Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Block chain secret key recovering method based on multi-party security computing technology, and medium

A technology of key recovery and computing technology, applied in the field of blockchain key recovery, it can solve problems such as failure to meet customer needs, against the wishes of the entrusting party, and too large core nodes, so as to protect user rights and interests, backup and restore security, Achieve the effect of user identity management

Active Publication Date: 2018-08-17
JUZIX TECH SHENZHEN CO LTD +1
View PDF9 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method gives too much power to the core node, which cannot meet the needs of customers. The entrusted party can actually completely control the account, and can even perform operations against the entrusting party's wishes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain secret key recovering method based on multi-party security computing technology, and medium
  • Block chain secret key recovering method based on multi-party security computing technology, and medium
  • Block chain secret key recovering method based on multi-party security computing technology, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. Note that the aspects described below in conjunction with the drawings and specific embodiments are only exemplary, and should not be construed as limiting the protection scope of the present invention.

[0031] Traditional centralized institutions, such as banks, can use real-name authentication and other means. If the USB-shield representing the user’s identity is lost or the password is forgotten, the system can re-bind a new USB-shield (private key) through account verification. Realize the freezing and recovery of relevant account assets, and recover digital assets to a certain extent. The account and the private key are logically bound, and the centralized bank operates under the requirements of risk control.

[0032]In order to solve the technical problems proposed by the present invention, the present invention refers to the idea of ​​...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain secret key recovering method based on a multi-party security computing technology, and a medium, for preventing the permission of a core node from being overlarge, allowing the backup and recovery of a private key to be safer, and thus protecting user rights. The technical scheme is as follows: the mandate and recovery of the block chain secret key are performed by using the multi-party security computing technology. A governmental agency with legal validity can be introduced to be networked with a third-party agent for verifying identity validity of the user, so as to effectively verify and endorse the user identity. On the basis of effective endorsing, the user and the secret key management service provider perform security cooperative computing on the private key, so that the private key of the user is backed up and recovered in an encrypted manner. According to the method provided by the invention, the user identity management can be achieved,the permission of the privilege node is minimized, and the user identity is effectively verified through introducing the third-party agent, and thus the requirement of secrete key mandate of the nodeuser is met.

Description

technical field [0001] The present invention relates to block chain technology, in particular to a block chain key recovery method. Background technique [0002] Blockchain technology is the underlying technology of the decentralized distributed ledger technology that originated from Bitcoin. It is a chained data structure that combines data blocks in a sequential manner in chronological order, and uses cryptography to The non-tamperable and non-forgeable way guarantees a decentralized distributed ledger. A node is the basic unit of a blockchain network. Generally, a node corresponds to a computer. As a participant in the blockchain system, each maintains a copy of data and can play different roles, such as sending transactions, verifying transactions, and keeping accounts. . The nodes maintain the consistency of the backup database data through the consensus algorithm. Each account in the blockchain system consists of an address (public key) and a private key. The user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08G06Q20/38
CPCG06Q20/3829H04L9/0894H04L2209/46H04L2209/56
Inventor 谢翔李升林何德彪张江孙立林
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products