白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

System and method for key recovery and verification in blockchain based networks

專利號
US11930110B2
公開日期
2024-03-12
申請人
KZEN NETWORKS LTD(IL Tel Aviv)
發(fā)明人
Tal Arieh Be'ery; Ouriel Ohayon; Omer Shlomovits; Gary Benattar
IPC分類
H04L29/06; H04L9/00; H04L9/08
技術(shù)領(lǐng)域
recovery,key,escrow,computing,private,least,device,at,public,keys
地域: Tel Aviv

摘要

Methods and systems of recovering a cryptographic key associated with a blockchain based computer network, including encryption of at least a portion of a cryptographic key of the computer network with a recovery public key, sending of the encrypted at least a portion of the cryptographic key to at least one second computing device, sending of a recovery private key to a recovery escrow service, detection that the at least one first computing device is unavailable, publishing the recovery private key in a public repository, retrieving the recovery private key from the public repository, and decryption of the encrypted at least a portion of the cryptographic key by the at least one second computing device.

說明書

In some embodiments, in order to verify that the recovery escrow service 230 holds the recovery private key 205, the at least one first computing device 210 periodically (e.g., monthly) sends a recovery message, such as a random string of text, for storage at the recovery escrow service 230. For example, the recovery message may be sent via SSH-FTP interface with a lambda function retrieved for instance from an API of a news site (e.g., such as the “New-York Times”) in order to show a publicly verifiable time stamp. The recovery escrow service 230 may sign the received recovery message with the recovery private key 205 and accordingly send a report including the signed message (e.g., a signed string) to the trustee 330. The recovery message, such as a random string of text, may be any random message and therefore not a secret so that sending the recovery message may be carried out by regular (non-secret) methods, for instance send the message via mail.

The trustee 330 may publish the report with the signed message in the repository 240. Thus, any user of the system may use the at least one second computing device 220 to retrieve the report from repository 240 (e.g., from ‘GitHub’) in order to verify that recovery escrow service 230 indeed holds the recovery private key 205, for instance compatible to the recovery public key 204 already stored at the at least one second computing device 220.

In some embodiments, the at least one second computing device 220 is connected to the computer network 201 and a transaction is added to a ledger of the computer network 201, in accordance with the received signed at least a portion of the cryptographic key 206, for instance as in a cryptographic wallet.

權(quán)利要求

1
微信群二維碼
意見反饋