GB201604789D0 - Methods for creating and verifying an electronic user identity - Google Patents
Methods for creating and verifying an electronic user identityInfo
- Publication number
- GB201604789D0 GB201604789D0 GBGB1604789.6A GB201604789A GB201604789D0 GB 201604789 D0 GB201604789 D0 GB 201604789D0 GB 201604789 A GB201604789 A GB 201604789A GB 201604789 D0 GB201604789 D0 GB 201604789D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- verifying
- creating
- methods
- user identity
- electronic user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/223—Payment schemes or models based on the use of peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1604789.6A GB2548802A (en) | 2016-03-22 | 2016-03-22 | Methods for creating and verifying an electronic user identity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1604789.6A GB2548802A (en) | 2016-03-22 | 2016-03-22 | Methods for creating and verifying an electronic user identity |
Publications (2)
Publication Number | Publication Date |
---|---|
GB201604789D0 true GB201604789D0 (en) | 2016-05-04 |
GB2548802A GB2548802A (en) | 2017-10-04 |
Family
ID=55968647
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1604789.6A Withdrawn GB2548802A (en) | 2016-03-22 | 2016-03-22 | Methods for creating and verifying an electronic user identity |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2548802A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110447022A (en) * | 2017-03-19 | 2019-11-12 | 国际商业机器公司 | Block chain data automatically generate analysis |
CN110622490A (en) * | 2017-03-09 | 2019-12-27 | M·S·古尔布兰德森 | Core network access provider |
CN113169879A (en) * | 2018-11-27 | 2021-07-23 | 区块链控股有限公司 | Computer-implemented system and method for storing data on blockchains |
CN114219491A (en) * | 2022-02-23 | 2022-03-22 | 国网电子商务有限公司 | Block chain-oriented privacy transaction method and related device |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108023893A (en) * | 2017-12-18 | 2018-05-11 | 王松山 | A kind of method of block chain data recognizing system |
GB2570301A (en) * | 2018-01-17 | 2019-07-24 | Setl Development Ltd | Interaction between blockchains |
DE102018002466A1 (en) | 2018-03-16 | 2019-09-19 | Xain Ag | Method and device for establishing a secure data transmission connection |
DE102018004693A1 (en) | 2018-06-05 | 2019-12-05 | Xain Ag | Block chain network |
EP3644549A1 (en) | 2018-10-23 | 2020-04-29 | Siemens Aktiengesellschaft | Issuing device and method for issuing and requesting device and method for requesting a digital certificate |
CN111383005B (en) * | 2018-12-29 | 2024-03-12 | 北京知帆科技有限公司 | Digital currency flow direction tracking method and device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160283939A1 (en) * | 2015-03-25 | 2016-09-29 | Qualcomm Incorporated | System and method to prevent loss of bitcoins due to address errors |
US20160283920A1 (en) * | 2015-03-28 | 2016-09-29 | Justin Fisher | Authentication and verification of digital data utilizing blockchain technology |
JP6364132B2 (en) * | 2015-03-31 | 2018-07-25 | ナスダック, インコーポレイテッドNasdaq, Inc. | Blockchain transaction recording system and method |
-
2016
- 2016-03-22 GB GB1604789.6A patent/GB2548802A/en not_active Withdrawn
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110622490A (en) * | 2017-03-09 | 2019-12-27 | M·S·古尔布兰德森 | Core network access provider |
CN110447022A (en) * | 2017-03-19 | 2019-11-12 | 国际商业机器公司 | Block chain data automatically generate analysis |
CN113169879A (en) * | 2018-11-27 | 2021-07-23 | 区块链控股有限公司 | Computer-implemented system and method for storing data on blockchains |
CN114219491A (en) * | 2022-02-23 | 2022-03-22 | 国网电子商务有限公司 | Block chain-oriented privacy transaction method and related device |
Also Published As
Publication number | Publication date |
---|---|
GB2548802A (en) | 2017-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ZA202001439B (en) | Document verification and identity verification method and device | |
GB2566896B (en) | Methods and apparatus for authentication in an electronic device | |
PL3280090T3 (en) | User authentication method and device | |
GB201604789D0 (en) | Methods for creating and verifying an electronic user identity | |
PL3352412T3 (en) | Identity authentication method and device | |
ZA201602108B (en) | Apparatus and methods for identity verification | |
SG11201705035PA (en) | Method and device for identifying user identity | |
HK1221831A1 (en) | Method and device for identity authentication | |
EP3528155A4 (en) | Authentication method and electronic device | |
PL3468134T3 (en) | Method and device for identity authentication | |
HK1221567A1 (en) | Method and device for identity authentication and server | |
EP3399484C0 (en) | Method and server for authenticating and verifying file | |
GB2555660B (en) | Methods and apparatus for authentication in an electronic device | |
EP3355220A4 (en) | Facial authentication method and electronic device | |
HK1215829A1 (en) | Method and device for authenticating identity | |
GB201616897D0 (en) | Methods and apparatus for authentication in an electronic device | |
EP3338233A4 (en) | Electronic device and user authentication method thereof | |
PL3223184T3 (en) | Method and device for verifying identity information | |
SG11201700626PA (en) | Method and device for identity authentication | |
EP3509266A4 (en) | Verification method and device | |
PL3190742T3 (en) | Method and device for verifying user behaviour in mobile scenario | |
EP3399485C0 (en) | Method and server for authenticating and verifying file | |
PL3288036T3 (en) | An apparatus and associated methods | |
HK1213395A1 (en) | Magnetometer based verification method and device | |
EP2963856A4 (en) | User authentication method and device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |