- Midvale UT, US Denny Becker - Salt Lake City UT, US Stephen Christensen - Salt Lake City UT, US
Assignee:
Medici Ventures, Inc. - Midvale UT
International Classification:
G06Q 40/04 G06Q 40/06 H04L 9/06
Abstract:
A system includes processor(s), memory(s) and a network interface that receives information regarding a plurality of order books from a plurality of asset exchanges. The processor(s) is configured to update a consolidated order book based on information regarding the plurality of order books for local orders received from users of the system. When a received new order does not match any order in the consolidated order book, the processor(s) is configured to place the new order in at least one of the consolidated order book, a separate local order book, or at least one of the plurality of order books of the plurality of asset exchanges. When the new order matches an order in the consolidated order book, the processor(s) is configured to: communicate a custodial order to the particular asset exchange.
Splitting Encrypted Key And Encryption Key Used To Encrypt Key Into Key Components Allowing Assembly With Subset Of Key Components To Decrypt Encrypted Key
- Midvale UT, US Denny Becker - Salt Lake City UT, US Tyler Perkins - West Jordan UT, US Joel Weight - Midvale UT, US Jesse Empey - Saratoga Springs UT, US
Assignee:
Medici Ventures, Inc. - Midvale UT
International Classification:
H04L 9/08
Abstract:
A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): securely generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and securely erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to securely decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), securely reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, securely decrypt encrypted key into key using encryption key(s).
Multi-Approval System Using M Of N Keys To Restore A Customer Wallet
- Midvale UT, US Denny Becker - Salt Lake City UT, US
Assignee:
Medici Ventures, Inc. - Midvale UT
International Classification:
G06Q 20/36 H04L 9/06 H04L 9/14
Abstract:
A computing system that includes processor(s), memory(s) and a network interface that communicates with a customer device and a trusted third party. The at least one network interface is configured to receive, from the customer device, identity data for a customer and a request to restore a customer wallet. The at least one processor is configured to verify the identity data for the customer received from the customer device. When the at least one processor verifies the identity data for the customer received from the customer device, the at least one network interface is configured to communicate a request for a first key associated with the customer wallet to a key repository for the trusted third party. The at least one processor is configured to restore the customer wallet using the first key associated with the customer wallet and a second key associated with the customer wallet.
Multi-Approval System Using M Of N Keys To Generate A Transaction Address
A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with a customer device and a trusted third party. The at least one processor is configured to derive, using a hashing function, a multi-approval transaction address in a customer wallet from a first public key derived from a first parent public key, a second public key derived from a second parent public key, and a third public key derived from a third parent public key. The at least one network interface is also configured to transmit the multi-approval transaction address to the customer device.
Multi-Approval System Using M Of N Keys To Perform An Action At A Customer Device
A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of N private keys or key components associated with a customer. The at least one processor is configured to receive, from each of at least one vault system, a respective private key or key component. The at least one processor is also configured to perform at least one action based on at least M of the N private keys or key components.
Multi-Approval System Using M Of N Keys To Generate A Sweeping Transaction At A Customer Device
A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of N private keys or key components associated with a customer. The at least one processor is configured to generate, at the customer device, a sweeping transaction that transfers all funds from at least one input transaction address in a customer wallet to a new transaction address. The at least one processor is also configured to sign the sweeping transaction using at least M of N private keys or key components.
Googleplus
Denny Becker
Work:
Coppenrath und Wiese - Fahrer (2007) Coppenrath und Wiese - Kofekt (2004-2007)
Denny Becker
Denny Becker
Work:
Thermomess Wärmemessdienst AG
Denny Becker
Denny Becker
Tagline:
A world traveler who lives at and operates A Teton Tree House bed and breakfast in Jackson Hole, Wyoming, June through September.
Tampa, FLJust a simple kinda person...enjoy my work and my friends. Currently single...but hope to change that someday when the RIGHT person comes along. Any... Just a simple kinda person...enjoy my work and my friends. Currently single...but hope to change that someday when the RIGHT person comes along. Any suggestions?