US 12,074,864 B2
Non-custodial tool for building decentralized computer applications
Fei-Yang Jen, San Francisco, CA (US); Yi Wei Chen, San Francisco, CA (US); Jaemin Jin, San Francisco, CA (US); Hanyu Xue, San Francisco, CA (US); Wentao Liu, San Francisco, CA (US); and Shang Li, San Francisco, CA (US)
Assigned to Magic Labs, Inc., San Francisco, CA (US)
Filed by Magic Labs, Inc., San Francisco, CA (US)
Filed on Jan. 8, 2024, as Appl. No. 18/406,799.
Application 18/406,799 is a continuation of application No. 18/468,531, filed on Sep. 15, 2023.
Application 18/468,531 is a continuation of application No. 18/148,934, filed on Dec. 30, 2022, granted, now 11,818,120.
Application 18/148,934 is a continuation of application No. 17/031,372, filed on Sep. 24, 2020, granted, now 11,546,321.
Claims priority of provisional application 62/904,689, filed on Sep. 24, 2019.
Prior Publication US 2024/0146721 A1, May 2, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 29/06 (2006.01); G06F 21/45 (2013.01); H04L 9/14 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/083 (2013.01) [G06F 21/45 (2013.01); H04L 9/14 (2013.01); H04L 63/0478 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system for setting up a wallet for a decentralized application by performing non-custodial authentication for a client, the system comprising:
processing circuitry; and
a memory operably coupled to the processing circuitry, having embodied thereon a program, the program being readable by processing circuitry and, when executed, causes the processing circuitry to:
receive over a network, a request for an access token for a user, at a first computing environment, from a second computing environment that authenticated the user;
send over the network, the access token for the user, from the first computing environment, to the second computing environment;
receive over the network, the access token, at the first computing environment, bypassing the second computing environment, from a third computing environment;
receive over the network, key information that is generated within a fourth computing environment at the third computing environment, the fourth computing environment is inaccessible to the decentralized application at the third computing environment, at the first computing environment, bypassing the second computing environment, from the third computing environment; and
send the key information from the first computing environment to a security resource to cause the security resource to encrypt the key information to generate encrypted key information.