GB202214079D0 - Cryptosystem, system, method and aplications for zero-knowledge anonymously-individualized markerting and loyalty management based on end-to-end encrypted - Google Patents
Cryptosystem, system, method and aplications for zero-knowledge anonymously-individualized markerting and loyalty management based on end-to-end encryptedInfo
- Publication number
- GB202214079D0 GB202214079D0 GBGB2214079.2A GB202214079A GB202214079D0 GB 202214079 D0 GB202214079 D0 GB 202214079D0 GB 202214079 A GB202214079 A GB 202214079A GB 202214079 D0 GB202214079 D0 GB 202214079D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- markerting
- aplications
- anonymously
- cryptosystem
- individualized
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/383—Anonymous user system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0224—Discounts or incentives, e.g. coupons or rebates based on user history
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0613—Third-party assisted
- G06Q30/0615—Anonymizing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/AU2020/050189 WO2021168497A1 (en) | 2020-02-29 | 2020-02-29 | Cryptosystem, systems, methods and applications for zero-knowledge anonymously-individualized marketing and loyalty management based on end-to-end encrypted transfer of statements like receipts or scripts |
Publications (1)
Publication Number | Publication Date |
---|---|
GB202214079D0 true GB202214079D0 (en) | 2022-11-09 |
Family
ID=77489789
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GBGB2214079.2A Ceased GB202214079D0 (en) | 2020-02-29 | 2020-09-29 | Cryptosystem, system, method and aplications for zero-knowledge anonymously-individualized markerting and loyalty management based on end-to-end encrypted |
Country Status (4)
Country | Link |
---|---|
AU (1) | AU2020432497A1 (en) |
CA (1) | CA3173536A1 (en) |
GB (1) | GB202214079D0 (en) |
WO (1) | WO2021168497A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113965331B (en) * | 2021-12-22 | 2022-04-01 | 鹏城实验室 | Secret state prediction verification method, device, equipment and storage medium |
CN115664799B (en) * | 2022-10-25 | 2023-06-06 | 江苏海洋大学 | Data exchange method and system applied to information technology security |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020049681A1 (en) * | 2000-07-20 | 2002-04-25 | International Business Machines Corporation | Secure anonymous verification, generation and/or proof of ownership of electronic receipts |
CN1297094C (en) * | 2001-04-23 | 2007-01-24 | 国际商业机器公司 | Non-transferable anonymous digital receipts |
WO2013062481A1 (en) * | 2011-10-24 | 2013-05-02 | Nachiappan Nachiappa | Anonymous collection, presentment and reverse auction of payment receipt items |
US9842333B2 (en) * | 2012-07-23 | 2017-12-12 | Wal-Mart Stores, Inc. | Transferring digital receipt data to mobile devices |
CN104811311B (en) * | 2015-04-09 | 2018-09-11 | 深圳市中润四方信息技术有限公司 | A kind of method and system that electronic invoice transmits safely |
AU2019100775A4 (en) * | 2019-07-17 | 2019-08-22 | Sadler, Hamish MR | Secure Receipt Transfer Protocol: Cryptosystem, Communication Protocol, Systems, Methods and Smartphone Applications for End-To-End Encrypted Transfer of Tamper-Resistant Receipts as an Enabler for Anonymously-Individualized Marketing and Loyalty Management with Preservation of Buyers’ Anonymity and Privacy |
-
2020
- 2020-02-29 WO PCT/AU2020/050189 patent/WO2021168497A1/en active Application Filing
- 2020-02-29 AU AU2020432497A patent/AU2020432497A1/en active Pending
- 2020-02-29 CA CA3173536A patent/CA3173536A1/en not_active Abandoned
- 2020-09-29 GB GBGB2214079.2A patent/GB202214079D0/en not_active Ceased
Also Published As
Publication number | Publication date |
---|---|
CA3173536A1 (en) | 2021-09-02 |
WO2021168497A1 (en) | 2021-09-02 |
AU2020432497A1 (en) | 2022-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB202214079D0 (en) | Cryptosystem, system, method and aplications for zero-knowledge anonymously-individualized markerting and loyalty management based on end-to-end encrypted | |
EP4015272A4 (en) | Thermal management system for vehicle, and thermal management method based on thermal management system | |
EP3570485A4 (en) | Phase polarization multi-degree-of-freedom modulation qkd network system and method | |
WO2009042104A3 (en) | Method and apparatus for authenticating nodes in a wireless network | |
DE602007002308D1 (en) | Method, system and center for authentication in end-to-end mobile network communications | |
WO2009123840A3 (en) | Method and apparatus for distributing certificate revocation lists (crls) to nodes in an ad hoc network | |
EP3928479A4 (en) | Method for optimal routing in an inter-area srmpls igp network, nodes and system thereof | |
EP3958534A4 (en) | Method and apparatus for establishing end-to-end network connection, and network system | |
EP3843355A4 (en) | Method for sending message, method for verifying message, device, and communication system | |
EP3777006A4 (en) | Methods and devices for cryptographic key management based on blockchain system | |
GB2587446B (en) | Device, system and method for installing encrypted data | |
EP3986007A4 (en) | Method, device, and system for selecting session management network element | |
GB202110160D0 (en) | Method, system, and computer readable medium for transferring cryptographic tokens | |
EP3817292A4 (en) | Topology switching method and apparatus based on synchronous link, and system and storage medium | |
EP3979568A4 (en) | Routing management method and apparatus, network device, and readable storage medium | |
EP3735009A4 (en) | Method and system for managing media transmission channel, and related devices | |
MX2020011942A (en) | Apparatus and method for transmitting and receiving signal in multimedia system. | |
EP4210376A4 (en) | Network management method, apparatus, and system | |
EP4002864A4 (en) | Optical network unit management method, device, and system, and storage medium | |
EP3972487A4 (en) | Device, system and method for perioperative pain management | |
EP4054123A4 (en) | Network service management method, device, and system | |
EP4135377A4 (en) | Key management method, device and system | |
EP3996014A4 (en) | Management device, management system, management method, management program, and recording medium | |
EP4080902A4 (en) | Method, device, and system for distributing routing information | |
WO2020229586A1 (en) | Implementation of a butterfly key expansion scheme |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AT | Applications terminated before publication under section 16(1) |