AU2021101878A4 - Computerized design model for encryption in blockchain transaction systems - Google Patents

Computerized design model for encryption in blockchain transaction systems Download PDF

Info

Publication number
AU2021101878A4
AU2021101878A4 AU2021101878A AU2021101878A AU2021101878A4 AU 2021101878 A4 AU2021101878 A4 AU 2021101878A4 AU 2021101878 A AU2021101878 A AU 2021101878A AU 2021101878 A AU2021101878 A AU 2021101878A AU 2021101878 A4 AU2021101878 A4 AU 2021101878A4
Authority
AU
Australia
Prior art keywords
blockchain
block chain
transaction
encryption
design model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021101878A
Inventor
Ved Prakash Bhardwaj
Saurabh Jain
Keshav Kaushik
Adarsh Kumar
Deepak Kumar Sharma
Anuraj Singh
P Srikanth
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bhardwaj Ved Prakash Dr
Original Assignee
Bhardwaj Ved Prakash Dr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bhardwaj Ved Prakash Dr filed Critical Bhardwaj Ved Prakash Dr
Priority to AU2021101878A priority Critical patent/AU2021101878A4/en
Application granted granted Critical
Publication of AU2021101878A4 publication Critical patent/AU2021101878A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

COMPUTERIZED DESIGN MODEL FOR ENCRYPTION IN BLOCKCHAIN TRANSACTION SYSTEMS ABSTRACT The present invention relates to Computerized design model for encryption in blockchain transaction systems. The objective of the present invention is to solve the problems in the prior art related to adequacies in technologies of secure model for encryption in blockchain transaction. 27 DRAWINGS Applicants: Mr.Saurabh Jain & Other Block chain center Security Unit Block chain I d t center Security Identification Authorization module number card Block chain generator Transaction center Block chain a center Graphical User Interface portal User interface FIGURE 1 28

Description

DRAWINGS
Applicants: Mr.Saurabh Jain & Other
Block chain center Security Unit
Block chain I d t center Security Identification Authorization module number card Block chain generator Transaction center
Block chain a center
Graphical User Interface portal
User interface
FIGURE 1
COMPUTERIZED DESIGN MODEL FOR ENCRYPTION IN BLOCKCHAIN TRANSACTION SYSTEMS FIELD OF INVENTION
[001]. The present invention relates to the technical field of block chains,
in particular to a method for transaction addresses in a block chain system,
a computer readable storage medium and a block chain system.
[002]. The present invention relates to the technical field of computers, in
particular to a data management method and device applied to block chains.
[003]. More particularly, the present invention is related to Computerized
design model for encryption in blockchain transaction systems.
BACKGROUND & PRIOR ART
[004]. The subject matter discussed in the background section should not
be assumed to be prior art merely as a result of its mention in the background
section. Similarly, a problem mentioned in the background section or
associated with the subject matter of the background section should not be
assumed to have been previously recognized in the prior art. The subject
matter in the background section merely represents different approaches,
which in-and-of-themselves may also be inventions.
[005]. Some of the work listed herewith:
[006]. C02018004808A2 - Platform-based transaction identity and
blockchain presents "Systems, methods, and computer media implementing
blockchain-based identity and transaction platforms are described herein.
Identity information, such as a photo, for a person can be encrypted and
stored in a blockchain as part of enrolling the person as a user in a
blockchain-based identity and transaction platform. Trust relationships can
be formed between the user and other users, and records of the trust
relationships can also be stored in the blockchain. Transactions between the
user and other users with whom the user has formed a trust relationship can
also be stored in the blockchain. The transactions can be authorized, for
example, through a multi-stage verification process that accesses
information stored on the blockchain. The transactions and identity
information, along with other information, contribute to an economic
identity of the person"
[007]. CN112087439A - Blockchain transaction query method and system,
computer equipment and storage medium presents "blockchain transaction
query method and system, computer equipment and a storage medium. The
method comprises the steps of encrypting an index value of each transaction
in a transaction list according to a preset addition homomorphic random
encryption algorithm, determining a query vector, setting the index value of
a target query transaction to be non-zero and the index values of other
transactions to be zero, and after a query result is obtained, decrypting the
query result by using a decryption algorithm corresponding to the addition
homomorphic random encryption algorithm to obtain the transaction
content of the target query transaction. By adopting the method, a
blockchain platform party cannot deduce the query information, so that the
privacy of the query information and the query result in the transaction
query process on the blockchain is improved."
[008]. CN109547461A - Anti-quantum-computing blockchain secret
transaction system and anti-quantum-computing blockchain secret
transaction methods based on P2P (Peer-to-Peer) symmetric key pools
presents "an anti-quantum-computing blockchain secret transaction system
and anti-quantum-computing blockchain secret transaction methods based
on P2P symmetric key pools. The system includes multiple user ends and a
P2P storage network. Each user end configures a quantum key card, the P2P
storage network configures the symmetric key pools, an initiating user end
generates a specific function value, the same is combined with a private key
of the local side to generate a transaction signature, and the initiating user
end encrypts the transaction signature, and sends the same onto blockchain.
A verifying user end generates a specific function value, the specific
function value is combined with a key card of the local side and ID of a
symmetric key pool to generate a key, and transaction signature is obtained
by decrypting of the key, then comparison with the specific function value
is carried out, transaction verifying is realized, the P2P storage network
stores the symmetric key pools, the P2P storage network has no central
node, thus system security is improved, burdens of the user ends are also
alleviated, setting of the key cards greatly reduces possibility of stealing keys by malicious software, and a quantum computer cannot obtain a user public key, and thus cannot obtain a corresponding private key"
[009]. CN111709740A - Method for hiding transaction address in
blockchain system, computer readable storage medium and blockchain
system presents "a method for hiding a transaction address in a blockchain
system. The method comprises the steps that a transaction initiator generates
a session key pair; the transaction initiator generates an encrypted initiator
address and an encrypted receiver address based on the transaction private
key, the receiver address and the initiator address in the session key pair,
and writes the transaction public key, the encrypted initiator address and the
encrypted receiver address in the session key pair into transaction
information; and the transaction user calculates an own address according
to an own private key and the transaction public key, and judges whether
the output of the transaction points to the transaction user or not based on
the own address, the encryption initiator address and the encryption receiver
address. The invention also relates to a computer readable storage medium
and a blockchain system. According to the method, the number of keys
needing to be maintained can be reduced, so that the calculation amount is
reduced, the encryption process of the blockchain is simplified, and the
encryption cost is reduced."
[0010]. EP3701459A4 - BLOCKCHAIN DATA PROCESSING
METHODS, APPARATUSES, DEVICES, AND SYSTEMS presents
"blockchain data processing methods, apparatuses, devices, and systems,
including a computer-implemented method for blockchain data processing.
Blockchain transaction data of a plurality of transaction participants is
received. Each of the plurality of transaction participants provides a
respective certificate indicating a respective legal membership in a
blockchain. The respective legal membership enables processing of the
blockchain transaction data. A mutual identity querying is performed to
confirm whether each of the plurality of transaction participants has the
respective legal membership in the blockchain. Supervision keys of a
supervision node in the blockchain are determined, where the supervision
node corresponds to a supervisor, and where the supervision keys are
dynamically updated based on a predetermined rule. The blockchain
transaction data is encrypted by using the supervision keys. The blockchain
transaction data is stored."
[0011]. JP2019523493A - The chain block realized by the method and
system presents "computer-implemented invention provides a method and
corresponding system for controlling access to and/or use of an internet
enabled resource. The invention uses a distributed electronic ledger such as,
for example, the Bitcoin blockchain. The resource may be an IoT device or
system. Access to the resource is permitted or enabled upon provision of a
cryptographic key e.g. a private key which corresponds to a public key
which has been stored in memory. In one embodiment, the public key is
stored in a DHT. Access to the resource is prevented or disabled by
removing the public key from memory, and using a redeem script of a
blockchain Transaction to spend a tokenized output of a further blockchain
Transaction. The process of communicating the requisite cryptographic
keys and transferring funds is performed via the blockchain. The keys are
communicated as tokens in the metadata of transactions scripts. In use, when
access is requested by the user, an encrypted message is sent to the resource.
The message has been encrypted using the user's private key. If the resource
can use the previously communicated public key to decrypt the message,
access can be granted. The invention is particularly suited for use in
situations where temporary access or use of the resource is to be granted egg
rental scenarios."
[0012]. US20210090076A1 - REGISTRY AND AUTOMATED
MANAGEMENT METHOD FOR BLOCKCHAIN-ENFORCED SMART
CONTRACTS presents "blockchain and smart contract technologies. It
provides a technical arrangement which simplifies the automated
management of contracts. The invention comprises a method and system
which use a computer-based repository for storage of the contract. The
contract is then represented by a transaction on the blockchain. Metadata
within the transaction's script includes a hash of the contract and a means of
identifying its location within the repository. The transaction also includes
an unspent output (UTXO) which indicates its status as an open (i.e. not
terminated) contract. The contract is terminated by spending the output at a
later point in time,"
[0013]. CN11641641A - Blockchain data sharing method based on
searchable proxy re-encryption presents "blockchain data sharing method
based on searchable proxy re-encryption. The data is encrypted by a public
key; agent re-encryption processing is used, the data is stored intoan
external database; keywords of data is extracted, the keywords are encrypted
by searchable symmetric encryption to form a keyword index I -Enc(MK,
pp, wi), the index and a proxy re-encryption keyis attached to the tail of a
transaction, broadcasting of the index and the proxy re-encryption key is
realized to a blockchain network, transaction information is verified by a
miner node, and the transaction information is added into a blockchain after
the transaction information is errorless, via keyworks, , an own search token
TK -TokenGen (MK, pp, wi) is generated through data user by the
parameters; the Token is sent to a block chain network, the miner node
carries out matching calculation one (Ii)"
[0014]. CN111401891A - Data management method and device applied to
block chain presents "a data management method and device applied to a
block chain, and relates to the technical field of computers. A specific
embodiment of the method comprises the steps of receiving a hash value
transmitted by a first client through a smart contract; receiving a purchase
request for the target data transmitted by the second client, obtaining the
public key of the second client and transmitting the public key to the first
client, and then receiving a cipher text fed back by the first client; and
transmitting the ciphertext and the hash value to the second client so as to
perform preset corresponding operation based on a comparison result fed
back by the second client after the second client performs data decryption
and comparison. According to the embodiment of the invention, a set of
complete thought of carrying out data fair transaction through the
blockchain is provided; ans through an asymmetric encryption technology
and a constraint mechanism adopted for two transaction parties".
[0015]. Groupings of alternative elements or embodiments of the invention
disclosed herein are not to be construed as limitations. Each group member
can be referred to and claimed individually or in any combination with other
members of the group or other elements found herein. One or more members
of a group can be included in, or deleted from, a group for reasons of
convenience and/or patentability. When any such inclusion or deletion
occurs, the specification is herein deemed to contain the group as modified,
thus fulfilling the written description of all Markus groups used in the
appended claims.
[0016]. As used in the description herein and throughout the claims that
follow, the meaning of "a," "an," and "the" includes plural reference unless
the context clearly dictates otherwise. Also, as used in the description
herein, the meaning of"in" includes "in" and "on"unless the context clearly
dictates otherwise.
[0017]. The recitation of ranges of values herein is merely intended to serve
as a shorthand method of referring individually to each separate value
falling within the range. Unless otherwise indicated herein, each individual
value is incorporated into the specification as if it were individually recited
herein. All methods described herein can be performed in any suitable order
unless otherwise indicated herein or otherwise clearly contradicted by
context.
[0018]. The use of any and all examples, or exemplary language (e.g. "Such
as") provided with respect to certain embodiments herein is intended merely
to better illuminate the invention and does not pose a limitation on the scope
of the invention otherwise claimed. No language in the specification should
be construed as indicating any non-claimed element essential to the practice
of the invention.
[0019]. The above information disclosed in this Background section is only
for the enhancement of understanding of the background of the invention
and therefore it may contain information that does not form the prior art that
is already known in this country to a person of ordinary skill in the art.
SUMMARY
[0020]. Before the present systems and methods, are described, it is to be
understood that this application is not limited to the particular systems, and
methodologies described, as there can be multiple possible embodiments
which are not expressly illustrated in the present disclosure. It is also to be
understood that the terminology used in the description is for the purpose of
describing the particular versions or embodiments only and is not intended
to limit the scope of the present application.
[0021]. The present invention mainly cures and solves the technical
problems existing in the prior art. In response to these problems, the present
invention discloses a Computerized design model for encryption in
blockchain transaction systems.
[0022]. As an aspect of the present invention , it presents a computerized
design model for encryption in blockchain transaction systems, the
computerized design model comprising: A blockchain center with a cluster,
further comprising: a host for processing blockchain transactions, a security
module authenticating and generating a customer personal identification
number , authentication means for authenticating a User interface, and an
interface for an electronic transaction portal for reading a request,
Converting the request, forwarding requests to the host for processing and
sending processed information to the portal and blockchain storage means
for blockchain storage; A security unit further comprising: an identification
number generator for conducting sensitive blockchain transactions on the
user interface by unique identifications validated for adaptability with the
group; and An authorization cards to configured to effectuate multi-level
authorization of primary and subsidiary blockchain transactions while
selectively linking the primary and subsidiary blockchain transactions to the
identification number generator.
OBJECTIVE OF THE INVENTION
[0023]. The principle objective of the present invention is to provide a
Computerized design model for encryption in blockchain transaction
systems.
BRIEF DESCRIPTION OF DRAWINGS
[0024]. To clarify various aspects of some example embodiments of the
present invention, a more particular description of the invention will be
rendered by reference to specific embodiments thereof which are illustrated
in the appended drawings. It is appreciated that these drawings depict only
illustrated embodiments of the invention and are therefore not to be
considered limiting of its scope. The invention will be described and
explained with additional specificity and detail through the use of the
accompanying drawings.
[0025]. In order that the advantages of the present invention will be easily
understood, a detailed description of the invention is discussed below in conjunction with the appended drawings, which, however, should not be considered to limit the scope of the invention to the accompanying drawings, in which:
[0026]. Figure 1 shows a flow -diagram representation of a Computerized
design model for encryption in blockchain transaction systems., according
to one of the embodiment of the present invention.
DETAIL DESCRIPTION
[0027]. The present invention is related to Computerized design model for
encryption in blockchain transaction systems
[0028]. Figure 1 shows a flow -diagram representation of a Computerized
design model for encryption in blockchain transaction systems., according
to one of the embodiment of the present invention.
[0029]. Although the present disclosure has been described with the purpose
of Computerized design model for encryption in blockchain transaction
systems, it should be appreciated that the same has been done merely to
illustrate the invention in an exemplary manner and to highlight any other purpose or function for which explained structures or configurations could be used and is covered within the scope of the present disclosure.
[0030]. Some embodiments of this disclosure, illustrating all its features,
will now be discussed in detail. The words and other forms thereof, are
intended to be open ended in that an item or items following any one of
these words are not meant to be an exhaustive listing of such item or items,
or meant to be limited to only the listed item or items. It must also be noted
that as used herein and in the appended claims, the singular forms "a," "an,"
and "the" include plural references unless the context clearly dictates
otherwise. Although any systems and methods similar or equivalent to those
described herein can be used in the practice or testing of embodiments of
the present disclosure, the exemplary systems and methods are now
described. The disclosed embodiments are merely exemplary of the
disclosure, which may be embodied in various forms.
[0031]. The computerized design model for encryption in blockchain
transaction systems is disclosed in this present invention.
[0032]. The computerized design model comprises a blockchain center with
a cluster, a security unit, an authorization cards.
[0033]. The blockchain center with a cluster, further comprises a host, a
security module, and an interface for an electronic transaction portal.
[0034]. The host is sued for processing blockchain transactions.
[0035]. The security module is used for authenticating and generating a
customer personal identification number, wherein authentication means for
authenticating a User interface.
[0036]. The interface for an electronic transaction portal is used for reading
a request, and Converting the request, forwarding requests to the host for
processing and sending processed information to the portal and blockchain
storage means for blockchain storage.
[0037]. The security unit comprises an identification number generator for
conducting sensitive blockchain transactions on the user interface by unique
identifications validated for adaptability with the group.
[0038]. The step of generating at least one of blockchain transactions,
comprises the each blockchain transactions stores a portion of first
blockchain to be stored on the blockchain and first material indicating that
portions of the second blockchain.
[0039]. An authorization cards are configured to effectuate multi-level
authorization of primary and subsidiary blockchain transactions while
selectively linking the primary and subsidiary blockchain transactions to the
identification number generator.
[0040]. The core blockchain transactional limits to the User interface
specific blockchain transaction limits; and issuing a document records after
proper authentication with the unique identification number.
[0041]. The method further comprises linking a plurality of User interfaces
to a blockchain center with a cluster and linking an account blockchain
storage means to the blockchain center; creating blockchain transaction
thereby generating unique identification number for each blockchain
transaction; Authorizing the blockchain transaction via the unique
identification numbers; and Making primary and subsidiary blockchain
transactions restrictive through authorization cards and selectively
restrictive through the unique identification numbers.
[0042]. Receiving and/or requesting a blockchain set associated with at least
one blockchain transaction from a blockchain set of one of the assets,
comprises the blockchain signature, which is generated based on the
blockchain retrieved from the external blockchain source.
[0043]. Although implementations of the invention have been described in
a language specific to structural features and/or methods, it is to be
understood that the appended claims are not necessarily limited to the
specific features or methods described. Rather, the specific features and
methods are disclosed as examples of implementations of the invention.

Claims (5)

CLAIMS We claim:
1. A computerized design model for encryption in
block chain transaction systems, the computerized
design model comprising:
A block chain center with a cluster, further comprising:
a host for processing block chain transactions,
a security module authenticating and generating a
customer personal identification number, authentication means for authenticating a User interface, and
An interface, for an electronic transaction portal for
reading a request, converting the request, forwarding
requests to the host for processing and sending
processed information to the portal and block chain
storage means for block chain storage;
A security unit, further comprising: an identification
number generator for conducting sensitive block chain
transactions on the user interface by unique
identifications validated for adaptability with the
group; and
An authorization cards to configured to effectuate
multi-level authorization of primary and subsidiary block chain transactions while selectively linking the primary and subsidiary block chain transactions to the identification number generator.
2. The computerized design model for encryption in
block chain transaction systems as claimed in claim 1,
wherein the press further comprises : linking a
plurality of User interfaces to a block chain center with
a cluster and linking an account block chain storage
means to the block chain center; creating block chain
transaction thereby generating unique identification
number for each block chain transaction; Authorizing
the block chain transaction via the unique
identification numbers; and Making primary and subsidiary block chain transactions restrictive through authorization cards and selectively restrictive through the unique identification numbers.
3. The computerized design model for encryption in
block chain transaction systems as claimed in claim 1,
linking core blockchain transactional limits to the User
interface specific blockchain transaction limits; and
issuing a document records after proper authentication
with the unique identification number.
4. The computerized design model for encryption in
blockchain transaction systems as claimed in claim 1,
wherein generating at least one of blockchain
transactions, wherein the each blockchain transactions
stores a portion of first blockchain to be stored on the
blockchain and first material indicating that portions of
the second blockchain.
5. The computerized design model for encryption in
blockchain transaction systems as claimed in claim 1,
wherein Receiving and/or requesting a blockchain set
associated with at least one blockchain transaction
from a blockchain set of one of the assets, wherein the
blockchain signature is generated based on the blockchain retrieved from the external blockchain source.
AU2021101878A 2021-04-12 2021-04-12 Computerized design model for encryption in blockchain transaction systems Ceased AU2021101878A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021101878A AU2021101878A4 (en) 2021-04-12 2021-04-12 Computerized design model for encryption in blockchain transaction systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021101878A AU2021101878A4 (en) 2021-04-12 2021-04-12 Computerized design model for encryption in blockchain transaction systems

Publications (1)

Publication Number Publication Date
AU2021101878A4 true AU2021101878A4 (en) 2021-07-22

Family

ID=76858411

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021101878A Ceased AU2021101878A4 (en) 2021-04-12 2021-04-12 Computerized design model for encryption in blockchain transaction systems

Country Status (1)

Country Link
AU (1) AU2021101878A4 (en)

Similar Documents

Publication Publication Date Title
JP7181539B2 (en) METHOD AND APPARATUS FOR MANAGING USER IDENTIFICATION AND AUTHENTICATION DATA
CN111062716B (en) Method and device for generating block chain signature data and block chain transaction initiating system
EP3610606B1 (en) Managing sensitive data elements in a blockchain network
CN109845220B (en) Method and apparatus for providing blockchain participant identity binding
US11784796B2 (en) Enhanced post-quantum blockchain system and methods including privacy and block interaction
JP2020145733A (en) Method for managing a trusted identity
US11245524B2 (en) Binding of decentralized identifiers to verified claims
US20210218720A1 (en) Systems and methods for secure custodial service
WO2018170341A1 (en) Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication
KR20190075793A (en) Authentication System for Providing Instant Access Using Block Chain
EP1351113A2 (en) A biometric authentication system and method
CN104158827B (en) Ciphertext data sharing method, device, inquiry server and upload data client
JP2003234729A (en) Revocation and updating of token in public key infrastructure system
JP2006523995A (en) Privacy of user identity in authorization certificate
CN112861157A (en) Data sharing method based on decentralized identity and proxy re-encryption
Chidambaram et al. Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique
CN114785511A (en) Certificate generation method and device, electronic device and storage medium
JP6533542B2 (en) Secret key replication system, terminal and secret key replication method
Guo et al. Using blockchain to control access to cloud data
CN1303778C (en) Method and apparatus for secure distribution of authentication credentials to roaming users
AU2021101878A4 (en) Computerized design model for encryption in blockchain transaction systems
CN115310978A (en) Transaction method and device for digital assets
CN110445756B (en) Method for realizing searchable encryption audit logs in cloud storage
US20220116220A1 (en) Password management system and method
CN117203933A (en) System and method based on block chain

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry