| CPC H04L 9/3226 (2013.01) [H04L 9/0637 (2013.01); H04L 9/085 (2013.01); H04L 9/088 (2013.01); H04L 9/3066 (2013.01); H04L 9/3247 (2013.01); H04L 9/50 (2022.05); H04L 2209/56 (2013.01)] | 18 Claims |

|
1. A computer-implemented method for enabling recovery of one or more digital assets held on a blockchain by a user under a public key Pk after a corresponding private key Sk for accessing the one or more digital assets is lost, the computer implemented method comprising:
setting access for the one or more digital assets held on the blockchain under the public key Pk and accessible using the corresponding private key Sk of the user such that the one or more digital assets are also accessible using a private key x shared by a congress on a blockchain network, the congress comprising a group of users on the blockchain network, each member of the congress having a private key share xi, the private key share xi to be used in a threshold signature scheme in which at least a threshold of private key shares must be used to generate a valid signature through a combination of partial signatures of the congress to access the one or more digital assets on behalf of the user, wherein setting access is initiated by a transaction Tl sent to the congress on the blockchain network indicating a desire to set up the recovery password RPw for accessing one or more digital assets held under the public key Pk, and wherein setting access comprises mapping data associated with the recovery password RPw to data associated with the private key x shared by the congress on the blockchain network, wherein the transaction Tl comprises metadata comprising recovery deposit data configured to request a recovery deposit upon a recovery attempt;
notifying, in response to the private key Sk being lost, the congress by the user to access the one or more digital assets using the threshold signature scheme on behalf of the user, the user proving their identity to the congress by providing the recovery password RPw and by providing a recovery deposit
detecting malicious activity by a malicious party in a congress, wherein the malicious party is one of the other members of the congress; and
confiscating at least a portion of digital assets previously transferred to the public group address by the malicious party.
|