SG11202008752TA - Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions - Google Patents

Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions

Info

Publication number
SG11202008752TA
SG11202008752TA SG11202008752TA SG11202008752TA SG11202008752TA SG 11202008752T A SG11202008752T A SG 11202008752TA SG 11202008752T A SG11202008752T A SG 11202008752TA SG 11202008752T A SG11202008752T A SG 11202008752TA SG 11202008752T A SG11202008752T A SG 11202008752TA
Authority
SG
Singapore
Prior art keywords
instant
security
increasing
computer
line
Prior art date
Application number
SG11202008752TA
Inventor
Thomas Trevethan
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of SG11202008752TA publication Critical patent/SG11202008752TA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/105Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3678Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/204Point-of-sale [POS] network systems comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/326Payment applications installed on the mobile devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computing Systems (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Hardware Redundancy (AREA)
  • Telephonic Communication Services (AREA)
SG11202008752TA 2018-04-13 2019-03-25 Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions SG11202008752TA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB1806112.7A GB201806112D0 (en) 2018-04-13 2018-04-13 Computer-implemented system and method
PCT/IB2019/052398 WO2019197926A1 (en) 2018-04-13 2019-03-25 Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions

Publications (1)

Publication Number Publication Date
SG11202008752TA true SG11202008752TA (en) 2020-10-29

Family

ID=62203416

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202008752TA SG11202008752TA (en) 2018-04-13 2019-03-25 Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions

Country Status (9)

Country Link
US (1) US20210150522A1 (en)
EP (2) EP4236188A3 (en)
JP (3) JP7244537B2 (en)
KR (1) KR20200141502A (en)
CN (1) CN111971930A (en)
GB (1) GB201806112D0 (en)
SG (1) SG11202008752TA (en)
TW (1) TWI818005B (en)
WO (1) WO2019197926A1 (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11151558B2 (en) * 2018-12-12 2021-10-19 American Express Travel Related Services Company, Inc Zero-knowledge proof payments using blockchain
CN109816422B (en) * 2018-12-13 2022-11-18 深圳市先河***技术有限公司 Compensation method of block chain node equipment, node equipment and device
CN110084050B (en) * 2019-04-23 2023-03-24 武汉大学 Attribute-based encryption microgrid transaction method based on block chain
GB2593779A (en) * 2020-04-03 2021-10-06 Nchain Licensing Ag Methods and devices for double-spend relay in a blockchain network
CN111861741A (en) * 2020-06-23 2020-10-30 广东贝莱蔻生物科技有限公司 Supply chain creditor transfer and tracing method and system based on block chain
CN111865582B (en) * 2020-07-20 2023-05-09 陕西合友网络科技有限公司 Private key offline storage method, system and storage medium based on zero knowledge proof
CN111899007B (en) * 2020-08-10 2024-01-26 天翼电子商务有限公司 Digital currency double off-line payment method and payment system
TWI748627B (en) * 2020-09-01 2021-12-01 林庠序 Logistics information management system and related computer program product
US11922404B2 (en) * 2020-09-25 2024-03-05 LINE Plus Corporation Method and system for payment for central bank digital currency
CN112184244A (en) * 2020-09-29 2021-01-05 壹链盟生态科技有限公司 Block chain-based consensus achieving method and device and storage medium
CN112288434B (en) * 2020-11-20 2023-07-25 网易(杭州)网络有限公司 Privacy transaction method, device, zero knowledge proof system and privacy transaction architecture model
WO2022162695A1 (en) * 2021-01-27 2022-08-04 Cubic Corporation Mobility as a service (maas) platform
CN112926967B (en) * 2021-03-18 2024-02-02 上海零数众合信息科技有限公司 Metering and payment method for blockchain platform
CN113393225B (en) * 2021-06-30 2022-10-28 杭州链网科技有限公司 Digital currency encryption payment method and system
CN113592469A (en) * 2021-08-02 2021-11-02 杭州复杂美科技有限公司 Red packet processing method based on zero knowledge proof, computer equipment and storage medium
CN113592651B (en) * 2021-08-02 2023-05-30 杭州复杂美科技有限公司 Delay transaction method, computer device and storage medium
KR102582974B1 (en) * 2021-08-19 2023-09-25 한양대학교 산학협력단 FORWARD SECURE SIGNATURE METHOD AND SIGNATURES AGGREGATION METHOD BASED ON zk-SNARKs
CN114095823A (en) * 2021-11-15 2022-02-25 歌尔科技有限公司 Earphone leakage compensation method, device, equipment and storage medium
CN116757849B (en) * 2023-08-14 2023-10-20 中资科技(江苏)有限公司 Asset management system and method based on block chain

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE68929263T2 (en) * 1988-03-16 2001-07-12 Digicash Inc., Palo Alto BLIND SIGNATURE SYSTEMS WITH A SINGLE TEMPLATE
JPH0752460B2 (en) * 1989-04-03 1995-06-05 日本電信電話株式会社 Electronic cash implementation method and apparatus
US6389136B1 (en) * 1997-05-28 2002-05-14 Adam Lucas Young Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys
US6282295B1 (en) * 1997-10-28 2001-08-28 Adam Lucas Young Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers
US6243466B1 (en) * 1997-08-29 2001-06-05 Adam Lucas Young Auto-escrowable and auto-certifiable cryptosystems with fast key generation
GB9720846D0 (en) 1997-10-02 1997-12-03 Mbt Holding Ag Composition
US8924728B2 (en) * 2004-11-30 2014-12-30 Intel Corporation Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
CA2935823C (en) * 2005-01-18 2019-01-15 Certicom Corp. Accelerated verification of digital signatures and public keys
CN102045709B (en) * 2009-10-13 2013-11-06 中兴通讯股份有限公司 Mobile terminal application data downloading method, system and mobile terminal
EP2326041A1 (en) * 2009-11-19 2011-05-25 Gemalto SA Countermeasures against power attacks for the randomization of the exponent
US8667292B2 (en) * 2011-05-19 2014-03-04 Microsoft Corporation Privacy-preserving metering with low overhead
SG11201500786UA (en) * 2012-08-08 2015-05-28 Toshiba Kk Re-encryption key generator, re-encryption device, encryption device, decryption device, and program
CN104717067B (en) * 2013-12-17 2018-02-23 ***通信集团辽宁有限公司 Safe verification method, equipment and system based on non-interactive type Zero Knowledge
US9509502B2 (en) * 2014-03-13 2016-11-29 Intel Corporation Symmetric keying and chain of trust
WO2015142765A1 (en) * 2014-03-17 2015-09-24 Coinbase, Inc Bitcoin host computer system
CN104009837B (en) * 2014-04-28 2017-12-12 小米科技有限责任公司 Key updating method, device and terminal
JP6813477B2 (en) * 2014-05-09 2021-01-13 ヴェリタセウム アイエヌシー. A device, system, or method that facilitates value transfer between unreliable or unreliable parties.
US10489757B2 (en) * 2014-05-19 2019-11-26 OX Labs Inc. System and method for rendering virtual currency related services
US9818092B2 (en) * 2014-06-04 2017-11-14 Antti Pennanen System and method for executing financial transactions
CN107408174B (en) * 2015-01-30 2021-10-01 E·马伊姆 System and method for managing networking commitments for secure entities
US10257176B2 (en) * 2015-03-04 2019-04-09 Ssh Communications Security Oyj Replacing keys in a computer system
US9641341B2 (en) * 2015-03-31 2017-05-02 Duo Security, Inc. Method for distributed trust authentication
US11140171B1 (en) * 2015-06-05 2021-10-05 Apple Inc. Establishing and verifying identity using action sequences while protecting user privacy
US9923721B2 (en) * 2015-06-22 2018-03-20 Intel IP Corporation Key agreement and authentication for wireless communication
US9948467B2 (en) * 2015-12-21 2018-04-17 Mastercard International Incorporated Method and system for blockchain variant using digital signatures
US11057198B2 (en) * 2016-03-04 2021-07-06 Assured Enterprises, Inc. Utilization of a proxy technique in escrow encryption key usage
TW201810989A (en) * 2016-05-18 2018-03-16 納格維遜股份有限公司 Method and device to protect a cryptographic exponent
CN106296138A (en) * 2016-08-09 2017-01-04 西安电子科技大学 Bit coin payment system based on Partial Blind Signature technology and method thereof
KR101883156B1 (en) * 2016-08-10 2018-07-30 삼성에스디에스 주식회사 System and method for authentication, user terminal, authentication server and service server for executing the same
US11310060B1 (en) * 2018-02-15 2022-04-19 Blockstream Corporation Atomic cross-chain swaps using equivalent secret values

Also Published As

Publication number Publication date
GB201806112D0 (en) 2018-05-30
KR20200141502A (en) 2020-12-18
JP7451797B2 (en) 2024-03-18
JP2021520732A (en) 2021-08-19
CN111971930A (en) 2020-11-20
TW201944757A (en) 2019-11-16
WO2019197926A1 (en) 2019-10-17
EP4236188A2 (en) 2023-08-30
TWI818005B (en) 2023-10-11
US20210150522A1 (en) 2021-05-20
JP7244537B2 (en) 2023-03-22
JP2024073505A (en) 2024-05-29
EP4236188A3 (en) 2023-09-13
JP2023071977A (en) 2023-05-23
EP3777023A1 (en) 2021-02-17
EP3777023B1 (en) 2023-06-07

Similar Documents

Publication Publication Date Title
SG11202008752TA (en) Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions
GB201803706D0 (en) Computer-implemented system and method
GB201808493D0 (en) Computer-Implemented System and Method
GB201802347D0 (en) Computer-implemented system and method
GB201815816D0 (en) Computer-implemented system and method
GB201912068D0 (en) Computer-implemented system and method
GB201918729D0 (en) Computer-implemented system and method
GB201802148D0 (en) Computer-implemented system and method
GB201807835D0 (en) Computer-implemented system and method
GB201800818D0 (en) Computer-implemented system and method
GB201909960D0 (en) Computer-implemented system and method
GB201820947D0 (en) Computer-implemented system and method
GB201811968D0 (en) Computer-implemented System and Method
GB201811672D0 (en) Computer-implemented system and method
GB201907180D0 (en) Computer-implemented system and method
GB201906893D0 (en) Computer-Implemented system and method
GB201816936D0 (en) Computer-implemented system and method
GB201804479D0 (en) Computer-implemented system and method
ZA202007191B (en) Multi-action transaction system and method
GB201913667D0 (en) Computer-implemented system and method
GB201901391D0 (en) Computer-implemented system and method
GB201910621D0 (en) Computer-implemented system and method
GB201811773D0 (en) Computer-implemented system and method
GB201810981D0 (en) Computer-implemented system and method
GB201905279D0 (en) Computer-implemented security system and method