US 12,219,051 B2
Doubly-encrypted secret parts allowing for assembly of a secret using a subset of the doubly- encrypted secret parts
Stephen Christensen, Salt Lake City, UT (US); Denny Becker, Salt Lake City, UT (US); Tron Black, Sandy, UT (US); Michael Calcano, South Salt Lake, UT (US); and Tyler Perkins, West Jordan, UT (US)
Assigned to tZERO IP, LLC, Salt Lake City, UT (US)
Filed by tZERO IP, LLC, Salt Lake City, UT (US)
Filed on Sep. 15, 2023, as Appl. No. 18/468,252.
Application 18/468,252 is a continuation of application No. 17/889,205, filed on Aug. 16, 2022, granted, now 11,764,951.
Application 17/889,205 is a continuation of application No. 16/595,004, filed on Oct. 7, 2019, granted, now 11,444,755, issued on Sep. 13, 2022.
Claims priority of provisional application 62/853,231, filed on May 28, 2019.
Claims priority of provisional application 62/830,272, filed on Apr. 5, 2019.
Claims priority of provisional application 62/744,886, filed on Oct. 12, 2018.
Prior Publication US 2024/0007275 A1, Jan. 4, 2024
Int. Cl. H04L 9/08 (2006.01); H04L 9/14 (2006.01); H04L 9/30 (2006.01); H04L 9/32 (2006.01); H04L 9/00 (2022.01)
CPC H04L 9/085 (2013.01) [H04L 9/0894 (2013.01); H04L 9/14 (2013.01); H04L 9/30 (2013.01); H04L 9/3073 (2013.01); H04L 9/3252 (2013.01); H04L 9/50 (2022.05)] 20 Claims
OG exemplary drawing
 
1. A system comprising:
at least one processor; and
at least one memory communicatively coupled to the at least one processor;
wherein the at least one processor is configured to:
receive a plurality of doubly-encrypted secret parts that were encrypted using at least a public key belonging to a public/private keypair;
decrypt each of the plurality of doubly-encrypted secret parts into a corresponding singly-encrypted secret part using a private key belonging to the public/private keypair;
decrypt each corresponding singly-encrypted secret part into a corresponding secret part;
wherein a secret is reconstructed from a quantity of corresponding secret parts that is a subset of a total number of secret parts previously created from the secret; and
rotate at least one of the public key and the private key by:
replacing the public key with a new public key;
replacing the private key with a new private key; or
replacing the public key with the new public key and the private key with the new private key.