SG11202008752TA - Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions - Google Patents
Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactionsInfo
- Publication number
- SG11202008752TA SG11202008752TA SG11202008752TA SG11202008752TA SG11202008752TA SG 11202008752T A SG11202008752T A SG 11202008752TA SG 11202008752T A SG11202008752T A SG 11202008752TA SG 11202008752T A SG11202008752T A SG 11202008752TA SG 11202008752T A SG11202008752T A SG 11202008752TA
- Authority
- SG
- Singapore
- Prior art keywords
- instant
- security
- increasing
- computer
- line
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/105—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3678—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/204—Point-of-sale [POS] network systems comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/326—Payment applications installed on the mobile devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Hardware Redundancy (AREA)
- Telephonic Communication Services (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1806112.7A GB201806112D0 (en) | 2018-04-13 | 2018-04-13 | Computer-implemented system and method |
PCT/IB2019/052398 WO2019197926A1 (en) | 2018-04-13 | 2019-03-25 | Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202008752TA true SG11202008752TA (en) | 2020-10-29 |
Family
ID=62203416
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202008752TA SG11202008752TA (en) | 2018-04-13 | 2019-03-25 | Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions |
Country Status (9)
Country | Link |
---|---|
US (1) | US20210150522A1 (zh) |
EP (2) | EP4236188A3 (zh) |
JP (3) | JP7244537B2 (zh) |
KR (1) | KR20200141502A (zh) |
CN (1) | CN111971930A (zh) |
GB (1) | GB201806112D0 (zh) |
SG (1) | SG11202008752TA (zh) |
TW (1) | TWI818005B (zh) |
WO (1) | WO2019197926A1 (zh) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11151558B2 (en) * | 2018-12-12 | 2021-10-19 | American Express Travel Related Services Company, Inc | Zero-knowledge proof payments using blockchain |
CN109816422B (zh) * | 2018-12-13 | 2022-11-18 | 深圳市先河***技术有限公司 | 区块链节点设备的补偿方法、节点设备和装置 |
CN110084050B (zh) * | 2019-04-23 | 2023-03-24 | 武汉大学 | 一种基于区块链的属性基加密微网交易方法 |
GB2593779A (en) * | 2020-04-03 | 2021-10-06 | Nchain Licensing Ag | Methods and devices for double-spend relay in a blockchain network |
CN111861741A (zh) * | 2020-06-23 | 2020-10-30 | 广东贝莱蔻生物科技有限公司 | 一种基于区块链的供应链债权流转及追溯方法和*** |
CN111865582B (zh) * | 2020-07-20 | 2023-05-09 | 陕西合友网络科技有限公司 | 基于零知识证明的私钥离线存储方法、***及存储介质 |
CN111899007B (zh) * | 2020-08-10 | 2024-01-26 | 天翼电子商务有限公司 | 数字货币双离线支付方法及支付*** |
TWI748627B (zh) * | 2020-09-01 | 2021-12-01 | 林庠序 | 物流資訊管理系統與相關的電腦程式產品 |
US11922404B2 (en) * | 2020-09-25 | 2024-03-05 | LINE Plus Corporation | Method and system for payment for central bank digital currency |
CN112184244A (zh) * | 2020-09-29 | 2021-01-05 | 壹链盟生态科技有限公司 | 基于区块链的共识达成方法、装置及存储介质 |
CN112288434B (zh) * | 2020-11-20 | 2023-07-25 | 网易(杭州)网络有限公司 | 隐私交易方法、装置、零知识证明***和隐私交易架构模型 |
WO2022162695A1 (en) * | 2021-01-27 | 2022-08-04 | Cubic Corporation | Mobility as a service (maas) platform |
CN112926967B (zh) * | 2021-03-18 | 2024-02-02 | 上海零数众合信息科技有限公司 | 一种用于区块链平台的计量与付费的方法 |
CN113393225B (zh) * | 2021-06-30 | 2022-10-28 | 杭州链网科技有限公司 | 数字货币加密支付方法及*** |
CN113592469A (zh) * | 2021-08-02 | 2021-11-02 | 杭州复杂美科技有限公司 | 基于零知识证明的红包处理方法、计算机设备和存储介质 |
CN113592651B (zh) * | 2021-08-02 | 2023-05-30 | 杭州复杂美科技有限公司 | 延时交易方法、计算机设备和存储介质 |
KR102582974B1 (ko) * | 2021-08-19 | 2023-09-25 | 한양대학교 산학협력단 | 영지식 증명 기반의 전방향 안전 서명 방법 및 서명 결합 방법 |
CN114095823A (zh) * | 2021-11-15 | 2022-02-25 | 歌尔科技有限公司 | 耳机泄露补偿方法、装置、设备及存储介质 |
CN116757849B (zh) * | 2023-08-14 | 2023-10-20 | 中资科技(江苏)有限公司 | 基于区块链的资产管理***及方法 |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE68929263T2 (de) * | 1988-03-16 | 2001-07-12 | Digicash Inc., Palo Alto | Blindunterschriftensysteme mit einer einzigen vorlage |
JPH0752460B2 (ja) * | 1989-04-03 | 1995-06-05 | 日本電信電話株式会社 | 電子現金実施方法及びその装置 |
US6389136B1 (en) * | 1997-05-28 | 2002-05-14 | Adam Lucas Young | Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys |
US6282295B1 (en) * | 1997-10-28 | 2001-08-28 | Adam Lucas Young | Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers |
US6243466B1 (en) * | 1997-08-29 | 2001-06-05 | Adam Lucas Young | Auto-escrowable and auto-certifiable cryptosystems with fast key generation |
GB9720846D0 (en) | 1997-10-02 | 1997-12-03 | Mbt Holding Ag | Composition |
US8924728B2 (en) * | 2004-11-30 | 2014-12-30 | Intel Corporation | Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information |
CA2935823C (en) * | 2005-01-18 | 2019-01-15 | Certicom Corp. | Accelerated verification of digital signatures and public keys |
CN102045709B (zh) * | 2009-10-13 | 2013-11-06 | 中兴通讯股份有限公司 | 移动终端应用数据的下载方法、***及移动终端 |
EP2326041A1 (en) * | 2009-11-19 | 2011-05-25 | Gemalto SA | Countermeasures against power attacks for the randomization of the exponent |
US8667292B2 (en) * | 2011-05-19 | 2014-03-04 | Microsoft Corporation | Privacy-preserving metering with low overhead |
SG11201500786UA (en) * | 2012-08-08 | 2015-05-28 | Toshiba Kk | Re-encryption key generator, re-encryption device, encryption device, decryption device, and program |
CN104717067B (zh) * | 2013-12-17 | 2018-02-23 | ***通信集团辽宁有限公司 | 基于非交互式零知识的安全验证方法、设备及*** |
US9509502B2 (en) * | 2014-03-13 | 2016-11-29 | Intel Corporation | Symmetric keying and chain of trust |
WO2015142765A1 (en) * | 2014-03-17 | 2015-09-24 | Coinbase, Inc | Bitcoin host computer system |
CN104009837B (zh) * | 2014-04-28 | 2017-12-12 | 小米科技有限责任公司 | 密钥更新方法、装置及终端 |
JP6813477B2 (ja) * | 2014-05-09 | 2021-01-13 | ヴェリタセウム アイエヌシー. | 信頼度が低い、または信頼度が皆無の当事者間での価値転送を円滑化する装置、システム、または方法 |
US10489757B2 (en) * | 2014-05-19 | 2019-11-26 | OX Labs Inc. | System and method for rendering virtual currency related services |
US9818092B2 (en) * | 2014-06-04 | 2017-11-14 | Antti Pennanen | System and method for executing financial transactions |
CN107408174B (zh) * | 2015-01-30 | 2021-10-01 | E·马伊姆 | 用于管理安全实体的连网承诺的***和方法 |
US10257176B2 (en) * | 2015-03-04 | 2019-04-09 | Ssh Communications Security Oyj | Replacing keys in a computer system |
US9641341B2 (en) * | 2015-03-31 | 2017-05-02 | Duo Security, Inc. | Method for distributed trust authentication |
US11140171B1 (en) * | 2015-06-05 | 2021-10-05 | Apple Inc. | Establishing and verifying identity using action sequences while protecting user privacy |
US9923721B2 (en) * | 2015-06-22 | 2018-03-20 | Intel IP Corporation | Key agreement and authentication for wireless communication |
US9948467B2 (en) * | 2015-12-21 | 2018-04-17 | Mastercard International Incorporated | Method and system for blockchain variant using digital signatures |
US11057198B2 (en) * | 2016-03-04 | 2021-07-06 | Assured Enterprises, Inc. | Utilization of a proxy technique in escrow encryption key usage |
TW201810989A (zh) * | 2016-05-18 | 2018-03-16 | 納格維遜股份有限公司 | 用以保護密碼指數的方法及系統 |
CN106296138A (zh) * | 2016-08-09 | 2017-01-04 | 西安电子科技大学 | 基于部分盲签名技术的比特币支付***及其方法 |
KR101883156B1 (ko) * | 2016-08-10 | 2018-07-30 | 삼성에스디에스 주식회사 | 인증 시스템 및 방법과 이를 수행하기 위한 사용자 단말, 인증 서버 및 서비스 서버 |
US11310060B1 (en) * | 2018-02-15 | 2022-04-19 | Blockstream Corporation | Atomic cross-chain swaps using equivalent secret values |
-
2018
- 2018-04-13 GB GBGB1806112.7A patent/GB201806112D0/en not_active Ceased
-
2019
- 2019-03-25 JP JP2020554473A patent/JP7244537B2/ja active Active
- 2019-03-25 US US17/047,318 patent/US20210150522A1/en active Pending
- 2019-03-25 EP EP23163310.8A patent/EP4236188A3/en active Pending
- 2019-03-25 KR KR1020207032761A patent/KR20200141502A/ko active Search and Examination
- 2019-03-25 SG SG11202008752TA patent/SG11202008752TA/en unknown
- 2019-03-25 CN CN201980025691.1A patent/CN111971930A/zh active Pending
- 2019-03-25 EP EP19721768.0A patent/EP3777023B1/en active Active
- 2019-03-25 WO PCT/IB2019/052398 patent/WO2019197926A1/en active Application Filing
- 2019-04-02 TW TW108111719A patent/TWI818005B/zh active
-
2023
- 2023-03-09 JP JP2023036708A patent/JP7451797B2/ja active Active
-
2024
- 2024-03-06 JP JP2024033812A patent/JP2024073505A/ja active Pending
Also Published As
Publication number | Publication date |
---|---|
GB201806112D0 (en) | 2018-05-30 |
KR20200141502A (ko) | 2020-12-18 |
JP7451797B2 (ja) | 2024-03-18 |
JP2021520732A (ja) | 2021-08-19 |
CN111971930A (zh) | 2020-11-20 |
TW201944757A (zh) | 2019-11-16 |
WO2019197926A1 (en) | 2019-10-17 |
EP4236188A2 (en) | 2023-08-30 |
TWI818005B (zh) | 2023-10-11 |
US20210150522A1 (en) | 2021-05-20 |
JP7244537B2 (ja) | 2023-03-22 |
JP2024073505A (ja) | 2024-05-29 |
EP4236188A3 (en) | 2023-09-13 |
JP2023071977A (ja) | 2023-05-23 |
EP3777023A1 (en) | 2021-02-17 |
EP3777023B1 (en) | 2023-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202008752TA (en) | Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions | |
GB201803706D0 (en) | Computer-implemented system and method | |
GB201808493D0 (en) | Computer-Implemented System and Method | |
GB201802347D0 (en) | Computer-implemented system and method | |
GB201815816D0 (en) | Computer-implemented system and method | |
GB201912068D0 (en) | Computer-implemented system and method | |
GB201918729D0 (en) | Computer-implemented system and method | |
GB201802148D0 (en) | Computer-implemented system and method | |
GB201807835D0 (en) | Computer-implemented system and method | |
GB201800818D0 (en) | Computer-implemented system and method | |
GB201909960D0 (en) | Computer-implemented system and method | |
GB201820947D0 (en) | Computer-implemented system and method | |
GB201811968D0 (en) | Computer-implemented System and Method | |
GB201811672D0 (en) | Computer-implemented system and method | |
GB201907180D0 (en) | Computer-implemented system and method | |
GB201906893D0 (en) | Computer-Implemented system and method | |
GB201816936D0 (en) | Computer-implemented system and method | |
GB201804479D0 (en) | Computer-implemented system and method | |
ZA202007191B (en) | Multi-action transaction system and method | |
GB201913667D0 (en) | Computer-implemented system and method | |
GB201901391D0 (en) | Computer-implemented system and method | |
GB201910621D0 (en) | Computer-implemented system and method | |
GB201811773D0 (en) | Computer-implemented system and method | |
GB201810981D0 (en) | Computer-implemented system and method | |
GB201905279D0 (en) | Computer-implemented security system and method |