Keeta Network
  • Introduction
  • Architecture
    • Data Structure
    • Consensus
      • Voting Power
      • Votes
      • Vote Stapling
  • Components
    • Ledger
    • Blocks
    • Nodes
      • Ledger Pruning
    • Accounts
      • Permissions
    • Key Pairs
      • Storing Key Pairs
    • Certificates
      • Creating and Attaching Certificates
  • Security
    • Digital Signatures
    • Post Quantum Readiness
    • Data Integrity
    • Protection From Common Attacks
  • Scalability
    • Benchmarks and Performance Metrics
    • Seperating Nodes from Hardware
    • Eliminating Mempools
  • Features
    • Identity Profiles
      • Utilizing Identity Profiles
    • Native Tokenization
      • Creating Tokens
      • Built-in Rules Engine
    • Anchors
      • Creating an Anchor
  • Applications
    • Public Network
    • Private Sub Network
  • Industry Comparison
    • Keeta Network's Advantage
    • Resolving the Blockchain Trilemma
  • Other Documentation
    • Official Links
    • Tokenomics
Powered by GitBook
On this page
  1. Components
  2. Key Pairs

Storing Key Pairs

Keeta provides multiple options for key storage to cater to different security needs and use cases. For high-security applications, Hardware Security Modules (HSMs) can be used to store private keys, providing an additional layer of protection against unauthorized access. For more consumer-oriented applications, on-device storage solutions can be utilized.

For example, a secure financial app on iOS could store private keys within the Secure Enclave on the user's device, giving them immediate access to their accounts and transactions. This approach ensures that sensitive data remains protected by hardware-level security, while still allowing for quick and convenient user interactions with their financial information.

PreviousKey PairsNextCertificates

Last updated 3 months ago