EP4483530A4 - SYSTEMS AND METHODS FOR ENCLOSING SECURE BLOCKCHAIN OPERATIONS IN DECENTRALIZED APPLICATIONS WITH CRYPTOGRAM-BASED STORAGE APPLICATIONS IN COMPUTER NETWORKS - Google Patents
SYSTEMS AND METHODS FOR ENCLOSING SECURE BLOCKCHAIN OPERATIONS IN DECENTRALIZED APPLICATIONS WITH CRYPTOGRAM-BASED STORAGE APPLICATIONS IN COMPUTER NETWORKSInfo
- Publication number
- EP4483530A4 EP4483530A4 EP23760984.7A EP23760984A EP4483530A4 EP 4483530 A4 EP4483530 A4 EP 4483530A4 EP 23760984 A EP23760984 A EP 23760984A EP 4483530 A4 EP4483530 A4 EP 4483530A4
- Authority
- EP
- European Patent Office
- Prior art keywords
- applications
- cryptogram
- enclosing
- systems
- methods
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accounting & Taxation (AREA)
- Signal Processing (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/681,276 US12184800B2 (en) | 2022-02-25 | 2022-02-25 | Systems and methods for linking cryptography-based digital repositories to perform blockchain operations in decentralized applications |
| US17/681,369 US12212673B2 (en) | 2022-02-25 | 2022-02-25 | Systems and methods for facilitating secure blockchain operations in decentralized applications using cryptography-based, storage applications in computer networks |
| PCT/US2023/063269 WO2023164651A1 (en) | 2022-02-25 | 2023-02-24 | Systems and methods for facilitating secure blockchain operations in decentralized applications using cryptography-based, storage applications in computer networks |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| EP4483530A1 EP4483530A1 (en) | 2025-01-01 |
| EP4483530A4 true EP4483530A4 (en) | 2026-02-25 |
Family
ID=87766756
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP23760984.7A Pending EP4483530A4 (en) | 2022-02-25 | 2023-02-24 | SYSTEMS AND METHODS FOR ENCLOSING SECURE BLOCKCHAIN OPERATIONS IN DECENTRALIZED APPLICATIONS WITH CRYPTOGRAM-BASED STORAGE APPLICATIONS IN COMPUTER NETWORKS |
Country Status (2)
| Country | Link |
|---|---|
| EP (1) | EP4483530A4 (en) |
| WO (1) | WO2023164651A1 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP7713412B2 (en) * | 2022-03-07 | 2025-07-25 | 株式会社日立ソリューションズ | Content Protection System |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190220852A1 (en) * | 2018-01-17 | 2019-07-18 | Medici Ventures, Inc. | Multi-approval system using m of n keys to restore a customer wallet |
| US20190370792A1 (en) * | 2018-06-03 | 2019-12-05 | VVOW Company Limited | Peer-to-peer cryptocurrency and crypto asset trading platform |
| US20200334674A1 (en) * | 2019-04-19 | 2020-10-22 | Coinbase, Inc. | Systems and methods for blockchain administration |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| SG11202007263VA (en) * | 2018-02-15 | 2020-08-28 | Gk8 Ltd | Cryptocurrency wallet and cryptocurrency account management |
| CN109493024B (en) * | 2018-09-29 | 2021-02-09 | 杭州复杂美科技有限公司 | Digital asset hosting method, apparatus, and storage medium |
| WO2020162780A1 (en) * | 2019-02-08 | 2020-08-13 | Алексей Сергеевич СМИРНОВ | System and method for securely storing digital currencies and carrying out transactions in a blockchain network |
| US11645632B2 (en) * | 2020-05-26 | 2023-05-09 | Derek Norman La Salle | System and method for a decentralized portable information container supporting privacy protected digital information credentialing, remote administration, local validation, access control and remote instruction signaling utilizing blockchain distributed ledger and container wallet technologies |
| CN112200568B (en) * | 2020-10-09 | 2022-05-13 | 支付宝(杭州)信息技术有限公司 | Block chain based account creation method and device and electronic equipment |
-
2023
- 2023-02-24 EP EP23760984.7A patent/EP4483530A4/en active Pending
- 2023-02-24 WO PCT/US2023/063269 patent/WO2023164651A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190220852A1 (en) * | 2018-01-17 | 2019-07-18 | Medici Ventures, Inc. | Multi-approval system using m of n keys to restore a customer wallet |
| US20190370792A1 (en) * | 2018-06-03 | 2019-12-05 | VVOW Company Limited | Peer-to-peer cryptocurrency and crypto asset trading platform |
| US20200334674A1 (en) * | 2019-04-19 | 2020-10-22 | Coinbase, Inc. | Systems and methods for blockchain administration |
Non-Patent Citations (1)
| Title |
|---|
| See also references of WO2023164651A1 * |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2023164651A1 (en) | 2023-08-31 |
| EP4483530A1 (en) | 2025-01-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP4294263A4 (en) | SYSTEMS AND METHODS FOR REDUCING ALARM DISTURBANCE BEHAVIOR IN AN ELECTRICAL SYSTEM | |
| EP4244465A4 (en) | SYSTEMS AND PROCEDURES FOR BENEFITS MANAGEMENT | |
| EP4046046C0 (en) | SYSTEMS AND PROCEDURES FOR SECURE POLICY-BASED INFORMATION MANAGEMENT | |
| EP4049229A4 (en) | SYSTEMS AND PROCEDURES FOR ELECTRONIC PORTFOLIO MANAGEMENT | |
| EP3886436A4 (en) | VIDEO ENCODING METHOD AND DEVICE, ELECTRONIC DEVICE AND COMPUTER READABLE STORAGE MEDIUM | |
| EP3454209A4 (en) | METHOD AND SYSTEM FOR PLANNING MULTIPLE TASKS, APPLICATION SERVER AND COMPUTER READABLE STORAGE MEDIUM | |
| EP3576992A4 (en) | SYSTEMS AND METHODS OF DATA STORAGE IN ENCRYPTED DEVICES | |
| PT3440823T (en) | Method and system for managing personal information within independent computer systems and digital networks | |
| EP3929782C0 (en) | SYSTEMS AND METHODS FOR DETECTING BEHAVIORAL ANOMALIES IN APPLICATIONS | |
| EP3577952A4 (en) | METHOD AND SYSTEM FOR SELECTING AN ACCESS AND MOBILITY MANAGEMENT FUNCTION IN AN ACCESS NETWORK ENVIRONMENT | |
| EP4429955A4 (en) | SYSTEMS AND METHODS FOR AIRCRAFT MANAGEMENT | |
| EP4241522A4 (en) | MODEL MANAGEMENT SYSTEMS AND METHODS | |
| EP4232917A4 (en) | SYSTEMS, METHODS AND MEDIA FOR IMPLEMENTING CONFLICT-FREE REPLICATED DATA TYPES IN IN-MEMORY DATA STRUCTURES | |
| EP4104341A4 (en) | METHODS, DEVICES AND COMPUTER STORAGE MEDIA FOR COMMUNICATIONS | |
| EP4074014A4 (en) | METHOD AND SYSTEM FOR CAN BUS TRAFFIC MONITORING WITH HIGH INTEGRITY IN SAFETY-CRITICAL APPLICATIONS | |
| EP4150540A4 (en) | SYSTEMS AND METHODS FOR AUTOMATED TAMPER-PROOF INDEXING | |
| EP4483530A4 (en) | SYSTEMS AND METHODS FOR ENCLOSING SECURE BLOCKCHAIN OPERATIONS IN DECENTRALIZED APPLICATIONS WITH CRYPTOGRAM-BASED STORAGE APPLICATIONS IN COMPUTER NETWORKS | |
| EP4441828A4 (en) | Systems, methods, and devices for managing energy storage devices under operating temperature limits | |
| EP4367988A4 (en) | COOLING SYSTEMS AND METHODS | |
| EP4008086C0 (en) | SYSTEM AND METHOD FOR CRYPTOGRAMIC KEY MANAGEMENT IN MULTIPLE BLOCKCHAIN-BASED COMPUTER NETWORKS | |
| EP4256445A4 (en) | SYSTEMS AND METHODS FOR PROVIDING BACKUP STORAGE AND VERIFYING THE INTEGRITY OF BACKUP FILES | |
| EP4118815C0 (en) | METHOD AND SYSTEMS FOR THE SHARED USE OF FUNCTIONAL ALIAS IN MISSION-CRITICAL VIDEO | |
| EP4138462A4 (en) | INFORMATION SHARING METHOD, ELECTRONIC DEVICES AND SYSTEM | |
| EP4679791A4 (en) | METHOD AND SYSTEM FOR ACCESS MANAGEMENT | |
| EP4244902A4 (en) | SYSTEMS AND METHODS FOR DATA STORAGE AND PROCESSING |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
| 17P | Request for examination filed |
Effective date: 20240806 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC ME MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| DAV | Request for validation of the european patent (deleted) | ||
| DAX | Request for extension of the european patent (deleted) | ||
| A4 | Supplementary search report drawn up and despatched |
Effective date: 20260127 |
|
| RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 9/32 20060101AFI20260121BHEP Ipc: H04L 9/00 20220101ALI20260121BHEP Ipc: G06Q 20/06 20120101ALI20260121BHEP Ipc: G06Q 20/36 20120101ALI20260121BHEP Ipc: G06Q 20/38 20120101ALI20260121BHEP Ipc: H04L 9/08 20060101ALI20260121BHEP |