SG11202108166WA - Computer implemented system and method for determining or verifying location - Google Patents
Computer implemented system and method for determining or verifying locationInfo
- Publication number
- SG11202108166WA SG11202108166WA SG11202108166WA SG11202108166WA SG11202108166WA SG 11202108166W A SG11202108166W A SG 11202108166WA SG 11202108166W A SG11202108166W A SG 11202108166WA SG 11202108166W A SG11202108166W A SG 11202108166WA SG 11202108166W A SG11202108166W A SG 11202108166WA
- Authority
- SG
- Singapore
- Prior art keywords
- determining
- computer implemented
- implemented system
- verifying location
- verifying
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Mobile Radio Communication Systems (AREA)
- Hardware Redundancy (AREA)
- Debugging And Monitoring (AREA)
- Position Fixing By Use Of Radio Waves (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1901391.1A GB201901391D0 (en) | 2019-02-01 | 2019-02-01 | Computer-implemented system and method |
PCT/IB2020/050405 WO2020157596A1 (en) | 2019-02-01 | 2020-01-20 | Computer implemented system and method for determining or verifying location |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202108166WA true SG11202108166WA (en) | 2021-08-30 |
Family
ID=65997781
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202108166WA SG11202108166WA (en) | 2019-02-01 | 2020-01-20 | Computer implemented system and method for determining or verifying location |
Country Status (10)
Country | Link |
---|---|
US (1) | US20220029827A1 (en) |
EP (1) | EP3918747A1 (en) |
JP (1) | JP2022524925A (en) |
KR (1) | KR20210122292A (en) |
CN (1) | CN113366799A (en) |
GB (1) | GB201901391D0 (en) |
SG (1) | SG11202108166WA (en) |
TW (1) | TWI819188B (en) |
WO (1) | WO2020157596A1 (en) |
ZA (1) | ZA202105797B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111861741A (en) * | 2020-06-23 | 2020-10-30 | 广东贝莱蔻生物科技有限公司 | Supply chain creditor transfer and tracing method and system based on block chain |
CN115473895B (en) * | 2022-09-01 | 2023-09-12 | 北京大数据先进技术研究院 | Method and device for dividing digital object warehouse node consensus groups under ubiquitous environment |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7532723B2 (en) * | 2003-11-24 | 2009-05-12 | Interdigital Technology Corporation | Tokens/keys for wireless communications |
US10588004B2 (en) * | 2006-05-16 | 2020-03-10 | RedSky Technologies, Inc. | Method and system for locating a network device in an emergency situation |
US8638926B2 (en) * | 2009-02-26 | 2014-01-28 | Red Hat, Inc. | Sharing a secret with modular inverses |
CN105917342B (en) * | 2013-05-27 | 2019-10-15 | 瑞典爱立信有限公司 | Method based on geographical location distribution license |
EP3228099A1 (en) * | 2014-12-05 | 2017-10-11 | PCMS Holdings, Inc. | Protecting the integrity of log entries in a distributed system |
EP4167165A1 (en) * | 2016-02-23 | 2023-04-19 | nChain Licensing AG | Blockchain-based exchange with tokenisation |
EP3862956B1 (en) * | 2016-02-23 | 2024-01-03 | nChain Licensing AG | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
CN106897901A (en) * | 2017-02-16 | 2017-06-27 | 湖北大学 | Based on the shared bicycle Secure Billing method that home is proved |
GB201710176D0 (en) * | 2017-06-26 | 2017-08-09 | Nchain Holdings Ltd | Computer-implemented system and method |
CN108848062B (en) * | 2018-05-23 | 2021-03-26 | 华东师范大学 | Block chain-based controllable anonymous data security sharing method in vehicle-mounted network |
-
2019
- 2019-02-01 GB GBGB1901391.1A patent/GB201901391D0/en not_active Ceased
-
2020
- 2020-01-20 KR KR1020217027908A patent/KR20210122292A/en unknown
- 2020-01-20 CN CN202080011930.0A patent/CN113366799A/en active Pending
- 2020-01-20 WO PCT/IB2020/050405 patent/WO2020157596A1/en unknown
- 2020-01-20 US US17/427,374 patent/US20220029827A1/en active Pending
- 2020-01-20 JP JP2021544918A patent/JP2022524925A/en active Pending
- 2020-01-20 SG SG11202108166WA patent/SG11202108166WA/en unknown
- 2020-01-20 EP EP20709700.7A patent/EP3918747A1/en active Pending
- 2020-01-31 TW TW109103089A patent/TWI819188B/en active
-
2021
- 2021-08-13 ZA ZA2021/05797A patent/ZA202105797B/en unknown
Also Published As
Publication number | Publication date |
---|---|
GB201901391D0 (en) | 2019-03-20 |
ZA202105797B (en) | 2024-04-24 |
KR20210122292A (en) | 2021-10-08 |
CN113366799A (en) | 2021-09-07 |
WO2020157596A1 (en) | 2020-08-06 |
EP3918747A1 (en) | 2021-12-08 |
TWI819188B (en) | 2023-10-21 |
US20220029827A1 (en) | 2022-01-27 |
JP2022524925A (en) | 2022-05-11 |
TW202040967A (en) | 2020-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202003792QA (en) | System and method for verifying verifiable claims | |
GB201805633D0 (en) | Computer implemented method and system | |
SG11202003808PA (en) | System and method for data processing | |
IL288209A (en) | Systems and methods for optimizing an instrument system workflow | |
GB201817506D0 (en) | Computer implemented method and system | |
ZA202005041B (en) | Computer implemented method and system for obtaining digitally signed data | |
IL290612A (en) | Systems and methods for predicting proteins | |
SG11202110410UA (en) | Detection method and detection system | |
EP3739910A4 (en) | Method and apparatus for determining location information | |
GB201817507D0 (en) | Computer implemented system and method | |
ZA202005868B (en) | System information redundancy version determining method and apparatus | |
EP3973421A4 (en) | System and method for electronic claim verification | |
GB201815396D0 (en) | Computer implemented system and method | |
EP3976825A4 (en) | Systems and methods for determining sequence | |
EP3819770C0 (en) | System and method for software verification | |
SG11202108166WA (en) | Computer implemented system and method for determining or verifying location | |
GB202013413D0 (en) | Method and system for evaluating project based on blockchain | |
EP3759949A4 (en) | Method and determining unit for identifying optimal location(s) | |
GB201804948D0 (en) | Computer implemented system and method | |
EP4025875C0 (en) | Method and system for determining position displacments | |
EP4051127A4 (en) | Methods and systems for menstrualome analysis | |
SG11202107081QA (en) | Computer and conduit for system testing | |
GB201901893D0 (en) | Computer implemented system and method | |
SG11202104466PA (en) | Systems and methods for improving computer identification | |
GB202019837D0 (en) | System and method for determining geolocation data |