Risk mitigation for a cryptoasset custodial system using a hardware security key

An approval request is transmitted for a cryptoasset transaction in accordance with a policy stored in a hardware security module ("HSM"). The policy specifies at least one specific approver required for approval of the cryptoasset transaction. The approval request is transmitted to a comp...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Faizullabhoy, Riyaz D, McCauley, Nathan P, Avital, Boaz, Monica, Diogo
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Faizullabhoy, Riyaz D
McCauley, Nathan P
Avital, Boaz
Monica, Diogo
description An approval request is transmitted for a cryptoasset transaction in accordance with a policy stored in a hardware security module ("HSM"). The policy specifies at least one specific approver required for approval of the cryptoasset transaction. The approval request is transmitted to a computer device associated with the specific approver and is configured to cause the computer device to prompt the specific approver to approve the cryptoasset transaction. A security key is received from a hardware security token associated with the specific approver. The security key indicates an approval of the cryptoasset transaction. A risk analysis module authenticates an identity of the specific approver based on the security key. Responsive to the authenticating of the identity of the specific approver, the HSM signs the cryptoasset transaction using a cryptographic key stored in the HSM.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US11842341B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US11842341B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US11842341B23</originalsourceid><addsrcrecordid>eNqNyjsOwjAMANAsDAi4gzkAQ9oOzCAQI-IzV1bqFqttEsWOUG4PAwdgestbmuuNZYSZlQdUDh76kADBpRI1oAgpuCwaOsYJpIjSDFnYD9_0wtS9MREIuZxYC4xU1mbR4yS0-bky2_PpcbzsKIaWJKIjT9o-79bum6pu7KGq_zkf3QU39Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Risk mitigation for a cryptoasset custodial system using a hardware security key</title><source>esp@cenet</source><creator>Faizullabhoy, Riyaz D ; McCauley, Nathan P ; Avital, Boaz ; Monica, Diogo</creator><creatorcontrib>Faizullabhoy, Riyaz D ; McCauley, Nathan P ; Avital, Boaz ; Monica, Diogo</creatorcontrib><description>An approval request is transmitted for a cryptoasset transaction in accordance with a policy stored in a hardware security module ("HSM"). The policy specifies at least one specific approver required for approval of the cryptoasset transaction. The approval request is transmitted to a computer device associated with the specific approver and is configured to cause the computer device to prompt the specific approver to approve the cryptoasset transaction. A security key is received from a hardware security token associated with the specific approver. The security key indicates an approval of the cryptoasset transaction. A risk analysis module authenticates an identity of the specific approver based on the security key. Responsive to the authenticating of the identity of the specific approver, the HSM signs the cryptoasset transaction using a cryptographic key stored in the HSM.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; PHYSICS ; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20231212&amp;DB=EPODOC&amp;CC=US&amp;NR=11842341B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20231212&amp;DB=EPODOC&amp;CC=US&amp;NR=11842341B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Faizullabhoy, Riyaz D</creatorcontrib><creatorcontrib>McCauley, Nathan P</creatorcontrib><creatorcontrib>Avital, Boaz</creatorcontrib><creatorcontrib>Monica, Diogo</creatorcontrib><title>Risk mitigation for a cryptoasset custodial system using a hardware security key</title><description>An approval request is transmitted for a cryptoasset transaction in accordance with a policy stored in a hardware security module ("HSM"). The policy specifies at least one specific approver required for approval of the cryptoasset transaction. The approval request is transmitted to a computer device associated with the specific approver and is configured to cause the computer device to prompt the specific approver to approve the cryptoasset transaction. A security key is received from a hardware security token associated with the specific approver. The security key indicates an approval of the cryptoasset transaction. A risk analysis module authenticates an identity of the specific approver based on the security key. Responsive to the authenticating of the identity of the specific approver, the HSM signs the cryptoasset transaction using a cryptographic key stored in the HSM.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyjsOwjAMANAsDAi4gzkAQ9oOzCAQI-IzV1bqFqttEsWOUG4PAwdgestbmuuNZYSZlQdUDh76kADBpRI1oAgpuCwaOsYJpIjSDFnYD9_0wtS9MREIuZxYC4xU1mbR4yS0-bky2_PpcbzsKIaWJKIjT9o-79bum6pu7KGq_zkf3QU39Q</recordid><startdate>20231212</startdate><enddate>20231212</enddate><creator>Faizullabhoy, Riyaz D</creator><creator>McCauley, Nathan P</creator><creator>Avital, Boaz</creator><creator>Monica, Diogo</creator><scope>EVB</scope></search><sort><creationdate>20231212</creationdate><title>Risk mitigation for a cryptoasset custodial system using a hardware security key</title><author>Faizullabhoy, Riyaz D ; McCauley, Nathan P ; Avital, Boaz ; Monica, Diogo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US11842341B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Faizullabhoy, Riyaz D</creatorcontrib><creatorcontrib>McCauley, Nathan P</creatorcontrib><creatorcontrib>Avital, Boaz</creatorcontrib><creatorcontrib>Monica, Diogo</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Faizullabhoy, Riyaz D</au><au>McCauley, Nathan P</au><au>Avital, Boaz</au><au>Monica, Diogo</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Risk mitigation for a cryptoasset custodial system using a hardware security key</title><date>2023-12-12</date><risdate>2023</risdate><abstract>An approval request is transmitted for a cryptoasset transaction in accordance with a policy stored in a hardware security module ("HSM"). The policy specifies at least one specific approver required for approval of the cryptoasset transaction. The approval request is transmitted to a computer device associated with the specific approver and is configured to cause the computer device to prompt the specific approver to approve the cryptoasset transaction. A security key is received from a hardware security token associated with the specific approver. The security key indicates an approval of the cryptoasset transaction. A risk analysis module authenticates an identity of the specific approver based on the security key. Responsive to the authenticating of the identity of the specific approver, the HSM signs the cryptoasset transaction using a cryptographic key stored in the HSM.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US11842341B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
PHYSICS
SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Risk mitigation for a cryptoasset custodial system using a hardware security key
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T19%3A35%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Faizullabhoy,%20Riyaz%20D&rft.date=2023-12-12&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS11842341B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true