Torus Key Infrastructure

The key management solution that creates multiple layers of progressive security.
TRY OUT DEMO

How Torus Key Infrastructure works

Torus Key Infrastructure splits a user’s key between a device, an input, and the Torus network. A user can reconstruct their key by combining any of the two.

Technical Architecture

User keys are split via a threshold scheme into “shares” secured on a mixture of authentication methods and user devices. A threshold number of shares are required to gain access to the key.
LEARN MORE

Experience it for yourself

Find out how Web3Auth gives you a better key management experience.

1

Create a private key

1

2

3

Create a private key.

Generating your private key...

Private key generated!

GENERATE PRIVATE KEY

2

Split the private key

Split the private key.

Gain better security by splitting your key into 3 shares.

3

Setup authentication factors

Set up authentication factors.

Pair each key share with an authentication factor.

Pair with your social login

Allow device storage

Enter recovery password

Done! Your key is all set up.

You've successfully secured your key.

RECONSTRUCT MY KEY

Ready to get started?

Onboard users seamlessly with Web3Auth (Previously Torus). Integrate within five minutes with our plug and play solutions.
© 2022 Torus Labs Pte Ltd. All Rights Reserved.