SG11202102277TA - Computer-implemented system and method for transferring access to digital resource - Google Patents
Computer-implemented system and method for transferring access to digital resourceInfo
- Publication number
- SG11202102277TA SG11202102277TA SG11202102277TA SG11202102277TA SG11202102277TA SG 11202102277T A SG11202102277T A SG 11202102277TA SG 11202102277T A SG11202102277T A SG 11202102277TA SG 11202102277T A SG11202102277T A SG 11202102277TA SG 11202102277T A SG11202102277T A SG 11202102277TA
- Authority
- SG
- Singapore
- Prior art keywords
- computer
- implemented system
- digital resource
- transferring access
- transferring
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1815816.2A GB201815816D0 (en) | 2018-09-28 | 2018-09-28 | Computer-implemented system and method |
PCT/IB2019/057917 WO2020065460A1 (en) | 2018-09-28 | 2019-09-19 | Computer-implemented system and method for transferring access to digital resource |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202102277TA true SG11202102277TA (en) | 2021-04-29 |
Family
ID=64109009
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202102277TA SG11202102277TA (en) | 2018-09-28 | 2019-09-19 | Computer-implemented system and method for transferring access to digital resource |
Country Status (9)
Country | Link |
---|---|
US (1) | US20210344500A1 (en) |
EP (1) | EP3857814A1 (en) |
JP (2) | JP7428704B2 (en) |
KR (1) | KR20210065995A (en) |
CN (1) | CN112789825A (en) |
GB (1) | GB201815816D0 (en) |
SG (1) | SG11202102277TA (en) |
TW (1) | TW202025665A (en) |
WO (1) | WO2020065460A1 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2578168A (en) * | 2018-10-19 | 2020-04-22 | Star Hat Solutions Ltd | Computer-implemented method and system for digital signing of transactions |
KR102192887B1 (en) * | 2019-04-08 | 2020-12-21 | 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. | Product promotion using smart contracts on the blockchain network |
GB2584154A (en) | 2019-05-24 | 2020-11-25 | Nchain Holdings Ltd | Knowledge proof |
DE102019005116A1 (en) * | 2019-07-23 | 2021-01-28 | Daimler Ag | Procedure for trading cryptocurrencies |
GB2596096A (en) | 2020-06-17 | 2021-12-22 | Nchain Holdings Ltd | Agreements on the blockchain |
US11741083B2 (en) * | 2020-07-24 | 2023-08-29 | International Business Machines Corporation | Cross-shard private atomic commit |
WO2022125532A1 (en) * | 2020-12-07 | 2022-06-16 | Meredith Ii Thomas T | Systems and methods thereof for exchanging different digital currencies on different blockchains |
US11315113B1 (en) * | 2021-11-08 | 2022-04-26 | Tangem AG | Systems and methods for authorizing a transaction conventionally incompatible with a technical protocol |
GB2621858A (en) * | 2022-08-24 | 2024-02-28 | Nchain Licensing Ag | Blockchain transaction |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9065637B2 (en) * | 2012-01-25 | 2015-06-23 | CertiVox Ltd. | System and method for securing private keys issued from distributed private key generator (D-PKG) nodes |
GB201613176D0 (en) | 2016-07-29 | 2016-09-14 | Eitc Holdings Ltd | Computer-implemented method and system |
EP3491612A1 (en) | 2016-07-29 | 2019-06-05 | Nchain Holdings Limited | Blockchain-implemented method and system |
WO2018029324A1 (en) * | 2016-08-11 | 2018-02-15 | Sony Corporation | Authentication method, wearable device and mobile device |
US11082412B2 (en) * | 2017-07-12 | 2021-08-03 | Wickr Inc. | Sending secure communications using a local ephemeral key pool |
KR102535674B1 (en) * | 2017-12-12 | 2023-05-22 | 레노보 (싱가포르) 피티이. 엘티디. | Provision of network access using blockchain payments |
-
2018
- 2018-09-28 GB GBGB1815816.2A patent/GB201815816D0/en not_active Ceased
-
2019
- 2019-09-19 WO PCT/IB2019/057917 patent/WO2020065460A1/en unknown
- 2019-09-19 KR KR1020217012522A patent/KR20210065995A/en unknown
- 2019-09-19 SG SG11202102277TA patent/SG11202102277TA/en unknown
- 2019-09-19 EP EP19773938.6A patent/EP3857814A1/en active Pending
- 2019-09-19 US US17/280,758 patent/US20210344500A1/en active Pending
- 2019-09-19 JP JP2021513383A patent/JP7428704B2/en active Active
- 2019-09-19 CN CN201980064210.8A patent/CN112789825A/en active Pending
- 2019-09-20 TW TW108134022A patent/TW202025665A/en unknown
-
2024
- 2024-01-25 JP JP2024009121A patent/JP2024028608A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
KR20210065995A (en) | 2021-06-04 |
JP2024028608A (en) | 2024-03-04 |
CN112789825A (en) | 2021-05-11 |
EP3857814A1 (en) | 2021-08-04 |
GB201815816D0 (en) | 2018-11-14 |
JP2022501887A (en) | 2022-01-06 |
WO2020065460A1 (en) | 2020-04-02 |
US20210344500A1 (en) | 2021-11-04 |
TW202025665A (en) | 2020-07-01 |
JP7428704B2 (en) | 2024-02-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202102277TA (en) | Computer-implemented system and method for transferring access to digital resource | |
ZA202006065B (en) | Computer implemented method and system for transferring access to a digital asset | |
SG11202003794UA (en) | System and method for digital asset transfer | |
IL261679A (en) | System and method for management of digital id | |
GB2604540B (en) | System and method for secure management of digital contracts | |
SG11202102023YA (en) | System and method for improved blockchain-implemented smart contract | |
GB201707597D0 (en) | Method and system for converting three-colour data into four-colour data | |
GB2575147B (en) | Method and system for providing photorealistic changes for digital image | |
GB2567146B (en) | Method and system for secure storage of digital data | |
GB201817507D0 (en) | Computer implemented system and method | |
SG11202101525PA (en) | Secure data transfer system and method | |
GB201815396D0 (en) | Computer implemented system and method | |
SG11202003580XA (en) | System and method for data management | |
IL251683B (en) | System and method for dynamic management of private data | |
GB201919284D0 (en) | Method and system for digital attestation | |
GB2576822B (en) | Computer implemented color management system and method | |
GB201804948D0 (en) | Computer implemented system and method | |
GB2580124B (en) | System and method for data transfer | |
GB2579615B (en) | Data acquisition method and system | |
GB201901893D0 (en) | Computer implemented system and method | |
GB201810847D0 (en) | Method and system for integrating data sets | |
SG10202109200UA (en) | System and method for managing resources | |
GB201703435D0 (en) | Method and system for influencing digital content or access to content | |
GB201817429D0 (en) | The method and system for adding watermark to digital image | |
GB201819286D0 (en) | Computer implemented system and method |