Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A blockchain key recovery method and medium based on secure multi-party computing technology

A secure multi-party computing and key recovery technology, which is applied in the field of blockchain key recovery, can solve problems such as failure to meet customer needs, violation of the entrusting party's wishes, and excessive core nodes, so as to minimize service provider permissions and minimize Permissions, to achieve the effect of user identity management

Active Publication Date: 2021-12-07
JUZIX TECH SHENZHEN CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method gives too much power to the core node, which cannot meet the needs of customers. The entrusted party can actually completely control the account, and can even perform operations against the entrusting party's wishes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain key recovery method and medium based on secure multi-party computing technology
  • A blockchain key recovery method and medium based on secure multi-party computing technology
  • A blockchain key recovery method and medium based on secure multi-party computing technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. Note that the aspects described below in conjunction with the drawings and specific embodiments are only exemplary, and should not be construed as limiting the protection scope of the present invention.

[0031] Traditional centralized institutions, such as banks, can use real-name authentication and other means. If the USB-shield representing the user’s identity is lost or the password is forgotten, the system can re-bind a new USB-shield (private key) through account verification. Realize the freezing and recovery of relevant account assets, and recover digital assets to a certain extent. The account and the private key are logically bound, and the centralized bank operates under the requirements of risk control.

[0032]In order to solve the technical problems proposed by the present invention, the present invention refers to the idea of ​​...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain key recovery method and medium based on secure multi-party computing technology, which prevents core nodes from being overly authorized, makes backup and recovery of private keys safer, and protects user rights and interests. Its technical solution is: the present invention uses secure multi-party computing technology to perform blockchain key trusteeship and recovery. Effectively verify and endorse user identities by introducing third-party agents who can network with legally effective government agencies to verify the validity of user identities. On the basis of effective endorsement, the user can perform secure collaborative calculation of its private key together with the key management service provider, so as to realize the encrypted backup and recovery of the user's private key. The invention can realize user identity management, minimize the authority of privileged nodes, and verify the validity of user identities through the introduction of a third-party agent, so as to meet the requirements of node user key trusteeship.

Description

technical field [0001] The present invention relates to block chain technology, in particular to a block chain key recovery method. Background technique [0002] Blockchain technology is the underlying technology of the decentralized distributed ledger technology that originated from Bitcoin. It is a chained data structure that combines data blocks in a sequential manner in chronological order, and uses cryptography to The non-tamperable and non-forgeable way guarantees a decentralized distributed ledger. A node is the basic unit of a blockchain network. Generally, a node corresponds to a computer. As a participant in the blockchain system, each maintains a copy of data and can play different roles, such as sending transactions, verifying transactions, and keeping accounts. . The nodes maintain the consistency of the backup database data through the consensus algorithm. Each account in the blockchain system consists of an address (public key) and a private key. The user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08G06Q20/38
CPCG06Q20/3829H04L9/0894H04L2209/46H04L2209/56
Inventor 谢翔李升林何德彪张江孙立林
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products