LogoLogo
1DEX
1DEX
  • 📈Welcome to 1DEX
  • 💻1DEX Technical
    • Technical Architecture Diagram
    • 1. User Interface
    • 2. Access
    • 3. Development
    • 4. Decentralized Governance
    • 5. Privacy-Based Account Access
    • 6. Shared Order Book
    • 7. Asset Deposit & Withdrawal for Passkey Users
    • Summary
  • 🔐Learn About PassKey
    • What is PassKey?
    • Why Choose PassKey?
    • PassKey in 1DEX Applications
    • Creating a PassKey
    • Add and Authorize PassKeys
    • Devices and Browsers Supporting PassKey
  • How to add a Passkey with different storage methods?
    • Passkey storage on Apple devices
    • Passkey storage on Windows devices
  • How to Delete a PassKey?
  • PassKey FAQs and Solutions
  • Account Security Levels
  • 👩‍💻User Guide
    • Onboarding
    • Logging In
    • Depositing Funds
    • Withdrawing Funds
    • Limit Order Trading
    • Market Order Trading
    • Invitation Program
    • Incentive Points Program
  • Guide to Swap EOS for A
  • ☎️Contact US
Powered by GitBook
On this page
  • The Perfect Blend of Security and Convenience
  • The Core of PassKey: Public-Private Key Pair
  • Transaction Process
  • Security and Backup
  1. Learn About PassKey

PassKey in 1DEX Applications

The Perfect Blend of Security and Convenience

PassKey technology offers 1DEX an innovative private key management solution. By generating and storing private keys in a device's secure chip (such as Secure Enclave or TPM), users no longer need to worry about the storage and security of their private keys, enabling safe and convenient transactions. Below is the core process:

The Core of PassKey: Public-Private Key Pair

  • Private Key: Generated and permanently stored within the device’s secure chip, never leaving the secure environment, and used solely for local signing.

  • Public Key: Used to generate the user’s unique address on the blockchain and for subsequent signature verification.

Transaction Process

  1. Transaction Initiation: The user submits a transaction request on 1DEX, generating transaction data to be signed.

  2. Identity Verification: The device prompts the user to verify their PassKey using fingerprint, facial recognition, or a PIN code.

  3. Local Signing: Upon successful verification, the secure chip signs the transaction with the private key, producing a signature compliant with blockchain standards.

  4. On-Chain Verification: The signature and transaction data are broadcast to the blockchain, where nodes verify its legitimacy using the public key before completing the transaction.

Security and Backup

  • Zero-Touch Private Key: 1DEX and other third parties only interact with signed transaction data and cannot directly access the private key.

  • Backup Mechanism: PassKey supports private key backup via cloud sync (e.g., iCloud Keychain or Google Password Manager), mitigating the risk of device loss.

PreviousWhy Choose PassKey?NextCreating a PassKey

Last updated 3 months ago

🔐