SG11202111216PA - Short transaction identifier collision detection and reconciliation - Google Patents

Short transaction identifier collision detection and reconciliation

Info

Publication number
SG11202111216PA
SG11202111216PA SG11202111216PA SG11202111216PA SG11202111216PA SG 11202111216P A SG11202111216P A SG 11202111216PA SG 11202111216P A SG11202111216P A SG 11202111216PA SG 11202111216P A SG11202111216P A SG 11202111216PA SG 11202111216P A SG11202111216P A SG 11202111216PA
Authority
SG
Singapore
Prior art keywords
reconciliation
collision detection
transaction identifier
identifier collision
short transaction
Prior art date
Application number
SG11202111216PA
Inventor
Steven Patrick Coughlan
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of SG11202111216PA publication Critical patent/SG11202111216PA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/223Payment schemes or models based on the use of peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
SG11202111216PA 2019-04-12 2020-04-10 Short transaction identifier collision detection and reconciliation SG11202111216PA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB1905221.6A GB2582978B (en) 2019-04-12 2019-04-12 Methods and devices for propagating blocks in a blockchain network
PCT/IB2020/053436 WO2020208596A1 (en) 2019-04-12 2020-04-10 Short transaction identifier collision detection and reconciliation

Publications (1)

Publication Number Publication Date
SG11202111216PA true SG11202111216PA (en) 2021-11-29

Family

ID=66810050

Family Applications (2)

Application Number Title Priority Date Filing Date
SG11202111214WA SG11202111214WA (en) 2019-04-12 2020-04-09 Methods and devices for propagating blocks in a blockchain network
SG11202111216PA SG11202111216PA (en) 2019-04-12 2020-04-10 Short transaction identifier collision detection and reconciliation

Family Applications Before (1)

Application Number Title Priority Date Filing Date
SG11202111214WA SG11202111214WA (en) 2019-04-12 2020-04-09 Methods and devices for propagating blocks in a blockchain network

Country Status (8)

Country Link
US (2) US20220156735A1 (en)
EP (2) EP3954085A1 (en)
JP (2) JP2022527610A (en)
KR (2) KR20210145818A (en)
CN (2) CN113841359A (en)
GB (1) GB2582978B (en)
SG (2) SG11202111214WA (en)
WO (2) WO2020208580A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2594295A (en) * 2020-04-21 2021-10-27 Nchain Holdings Ltd Block propagation with poisoned transactions in a blockchain network
GB2601539A (en) 2020-12-04 2022-06-08 Nchain Holdings Ltd Methods and systems for streaming block templates with cross-references
GB2601540A (en) 2020-12-04 2022-06-08 Nchain Holdings Ltd Methods and systems for synchronizing a streamed template to a solved block
GB2601538A (en) 2020-12-04 2022-06-08 Nchain Holdings Ltd Methods and systems for compressing transaction identifiers
CN113098677A (en) * 2021-04-06 2021-07-09 南方科技大学 Ore digging method and device based on block chain, computer equipment and storage medium
KR20230153779A (en) * 2022-04-29 2023-11-07 금오공과대학교 산학협력단 Auto Integrated Mining Method for Private Wireless Blockchain Network

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7606795B2 (en) * 2007-02-08 2009-10-20 International Business Machines Corporation System and method for verifying the integrity and completeness of records
GB2525191A (en) * 2014-04-14 2015-10-21 Mastercard International Inc Transaction identification and recognition
KR101780635B1 (en) * 2016-04-28 2017-09-21 주식회사 코인플러그 Method for creating, registering, revoking certificate information and server using the same
US10204341B2 (en) * 2016-05-24 2019-02-12 Mastercard International Incorporated Method and system for an efficient consensus mechanism for permissioned blockchains using bloom filters and audit guarantees
US10198325B2 (en) * 2016-05-24 2019-02-05 Mastercard International Incorporated Method and system for desynchronization recovery for permissioned blockchains using bloom filters
CN106100847B (en) * 2016-06-14 2021-10-26 惠众商务顾问(北京)有限公司 Method and device for verifying identity information of asymmetric encryption block chain
US10841097B2 (en) * 2016-07-08 2020-11-17 Mastercard International Incorporated Method and system for verification of identity attribute information
CN106506638B (en) * 2016-11-04 2020-01-07 江苏通付盾科技有限公司 Block storage method and device in block chain
US10229270B2 (en) * 2016-12-23 2019-03-12 Amazon Technologies, Inc. Host attestation
CN107077674B (en) * 2016-12-29 2021-06-11 达闼机器人有限公司 Transaction verification processing method and device and node equipment
CN110050474A (en) * 2016-12-30 2019-07-23 英特尔公司 The type name of subobject for the composite object in Internet of Things network and block chain
WO2018224954A1 (en) * 2017-06-07 2018-12-13 nChain Holdings Limited Computer-Implemented System and Method for Managing Transactions Over a Blockchain Network
GB201711879D0 (en) * 2017-07-24 2017-09-06 Nchain Holdings Ltd Computer-implemented system and method
CN109427012B (en) * 2017-08-22 2021-06-01 汇链丰(北京)科技有限公司 Transaction and verification method based on block chain
EP3698518B1 (en) * 2017-10-20 2024-02-14 Koninklijke KPN N.V. Primary and secondary blockchain device
US11244309B2 (en) * 2017-11-22 2022-02-08 Cornell University Real-time cryptocurrency exchange using trusted hardware
US11018850B2 (en) * 2017-12-26 2021-05-25 Akamai Technologies, Inc. Concurrent transaction processing in a high performance distributed system of record
US10250708B1 (en) * 2017-12-26 2019-04-02 Akamai Technologies, Inc. High performance distributed system of record
CN108390891A (en) * 2018-03-28 2018-08-10 电子科技大学天府协同创新中心 Information protecting method based on privately owned block chain
CN109039646B (en) * 2018-07-12 2021-07-27 北京易智能科技有限公司 Block chain block packaging and verifying method and system based on node capability
CN110400221B (en) * 2018-09-29 2021-09-10 腾讯科技(深圳)有限公司 Data processing method, system, storage medium and computer equipment
CN109493221B (en) * 2018-10-26 2021-01-12 全链通有限公司 Method, device, network and storage medium for keeping transaction records secret in block chain
US10742421B1 (en) * 2019-03-08 2020-08-11 Ares Technologies, Inc. Methods and systems for anonymous hardware attestation

Also Published As

Publication number Publication date
GB2582978A8 (en) 2020-12-16
EP3954085A1 (en) 2022-02-16
GB2582978B (en) 2022-05-04
KR20210145818A (en) 2021-12-02
GB2582978A (en) 2020-10-14
KR20210149164A (en) 2021-12-08
WO2020208596A1 (en) 2020-10-15
GB201905221D0 (en) 2019-05-29
SG11202111214WA (en) 2021-11-29
WO2020208580A1 (en) 2020-10-15
CN113826355A (en) 2021-12-21
JP2022527610A (en) 2022-06-02
US20220156735A1 (en) 2022-05-19
CN113841359A (en) 2021-12-24
EP3954086A1 (en) 2022-02-16
JP2022527611A (en) 2022-06-02
US20220182241A1 (en) 2022-06-09

Similar Documents

Publication Publication Date Title
SG11202111216PA (en) Short transaction identifier collision detection and reconciliation
IL264136A (en) Distributed transaction processing and authentication system
IL287977A (en) Separation moieties and methods and use thereof
IL284835A (en) Pharmaceutical combination comprising tno155 and ribociclib
EP3850498A4 (en) Transaction authentication system and related methods
GB2563947B (en) Fraud Detection System
EP3698305A4 (en) Authenticating and paying for services using blockchain
GB2557720B (en) Coin sorting head and coin processing system using the same
IL288671A (en) Systems and methods for authentication and fraud detection
GB2591224B (en) Glasses case and system
GB202211038D0 (en) Payment handoff system
IL291067A (en) Alpha-synuclein detection using beads
EP3721422A4 (en) Detection, counting, and identification of occupants in vehcles
SG11202106866VA (en) Fraud detection system
GB201912601D0 (en) Pedal-driveable and electrically-driveable vehicle
EP3719522A4 (en) Nuclear quadrupole resonance detection system and antenna thereof
GB201914445D0 (en) Receiving and sorting system
GB201902182D0 (en) Pyrrolobenzodiazepines and conjugates thereof
SG11202008538UA (en) Transaction security
IL264900B (en) Impact detection system
ZA202109057B (en) Currency tracking and accounting systems
HK1211369A1 (en) Dual proximity mode transaction terminal and a mobile transaction system using the same
SG11202104470XA (en) Post-transaction tipping with modified transaction message fields
GB201806022D0 (en) Pyrrolobenzodiazepines and conjugates thereof
EP3584772A4 (en) Pos system and payment method