SG11202108166WA - Computer implemented system and method for determining or verifying location - Google Patents

Computer implemented system and method for determining or verifying location

Info

Publication number
SG11202108166WA
SG11202108166WA SG11202108166WA SG11202108166WA SG11202108166WA SG 11202108166W A SG11202108166W A SG 11202108166WA SG 11202108166W A SG11202108166W A SG 11202108166WA SG 11202108166W A SG11202108166W A SG 11202108166WA SG 11202108166W A SG11202108166W A SG 11202108166WA
Authority
SG
Singapore
Prior art keywords
determining
computer implemented
implemented system
verifying location
verifying
Prior art date
Application number
SG11202108166WA
Inventor
Craig Steven Wright
Daniel Joseph
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of SG11202108166WA publication Critical patent/SG11202108166WA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Hardware Redundancy (AREA)
  • Debugging And Monitoring (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
SG11202108166WA 2019-02-01 2020-01-20 Computer implemented system and method for determining or verifying location SG11202108166WA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB1901391.1A GB201901391D0 (en) 2019-02-01 2019-02-01 Computer-implemented system and method
PCT/IB2020/050405 WO2020157596A1 (en) 2019-02-01 2020-01-20 Computer implemented system and method for determining or verifying location

Publications (1)

Publication Number Publication Date
SG11202108166WA true SG11202108166WA (en) 2021-08-30

Family

ID=65997781

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202108166WA SG11202108166WA (en) 2019-02-01 2020-01-20 Computer implemented system and method for determining or verifying location

Country Status (10)

Country Link
US (1) US20220029827A1 (en)
EP (1) EP3918747A1 (en)
JP (1) JP2022524925A (en)
KR (1) KR20210122292A (en)
CN (1) CN113366799A (en)
GB (1) GB201901391D0 (en)
SG (1) SG11202108166WA (en)
TW (1) TWI819188B (en)
WO (1) WO2020157596A1 (en)
ZA (1) ZA202105797B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111861741A (en) * 2020-06-23 2020-10-30 广东贝莱蔻生物科技有限公司 Supply chain creditor transfer and tracing method and system based on block chain
CN115473895B (en) * 2022-09-01 2023-09-12 北京大数据先进技术研究院 Method and device for dividing digital object warehouse node consensus groups under ubiquitous environment

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7532723B2 (en) * 2003-11-24 2009-05-12 Interdigital Technology Corporation Tokens/keys for wireless communications
US10588004B2 (en) * 2006-05-16 2020-03-10 RedSky Technologies, Inc. Method and system for locating a network device in an emergency situation
US8638926B2 (en) * 2009-02-26 2014-01-28 Red Hat, Inc. Sharing a secret with modular inverses
CN105917342B (en) * 2013-05-27 2019-10-15 瑞典爱立信有限公司 Method based on geographical location distribution license
EP3228099A1 (en) * 2014-12-05 2017-10-11 PCMS Holdings, Inc. Protecting the integrity of log entries in a distributed system
EP4167165A1 (en) * 2016-02-23 2023-04-19 nChain Licensing AG Blockchain-based exchange with tokenisation
EP3862956B1 (en) * 2016-02-23 2024-01-03 nChain Licensing AG Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
CN106897901A (en) * 2017-02-16 2017-06-27 湖北大学 Based on the shared bicycle Secure Billing method that home is proved
GB201710176D0 (en) * 2017-06-26 2017-08-09 Nchain Holdings Ltd Computer-implemented system and method
CN108848062B (en) * 2018-05-23 2021-03-26 华东师范大学 Block chain-based controllable anonymous data security sharing method in vehicle-mounted network

Also Published As

Publication number Publication date
GB201901391D0 (en) 2019-03-20
ZA202105797B (en) 2024-04-24
KR20210122292A (en) 2021-10-08
CN113366799A (en) 2021-09-07
WO2020157596A1 (en) 2020-08-06
EP3918747A1 (en) 2021-12-08
TWI819188B (en) 2023-10-21
US20220029827A1 (en) 2022-01-27
JP2022524925A (en) 2022-05-11
TW202040967A (en) 2020-11-01

Similar Documents

Publication Publication Date Title
SG11202003792QA (en) System and method for verifying verifiable claims
GB201805633D0 (en) Computer implemented method and system
SG11202003808PA (en) System and method for data processing
IL288209A (en) Systems and methods for optimizing an instrument system workflow
GB201817506D0 (en) Computer implemented method and system
ZA202005041B (en) Computer implemented method and system for obtaining digitally signed data
IL290612A (en) Systems and methods for predicting proteins
SG11202110410UA (en) Detection method and detection system
EP3739910A4 (en) Method and apparatus for determining location information
GB201817507D0 (en) Computer implemented system and method
ZA202005868B (en) System information redundancy version determining method and apparatus
EP3973421A4 (en) System and method for electronic claim verification
GB201815396D0 (en) Computer implemented system and method
EP3976825A4 (en) Systems and methods for determining sequence
EP3819770C0 (en) System and method for software verification
SG11202108166WA (en) Computer implemented system and method for determining or verifying location
GB202013413D0 (en) Method and system for evaluating project based on blockchain
EP3759949A4 (en) Method and determining unit for identifying optimal location(s)
GB201804948D0 (en) Computer implemented system and method
EP4025875C0 (en) Method and system for determining position displacments
EP4051127A4 (en) Methods and systems for menstrualome analysis
SG11202107081QA (en) Computer and conduit for system testing
GB201901893D0 (en) Computer implemented system and method
SG11202104466PA (en) Systems and methods for improving computer identification
GB202019837D0 (en) System and method for determining geolocation data