SE1830037A1 - Metod för att skapa, ändra, signera, lagra och säkerställa giltighet av avtal - Google Patents

Metod för att skapa, ändra, signera, lagra och säkerställa giltighet av avtal

Info

Publication number
SE1830037A1
SE1830037A1 SE1830037A SE1830037A SE1830037A1 SE 1830037 A1 SE1830037 A1 SE 1830037A1 SE 1830037 A SE1830037 A SE 1830037A SE 1830037 A SE1830037 A SE 1830037A SE 1830037 A1 SE1830037 A1 SE 1830037A1
Authority
SE
Sweden
Prior art keywords
calculation unit
contracting
agreement
creating
contracting party
Prior art date
Application number
SE1830037A
Other languages
English (en)
Other versions
SE542205C2 (sv
Inventor
Erik Tönnäng
Original Assignee
Toennaeng & Co Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toennaeng & Co Ab filed Critical Toennaeng & Co Ab
Priority to SE1830037A priority Critical patent/SE542205C2/sv
Publication of SE1830037A1 publication Critical patent/SE1830037A1/sv
Publication of SE542205C2 publication Critical patent/SE542205C2/sv

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0613Third-party assisted
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Software Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Uppfinningen avser en metod för att skapa och signera avtal där minst två avtalsparter, en första avtalspart och en andra avtalspart, signerar ett avtal där;- en första avtalspart initierar en avtalsprocess, med en första beräkningsenhet,- den första beräkningsenheten skickar ett första meddelande till en central enhet,- den centrala enheten kommunicerar en för avtalsprocessen unik identifikation,- den unika identifikationen presenteras på den första beräkningsenheten,- en andra avtalspart anger den unika identifikationen på en andra beräkningsenhet,- en avtalstext presenteras på den första beräkningsenheten och på den andra beräkningsenheten,- avtalstexten kan, om så krävs, ändras på den första beräkningsenheten och/eller på den andra beräkningsenheten, - avtalstexten signeras av den första avtalsparten på den första beräkningsenheten och av den andra avtalsparten på den andra beräkningsenheten,- ett av alla avtalsparter signerat avtal skapas i den centrala enheten,- det signerade avtalet distribueras till minst en avtalspart.Uppfinningen avser även en programvaruprodukt tillämpande metod för att skapa och signera avtal.
SE1830037A 2018-02-06 2018-02-06 Metod för att skapa, ändra, signera, lagra och säkerställa giltighet av avtal SE542205C2 (sv)

Priority Applications (1)

Application Number Priority Date Filing Date Title
SE1830037A SE542205C2 (sv) 2018-02-06 2018-02-06 Metod för att skapa, ändra, signera, lagra och säkerställa giltighet av avtal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SE1830037A SE542205C2 (sv) 2018-02-06 2018-02-06 Metod för att skapa, ändra, signera, lagra och säkerställa giltighet av avtal

Publications (2)

Publication Number Publication Date
SE1830037A1 true SE1830037A1 (sv) 2019-08-07
SE542205C2 SE542205C2 (sv) 2020-03-10

Family

ID=67769638

Family Applications (1)

Application Number Title Priority Date Filing Date
SE1830037A SE542205C2 (sv) 2018-02-06 2018-02-06 Metod för att skapa, ändra, signera, lagra och säkerställa giltighet av avtal

Country Status (1)

Country Link
SE (1) SE542205C2 (sv)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106301782A (zh) * 2016-07-26 2017-01-04 杭州文签网络技术有限公司 一种电子合同的签署方法及***
CN106341493A (zh) * 2016-11-01 2017-01-18 北京金股链科技有限公司 实体权益数字化电子合同签署方法
JP2017027318A (ja) * 2015-07-21 2017-02-02 株式会社インフォディオ 付加型署名装置およびそれを用いた契約管理システム

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017027318A (ja) * 2015-07-21 2017-02-02 株式会社インフォディオ 付加型署名装置およびそれを用いた契約管理システム
CN106301782A (zh) * 2016-07-26 2017-01-04 杭州文签网络技术有限公司 一种电子合同的签署方法及***
CN106341493A (zh) * 2016-11-01 2017-01-18 北京金股链科技有限公司 实体权益数字化电子合同签署方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Herrmann, Francine, Khadraoui, Djamel, Lanuel, Yann, "Secure Multi-Party Computation Problem for Distributed Electronic Contract Management" Conference Paper, IEEE Xplore, p. 274 - 279. Published 2006/01/01. DOI - 10.1109/ICTTA.2006.1684383 *

Also Published As

Publication number Publication date
SE542205C2 (sv) 2020-03-10

Similar Documents

Publication Publication Date Title
PH12019500979A1 (en) Blockchain data processing method and apparatus
CY1124735T1 (el) Μεθοδοι για τον καθαρισμο αγγελιοφορου rna
AR103927A1 (es) Método para mejorar la habilidad de resistir a adn de virus que infectan plantas
BR112019002158A2 (pt) método e transmissor para alinhamento de símbolos e subquadros em um sistema de comunicação sem fio
UY37884A (es) Plataforma y método de certificación de una contratación electrónica para identificación electrónica
BR112021016613A2 (pt) Agente capaz de inibir a sinalização mediada por interleucina 11 (il-11), uso deste na fabricação de um medicamento e métodos
ATE354230T1 (de) Verfahren und vorrichtung zur verbesserung der netzwerkleitweglenkung
BR112018068758A2 (pt) método e aparelho para processar uma chapa de impressão litográfica
EA202090361A1 (ru) Способ установки полномочий пользователя в блоке обмена информацией в системе
CL2021001371A1 (es) Circuitos lógicos
SE1830037A1 (sv) Metod för att skapa, ändra, signera, lagra och säkerställa giltighet av avtal
SE1900150A1 (sv) Metod för att skapa, ändra, signera, lagra och säkerställa giltighet av avtal
MX2021002941A (es) Metodo para la creacion de una identidad digital en blockchain basado en la firma electronica.
Aritonang et al. The Work of Religious Extension Workers in Strengthening Religious Moderation in North Tapanuli
Ma et al. Erratum to" convergence rates of trinomial tree methods for option pricing under regime-switching models
UA131327U (uk) Спосіб ідентифікації нервових волокон трійчастого вузла на епоксидних шліфах
Ghose Striking a Balance
Finn Coding Cow Clicker: The Work of Algorithms
Djoudi et al. Synchrone Technologies: Innovation, Research, Industry, Education-Strengths to Succeed
Archiwal Overwhelming Majority of Afghans Has a Positive Perception of India
Shahidi A Souvenir from Amir al-Mu› minin› s Land (Rereading Seyyed Muhammad Reza Sīstāni› s Rijāli Thoughts in Qabasāt min Elm er-Rijāl)
Goodman 34 ENGINEERING A LEADER
PT110254A (pt) Processo digital de apresentação de software / aplicativo de empresas / marcas inserido em página da internet
Malloy Echo
Frye The Possible Redundancy of § 230