US 12,488,340 B2
Address verification, seed splitting and firmware extension for secure cryptocurrency key backup, restore, and transaction signing platform apparatuses, methods and systems
Vladimir Tsitrin, Acton, MA (US); and Gang Cheng, Nashua, NH (US)
Assigned to FMR LLC, Boston, MA (US)
Filed by FMR LLC, Boston, MA (US)
Filed on Apr. 12, 2022, as Appl. No. 17/719,353.
Application 17/719,353 is a continuation in part of application No. 16/421,442, filed on May 23, 2019, granted, now 10,992,469.
Application 16/421,442 is a continuation in part of application No. 15/984,280, filed on May 18, 2018, granted, now 10,778,439.
Application 15/984,280 is a continuation in part of application No. 15/898,224, filed on Feb. 15, 2018, granted, now 10,644,885.
Application 15/898,224 is a continuation in part of application No. 15/486,243, filed on Apr. 12, 2017, granted, now 11,488,147.
Application 15/984,280 is a continuation in part of application No. 15/456,461, filed on Mar. 10, 2017, granted, now 10,461,940.
Application 15/984,280 is a continuation in part of application No. 15/210,813, filed on Jul. 14, 2016, abandoned.
Application 15/898,224 is a continuation in part of application No. 15/210,781, filed on Jul. 14, 2016, abandoned.
Application 15/898,224 is a continuation in part of application No. 15/210,807, filed on Jul. 14, 2016.
Application 15/898,224 is a continuation in part of application No. 15/210,817, filed on Jul. 14, 2016.
Application 15/898,224 is a continuation in part of application No. 15/210,795, filed on Jul. 14, 2016, abandoned.
Application 15/898,224 is a continuation in part of application No. 15/210,821, filed on Jul. 14, 2016, abandoned.
Application 15/898,224 is a continuation in part of application No. 15/209,709, filed on Jul. 13, 2016.
Application 15/898,224 is a continuation in part of application No. 15/209,714, filed on Jul. 13, 2016, granted, now 10,339,523.
Application 15/898,224 is a continuation in part of application No. 15/209,701, filed on Jul. 13, 2016, abandoned.
Application 15/898,224 is a continuation in part of application No. 15/019,926, filed on Feb. 9, 2016, abandoned.
Application 15/898,224 is a continuation in part of application No. 14/963,165, filed on Dec. 8, 2015, granted, now 10,504,179.
Application 15/898,224 is a continuation in part of application No. 14/799,229, filed on Jul. 14, 2015, abandoned.
Application 15/898,224 is a continuation in part of application No. 14/799,242, filed on Jul. 14, 2015, abandoned.
Application 15/898,224 is a continuation in part of application No. 14/799,282, filed on Jul. 14, 2015, abandoned.
Claims priority of provisional application 62/509,011, filed on May 19, 2017.
Claims priority of provisional application 62/273,450, filed on Dec. 31, 2015.
Claims priority of provisional application 62/273,452, filed on Dec. 31, 2015.
Claims priority of provisional application 62/273,449, filed on Dec. 31, 2015.
Claims priority of provisional application 62/273,447, filed on Dec. 31, 2015.
Claims priority of provisional application 62/273,453, filed on Dec. 31, 2015.
Prior Publication US 2022/0327525 A1, Oct. 13, 2022
Int. Cl. G06Q 20/38 (2012.01); G06Q 20/36 (2012.01); G06Q 20/40 (2012.01); H04L 9/00 (2022.01)
CPC G06Q 20/389 (2013.01) [G06Q 20/36 (2013.01); G06Q 20/3825 (2013.01); G06Q 20/401 (2013.01); H04L 9/50 (2022.05)] 8 Claims
OG exemplary drawing
 
1. A verified address smart contract transaction signing apparatus, comprising:
at least one memory;
a component collection stored in the at least one memory;
at least one processor disposed in communication with the at least one memory, the at least one processor executing processor-executable instructions from the component collection, the component collection storage structured with processor-executable instructions, comprising:
obtain, via the at least one processor, by a hardware security module (HSM), a transaction signing request message datastructure associated with a transaction, in which the transaction signing request message datastructure is structured to specify a transaction amount, a source wallet datastructure, and a destination wallet datastructure, in which either the source wallet datastructure or the destination wallet datastructure is a verified address wallet datastructure that corresponds to a smart contract;
determine, via the at least one processor, by the HSM, owner key identification parameters associated with an owner datastructure associated with the verified address wallet datastructure;
calculate, via the at least one processor, by the HSM, a contract address for the verified address wallet datastructure as a function of a deployment factory address, a salt value for the smart contract, contract code for the smart contract, and an owner address generated using the owner key identification parameters;
validate, via the at least one processor, by the HSM, a contract deployment signature associated with the verified address wallet datastructure;
calculate, via the at least one processor, by the HSM, a transaction hash for the transaction;
sign, via at least one processor, by the HSM, the transaction hash using a transaction signing private key associated with the owner datastructure to generate a transaction signature; and
return, via at least one processor, the generated transaction signature.