GB2575896B - Methods and systems for validating data in a distributed computing network - Google Patents
Methods and systems for validating data in a distributed computing network Download PDFInfo
- Publication number
- GB2575896B GB2575896B GB1905316.4A GB201905316A GB2575896B GB 2575896 B GB2575896 B GB 2575896B GB 201905316 A GB201905316 A GB 201905316A GB 2575896 B GB2575896 B GB 2575896B
- Authority
- GB
- United Kingdom
- Prior art keywords
- systems
- methods
- distributed computing
- computing network
- validating data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
- G06Q20/0655—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash e-cash managed centrally
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1905316.4A GB2575896B (en) | 2019-04-15 | 2019-04-15 | Methods and systems for validating data in a distributed computing network |
PCT/EP2020/060465 WO2020212349A1 (en) | 2019-04-15 | 2020-04-14 | Methods and systems for validating data in a distributed computing network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1905316.4A GB2575896B (en) | 2019-04-15 | 2019-04-15 | Methods and systems for validating data in a distributed computing network |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201905316D0 GB201905316D0 (en) | 2019-05-29 |
GB2575896A GB2575896A (en) | 2020-01-29 |
GB2575896B true GB2575896B (en) | 2021-01-06 |
Family
ID=66810021
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1905316.4A Active GB2575896B (en) | 2019-04-15 | 2019-04-15 | Methods and systems for validating data in a distributed computing network |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2575896B (en) |
WO (1) | WO2020212349A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110311787B (en) * | 2019-06-21 | 2022-04-12 | 深圳壹账通智能科技有限公司 | Authorization management method, system, device and computer readable storage medium |
US11930116B2 (en) * | 2021-08-03 | 2024-03-12 | Adobe Inc. | Securely communicating service status in a distributed network environment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2547033A2 (en) * | 2011-07-08 | 2013-01-16 | Sap Ag | Public-key encrypted bloom filters with applications to private set intersection |
US20190034923A1 (en) * | 2017-07-31 | 2019-01-31 | Chronicled, Inc | Secure and confidential custodial transaction system, method and device using zero-knowledge protocol |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140337239A1 (en) * | 2013-05-13 | 2014-11-13 | Pitney Bowes Inc. | Method and system for obtaining offers from sellers using privacy-preserving verifiable statements |
US9992028B2 (en) * | 2015-11-26 | 2018-06-05 | International Business Machines Corporation | System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger |
-
2019
- 2019-04-15 GB GB1905316.4A patent/GB2575896B/en active Active
-
2020
- 2020-04-14 WO PCT/EP2020/060465 patent/WO2020212349A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2547033A2 (en) * | 2011-07-08 | 2013-01-16 | Sap Ag | Public-key encrypted bloom filters with applications to private set intersection |
US20190034923A1 (en) * | 2017-07-31 | 2019-01-31 | Chronicled, Inc | Secure and confidential custodial transaction system, method and device using zero-knowledge protocol |
Also Published As
Publication number | Publication date |
---|---|
GB2575896A (en) | 2020-01-29 |
GB201905316D0 (en) | 2019-05-29 |
WO2020212349A1 (en) | 2020-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202104620SA (en) | Computer implemented system and method for storing data on a blockchain | |
SG10202110580RA (en) | Method and system for secure data record distribution using a blockchain | |
GB2586373B (en) | Transactional operations in multi-master distributed data management systems | |
GB201812433D0 (en) | Pipeline template configuration in a data processing system | |
GB201902309D0 (en) | Processing data in a network | |
EP3738029C0 (en) | Method and system for managing sub-tenants in a cloud computing environment | |
ZA202107292B (en) | Path planning method and system based on distributed parallel computing | |
EP4005168A4 (en) | System and method for visually managing computing devices in a data center | |
IL272980A (en) | Computer-based method and system to facilitate managing data exfiltration risk in a computer network environment | |
SG11202000414RA (en) | Delayed processing for electronic data messages in a distributed computer system | |
GB202009798D0 (en) | Methods and devices for validating data in a blockchain network | |
HK1244370A1 (en) | Systems and methods for processing packets in a computer network | |
GB2572135B (en) | Data transaction system and method | |
EP3420476A4 (en) | Method and system for contract management in a data marketplace | |
GB2555183B (en) | Method for secure data management in a computer network | |
ZA202003177B (en) | A system and method for implementing a computer network | |
SG11202104254UA (en) | Methods and systems for interactive data management | |
GB202216277D0 (en) | A computer system and a computer implemented method for processing gaming data | |
GB2575896B (en) | Methods and systems for validating data in a distributed computing network | |
GB201803432D0 (en) | Processing packets in a computer system | |
ZA201906934B (en) | A data protection system and method | |
SG10201912999VA (en) | Method and System for Transaction Validation in a Distributed Computing System | |
GB2575264B (en) | Method for data reduction in a computer network security system | |
GB201704710D0 (en) | A data management system and method | |
IL287807A (en) | Systems and methods for user verification based on actigraphy data |