白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

System and method for key recovery and verification in blockchain based networks

專利號(hào)
US11930110B2
公開日期
2024-03-12
申請(qǐng)人
KZEN NETWORKS LTD(IL Tel Aviv)
發(fā)明人
Tal Arieh Be'ery; Ouriel Ohayon; Omer Shlomovits; Gary Benattar
IPC分類
H04L29/06; H04L9/00; H04L9/08
技術(shù)領(lǐng)域
recovery,key,escrow,computing,private,least,device,at,public,keys
地域: Tel Aviv

摘要

Methods and systems of recovering a cryptographic key associated with a blockchain based computer network, including encryption of at least a portion of a cryptographic key of the computer network with a recovery public key, sending of the encrypted at least a portion of the cryptographic key to at least one second computing device, sending of a recovery private key to a recovery escrow service, detection that the at least one first computing device is unavailable, publishing the recovery private key in a public repository, retrieving the recovery private key from the public repository, and decryption of the encrypted at least a portion of the cryptographic key by the at least one second computing device.

說明書

The at least one first computing device 210 may include a processor 202 (e.g., such as controller 105 shown in FIG. 1) and/or a server 203, and be configured to generate at least one cryptographic pair of a recovery public key 204 and a recovery private key 205. For instance, the at least one cryptographic key pair may be generated once at initialization of the system. If the at least one first computing device 210 becomes unavailable, the cryptographic key management system 200 may allow recovery of cryptographic keys with dedicated management of the at least one cryptographic pair of a recovery public key 204 and a recovery private key 205, as further described hereinafter.

In some embodiments, at least a portion of a cryptographic key 206 of the computer network 201 is encrypted with the recovery public key 204 by at least one first computing device 210, for instance encrypting the cryptographic key 206 when keys are updated (e.g., with new key generation and/or key rotation). The encrypted at least a portion of the cryptographic key 206 may be sent to the at least one second computing device 220 (e.g., a smartphone), for instance the at least one second computing device 220 may thereby store an encrypted version of the cryptographic private key of the computer network 201. In some embodiments, the at least one second computing device 220 retrieves the recovery public key 204, for instance as a certificate, via a dedicated API of operated by the at least one first computing device 210. It should be noted that the cryptographic key may be split into a plurality of shares or portions, between a plurality of computing devices, with the multi-party computation protocol.

權(quán)利要求

1
微信群二維碼
意見反饋