US 12,341,908 B2
Computer-implemented method and system for transferring access to a digital asset
John Fletcher, Cambridge (GB); and Thomas Trevethan, London (GB)
Assigned to NCHAIN LICENSING AG, Zug (CH)
Filed by nChain Licensing AG, Zug (CH)
Filed on Mar. 29, 2024, as Appl. No. 18/622,826.
Application 18/126,467 is a division of application No. 17/045,425, granted, now 11,641,283, issued on May 2, 2023, previously published as PCT/IB2019/052428, filed on Mar. 26, 2019.
Application 18/622,826 is a continuation of application No. 18/126,467, filed on Mar. 26, 2023, granted, now 11,979,507.
Claims priority of application No. 1805633 (GB), filed on Apr. 5, 2018.
Prior Publication US 2024/0333525 A1, Oct. 3, 2024
Int. Cl. H04L 9/32 (2006.01); H04L 9/08 (2006.01); H04L 9/30 (2006.01); H04L 9/00 (2022.01)
CPC H04L 9/3255 (2013.01) [H04L 9/085 (2013.01); H04L 9/3066 (2013.01); H04L 9/3236 (2013.01); H04L 9/50 (2022.05); H04L 2209/56 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A method of transferring access to a digital asset, the method comprising:
providing each of a plurality of participants with a respective share of a second private key of a second private-public key pair of a cryptography system;
splitting the respective share of one of said participants is into a plurality of sub-shares, and deleting it;
receiving a first blockchain transaction from a first participant of said participants by each of a plurality of second participants of said participants, wherein said first participant has a first private key of a first private-public key pair of said cryptography system, and wherein said first blockchain transaction is signed with said first private key;
verifying, by a plurality of said second participants, that said first blockchain transaction has been signed with said first private key;
applying a respective said share of said second private key to said first blockchain transaction to generate a respective share of a first secret value, wherein said first secret value is a second blockchain transaction signed with said second private key, wherein said first secret value is accessible to a first threshold number of said shares of said first secret value and is inaccessible to less than said first threshold number of shares of said first secret value; and
combining at least said first threshold number of said shares of said first secret value from said first participant and a plurality of said second participants to generate said first secret value.