL293198B2 (en) * 2019-05-22 2025-04-01 Myota Inc Method and system for distributed data storage with enhanced security, resilience, and control
JP2022536645A (en) * 2019-06-10 2022-08-18 ティーゼロ・アイピー,エルエルシー Key Recovery Using Encrypted Secret Share
US11233658B2 (en) * 2019-08-14 2022-01-25 OX Labs Inc. Digital transaction signing for multiple client devices using secured encrypted private keys
CN111062064B (en) * 2019-12-24 2021-11-02 飞天诚信科技股份有限公司 A kind of realization method and system of encrypted U disk system
JP2021118370A (en) * 2020-01-22 2021-08-10 キオクシア株式会社 Memory system, information processing device, and information processing system
JP7597822B2 (en) 2020-02-26 2024-12-10 ティーゼロ・アイピー,エルエルシー Secret splitting and metadata storage
US11563568B2 (en) * 2020-02-27 2023-01-24 Comcast Cable Communications, Llc Scalable content restriction
US11451558B2 (en) * 2020-03-16 2022-09-20 The Boeing Company Information system end user location detection technique
US11398901B2 (en) * 2020-03-26 2022-07-26 Walmart Apollo, Llc Restricted partial key storage
US12052346B2 (en) * 2020-07-02 2024-07-30 International Business Machines Corporation Secure secret recovery
US11522684B2 (en) 2020-09-24 2022-12-06 Capital One Services, Llc Key rotation service
US20220141014A1 (en) * 2020-11-05 2022-05-05 PolySign, Inc. Storing secret data on a blockchain
US12101402B2 (en) 2020-12-14 2024-09-24 International Business Machines Corporation Key rotation on a publish-subscribe system
EP4292239B1 (en) * 2021-02-12 2025-10-15 Visa International Service Association Privacy preserving identity data exchange based on hybrid encryption
US11757634B2 (en) * 2021-03-30 2023-09-12 Bank Of America Corporation System for secure client-side cryptographic key retrieval using cryptographic key splitting and wrapping
CN113111396B (en) * 2021-04-19 2022-09-02 湖北央中巨石信息技术有限公司 Method, system, device and medium for enhancing storage medium security
US12452084B2 (en) * 2021-05-06 2025-10-21 University Of South Florida Lightweight post-quantum authentication
US11748502B2 (en) * 2021-06-10 2023-09-05 Dell Products L.P. System and method of utilizing a system to secure a document
JP6999144B1 (en) * 2021-06-25 2022-01-18 A・Tコミュニケーションズ株式会社 Data management system
US12021870B2 (en) 2021-08-10 2024-06-25 Motorola Solutions, Inc. Secure communication between different agencies in an incident area
EP4311162A4 (en) * 2021-08-20 2024-10-09 Samsung Electronics Co., Ltd. ELECTRONIC DEVICE FOR GENERATING MNEMONIC WORDS OF A PRIVATE KEY AND METHOD FOR OPERATING THE ELECTRONIC DEVICE
US12032715B2 (en) 2022-01-04 2024-07-09 Bank Of America Corporation System and method for securing information in a distributed network via a distributed identifier
CN114449505B (en) * 2022-03-08 2022-07-29 芯电智联(北京)科技有限公司 NFC label data transmission method, device and storage medium
US12301551B2 (en) * 2022-05-25 2025-05-13 CybXSecurity LLC System, method, and computer program product for generating secure messages for messaging
US12159278B1 (en) * 2022-10-06 2024-12-03 Wells Fargo Bank, N.A. Virtual asset freeze
CN115842844B (en) * 2023-02-27 2023-05-30 中关村科学城城市大脑股份有限公司 Data processing method based on block chain
EP4498635A1 (en) * 2023-07-25 2025-01-29 Crypto Key Guardian Method for cryptographic management of a word sentence
US20250133392A1 (en) * 2023-10-19 2025-04-24 International Business Machines Corporation Encrypted end-to-end messaging using near-field communication (nfc) tags
US20250184728A1 (en) * 2023-11-30 2025-06-05 Motorola Solutions, Inc. System and method for two-factor authentication at an access control point that is not connected to a network
US20250202716A1 (en) * 2023-12-14 2025-06-19 Wells Fargo Bank, N.A. Cloud launch application security parameters (clasp)
WO2025213367A1 (en) * 2024-04-09 2025-10-16 Lemon Inc. Unbalanced private set intersection protocols on social media platforms
CN118890144B (en) * 2024-07-05 2025-02-25 上海豌豆信息技术有限公司 A method and system for modifying password of database
US12500872B1 (en) * 2025-01-30 2025-12-16 Alan Earl Swahn Secure controlled communications

Family Cites Families (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6311171B1 (en) 1997-07-11 2001-10-30 Ericsson Inc. Symmetrically-secured electronic communication system
CA2374968C (en) 1999-05-26 2010-11-16 Ascom Hasler Mailing Systems, Inc. Technique for split knowledge backup and recovery of a cryptographic key
US7142676B1 (en) * 1999-06-08 2006-11-28 Entrust Limited Method and apparatus for secure communications using third-party key provider
US7003667B1 (en) 1999-10-04 2006-02-21 Canon Kabushiki Kaisha Targeted secure printing
US20020071566A1 (en) 2000-12-11 2002-06-13 Kurn David Michael Computer system employing a split-secret cryptographic key linked to a password-based cryptographic key security scheme
US20030037237A1 (en) 2001-04-09 2003-02-20 Jean-Paul Abgrall Systems and methods for computer device authentication
US7548621B1 (en) 2002-09-26 2009-06-16 Ncr Corporation System and method for securing a base derivation key for use in injection of derived unique key per transaction devices
KR20050104202A (en) 2004-04-28 2005-11-02 한국에너지기술연구원 An air harmony system with heatpump and controlling methoe thereof
JP3607700B1 (en) 2004-04-28 2005-01-05 トラステッドソリューションズ株式会社 Backup and recovery system
KR100617456B1 (en) 2004-04-28 2006-08-31 주식회사 니츠 Secret key terminal with secret key management function and secret key management method
JP4547233B2 (en) 2004-10-27 2010-09-22 日本電信電話株式会社 Communication system, communication method and program thereof
US7587045B2 (en) 2005-10-03 2009-09-08 Kabushiki Kaisha Toshiba System and method for securing document transmittal
WO2007049267A1 (en) * 2005-10-27 2007-05-03 Nds Limited Network security system
US8989390B2 (en) 2005-12-12 2015-03-24 Qualcomm Incorporated Certify and split system and method for replacing cryptographic keys
JP2008099058A (en) * 2006-10-13 2008-04-24 Murata Mach Ltd Network system
JP4917453B2 (en) 2007-02-22 2012-04-18 Kddi株式会社 Threshold secret sharing apparatus, threshold secret sharing method, secret information restoring method, and program
JP2009103774A (en) * 2007-10-22 2009-05-14 Panasonic Corp Secret sharing system
US9185109B2 (en) * 2008-10-13 2015-11-10 Microsoft Technology Licensing, Llc Simple protocol for tangible security
JP5497007B2 (en) 2009-04-03 2014-05-21 パナソニック株式会社 Measuring apparatus and control method of measuring apparatus
WO2011123699A2 (en) 2010-03-31 2011-10-06 Orsini Rick L Systems and methods for securing data in motion
US9680639B2 (en) 2011-03-31 2017-06-13 Panasonic Intellectual Property Management Co., Ltd. Secret sharing apparatus and secret sharing method that restores secret data from at least two of generated shared data
CN104040939A (en) 2011-10-24 2014-09-10 皇家Kpn公司 secure distribution of content
KR20140129207A (en) 2012-02-21 2014-11-06 마이크로칩 테크놀로지 인코포레이티드 Cryptographic transmission system using key encryption key
JP2014022920A (en) 2012-07-18 2014-02-03 Nec Corp Electronic signature system, electronic signature method, and electronic signature program
US9582671B2 (en) 2014-03-06 2017-02-28 Sensity Systems Inc. Security and data privacy for lighting sensory networks
US8745415B2 (en) 2012-09-26 2014-06-03 Pure Storage, Inc. Multi-drive cooperation to generate an encryption key
US20140229386A1 (en) * 2013-02-13 2014-08-14 Mistral Mobile Secure mobile payments
US9344424B2 (en) 2013-05-23 2016-05-17 Adobe Systems Incorporated Authorizing access by a third party to a service from a service provider
US9898782B1 (en) * 2013-06-28 2018-02-20 Winklevoss Ip, Llc Systems, methods, and program products for operating exchange traded products holding digital math-based assets
US10354325B1 (en) 2013-06-28 2019-07-16 Winklevoss Ip, Llc Computer-generated graphical user interface
JP2015102692A (en) 2013-11-25 2015-06-04 キヤノン株式会社 Information processor and method of the same
US9602508B1 (en) 2013-12-26 2017-03-21 Lookout, Inc. System and method for performing an action based upon two-party authorization
CA2949847A1 (en) 2014-03-10 2015-09-17 Sengi Corporation System and method for secure deposit and recovery of secret data
US9819656B2 (en) * 2014-05-09 2017-11-14 Sony Interactive Entertainment Inc. Method for secure communication using asymmetric and symmetric encryption over insecure communications
US9667416B1 (en) 2014-12-18 2017-05-30 EMC IP Holding Company LLC Protecting master encryption keys in a distributed computing environment
US9413754B2 (en) 2014-12-23 2016-08-09 Airwatch Llc Authenticator device facilitating file security
KR101666374B1 (en) 2015-02-13 2016-10-14 크루셜텍 (주) Method, apparatus and computer program for issuing user certificate and verifying user
US9673975B1 (en) 2015-06-26 2017-06-06 EMC IP Holding Company LLC Cryptographic key splitting for offline and online data protection
US10778439B2 (en) * 2015-07-14 2020-09-15 Fmr Llc Seed splitting and firmware extension for secure cryptocurrency key backup, restore, and transaction signing platform apparatuses, methods and systems
US9954680B1 (en) * 2015-12-18 2018-04-24 EMC IP Holding Company LLC Secure management of a master encryption key in a split-key based distributed computing environment
US10103885B2 (en) 2016-01-20 2018-10-16 Mastercard International Incorporated Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography
US20170222805A1 (en) * 2016-02-03 2017-08-03 Cocoon Data Holdings Pty Limited Escrow key fragmentation system
US10333705B2 (en) 2016-04-30 2019-06-25 Civic Technologies, Inc. Methods and apparatus for providing attestation of information using a centralized or distributed ledger
WO2018231832A1 (en) * 2017-06-12 2018-12-20 PokitDok, Inc. System and method for autonomous dynamic person management
US10263775B2 (en) * 2017-06-23 2019-04-16 Microsoft Technology Licensing, Llc Policy-based key recovery
US20190238323A1 (en) * 2018-01-31 2019-08-01 Nutanix, Inc. Key managers for distributed computing systems using key sharing techniques
JP7530294B2 (en) 2018-03-15 2024-08-07 ティーゼロ・アイピー,エルエルシー Splitting the encrypted key and the cryptographic key used to encrypt the key into key components such that an assembly with a subset of the key components can decrypt the encrypted key.
US11050724B2 (en) 2018-03-22 2021-06-29 Cisco Technology, Inc. IaaS-aided access control for information centric networking with Internet-of-Things
US10917234B2 (en) 2018-05-03 2021-02-09 International Business Machines Corporation Blockchain for on-chain management of off-chain storage
EP3864793A4 (en) 2018-10-12 2022-08-10 tZERO IP, LLC ENCRYPTED FACILITIES KEY PARTS THAT ALLOW THE ARRANGEMENT OF A FACILITIES KEY KEY USING A SUBSET OF THE ENCRYPTED FACILITIES KEY PARTS

Also Published As

Publication number Publication date
KR20210066867A (en) 2021-06-07
KR20210061426A (en) 2021-05-27
US20200119908A1 (en) 2020-04-16
US20240007275A1 (en) 2024-01-04
US11444755B2 (en) 2022-09-13
JP7104248B2 (en) 2022-07-20
SG11202103517TA (en) 2021-05-28
US11601264B2 (en) 2023-03-07
JP7312892B2 (en) 2023-07-21
US20220399992A1 (en) 2022-12-15
US12219051B2 (en) 2025-02-04
JP2022508757A (en) 2022-01-19
EP3864793A1 (en) 2021-08-18
EP3864550A1 (en) 2021-08-18
WO2020076720A1 (en) 2020-04-16
US11764951B2 (en) 2023-09-19
JP2022133423A (en) 2022-09-13
JP2022508758A (en) 2022-01-19
WO2020076722A1 (en) 2020-04-16
EP3864793A4 (en) 2022-08-10
JP7384914B2 (en) 2023-11-21
US20200119917A1 (en) 2020-04-16
EP3864550A4 (en) 2022-07-06

Similar Documents

Publication Publication Date Title
SG11202103511WA (en) Encrypted asset encryption key parts allowing for assembly of an asset encryption key using a subset of the encrypted asset encryption key parts
ZA201902554B (en) Blockchain data protection using homomorphic encryption
IL268006B (en) Addressing a trusted execution environment using encryption key
PL3545640T3 (en) Blockchain data protection using homomorphic encryption
SG11202113362XA (en) Key recovery using encrypted secret shares
IL260895B (en) Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
GB201809258D0 (en) Dongle for ciphering data
SG10201405852QA (en) Encryption function and decryption function generating method, encryption and decryption method and related apparatuses
HK1244921A1 (en) Encryption and decryption system and method
GB2590239B (en) Secure operations on encrypted data
SG11202102202RA (en) Key management for multi-party computation
GB201907940D0 (en) An encryption process
EP3461056B8 (en) Systems and methods for facilitating iterative key generation and data encryption and decryption
GB201519612D0 (en) Key sequence generation for cryptographic operations
GB201802582D0 (en) Protecting cryptographic key data
PL3192948T3 (en) Dust cover for lock cylinder key channels
EP3977320A4 (en) Methods and devices for optimal information-theoretically secure encryption key management
GB2553913B (en) Media key block based broadcast encryption
GB202101118D0 (en) Cryptographic key management for end-to end communication security
SG11202011249UA (en) "cryptographic key management"
PL3665565T3 (en) Generator of physically unclonable cryptographic keys
GB201814789D0 (en) Encryption key seed determination
CZ2016529A3 (en) A key for operating a lock with a cylinder insert and a lock for verifying authorization of the key
GB201709275D0 (en) Expendable cryptographic key access
HK40072813A (en) Methods and devices for optimal information-theoretically secure encryption key management