白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

System and method for key recovery and verification in blockchain based networks

專(zhuān)利號(hào)
US11930110B2
公開(kāi)日期
2024-03-12
申請(qǐng)人
KZEN NETWORKS LTD(IL Tel Aviv)
發(fā)明人
Tal Arieh Be'ery; Ouriel Ohayon; Omer Shlomovits; Gary Benattar
IPC分類(lèi)
H04L29/06; H04L9/00; H04L9/08
技術(shù)領(lǐng)域
recovery,key,escrow,computing,private,least,device,at,public,keys
地域: Tel Aviv

摘要

Methods and systems of recovering a cryptographic key associated with a blockchain based computer network, including encryption of at least a portion of a cryptographic key of the computer network with a recovery public key, sending of the encrypted at least a portion of the cryptographic key to at least one second computing device, sending of a recovery private key to a recovery escrow service, detection that the at least one first computing device is unavailable, publishing the recovery private key in a public repository, retrieving the recovery private key from the public repository, and decryption of the encrypted at least a portion of the cryptographic key by the at least one second computing device.

說(shuō)明書(shū)

In some embodiments, system 200 improves computer network technology and the technological problem of cryptographic key recovery when signatures are blocked if at least one portion of the key in unavailable (e.g., when the at least one first computing device 210 is unavailable) by generating another encrypted pair of cryptographic keys and distributing these keys in the system. Even in case that a hacking attack is carried out and the hackers get access to the at least one second computing device 220, the attackers are still unable to take advantage of the stolen data (e.g., a cryptographic wallet) on their own since the at least a portion of a cryptographic key 206 is now encrypted, thereby this system may add another layer of security with a similar situation to not having the encrypted at least a portion of a cryptographic key 206. It should be noted that system 200 may prevent the requirement of having full duplicates of data as backup and/or recovery since only small amount of data, not growing with increase in amount of users, needs to be saved with the recovery cryptographic keys.

In case that the recovery private key 205 is unjustifiably published, for instance due to a malfunction and/or due to a malicious attack, the recovery public key 204 may be also revealed. Thus, all users of the at least one second computing device 220 may be able to continue operation (e.g., use their cryptographic wallets as usual) as if the recovery system did not exist. It should be noted that even if the recovery private key 205 is revealed, attackers will still need to compromise the at least one second computing device 220 in order to get access of their private key before any damage can be done.

權(quán)利要求

1
微信群二維碼
意見(jiàn)反饋