GB2621627A - System and related methods for authentication and ownership tracing of a timepiece - Google Patents

System and related methods for authentication and ownership tracing of a timepiece Download PDF

Info

Publication number
GB2621627A
GB2621627A GB2212098.4A GB202212098A GB2621627A GB 2621627 A GB2621627 A GB 2621627A GB 202212098 A GB202212098 A GB 202212098A GB 2621627 A GB2621627 A GB 2621627A
Authority
GB
United Kingdom
Prior art keywords
timepiece
identifier
user device
ownership
blockchain network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
GB2212098.4A
Other versions
GB202212098D0 (en
Inventor
Saeed Sameer
Kayani Mudassar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB2212098.4A priority Critical patent/GB2621627A/en
Publication of GB202212098D0 publication Critical patent/GB202212098D0/en
Publication of GB2621627A publication Critical patent/GB2621627A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Signal Processing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Strategic Management (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The present disclosure provides a system and related methods for verifying the authenticity and chain of ownership of a timepiece 104. The system comprises a passive NFC tag 102 installed within a timepiece that is configured to encrypt an identifier in response to an activation signal from a user device. An NFC enabled user device 106 sends the activation signal 108, receives the encrypted identifier, and sends this to a blockchain network having a plurality of timepiece identifiers stored thereon. The blockchain network verifies the identifier as matching one of the stored identifiers and mints or references a Non-Fungible Token 110 for the timepiece. This Non-Fungible Token 110 can indisputably prove authenticity or ownership of the timepiece. Various operations of the system may be performed in a distributed manner, such as having certain operations of the blockchain network carried out automatically by smart contracts, and having certain operations of the user device controlled by smart dApps (decentralized applications) or Apps.

Description

Title: System and Related Methods for Authentication and Ownership Tracing of a Timepiece Field of Invention.
[1] The present invention relates generally to systems for improving authentication and traceability of timepieces. More specifically, the present invention relates to a blockchain-based verification system of an NEC tag installed in a time piece.
Background
[2] Timepieces, i.e. high value watches and the like, have always attracted high levels of theft and fraud. Proving the authenticity and proof of ownership of high value timepieces upon purchase is a problem that many users wish to solve, and one that modern distributed technologies have provided a great number of additional tools for solving in recent years.
[3] One particularly relevant piece of technology in the arsenal of modern methods for verification is the Non-Fungible Token, or NET. NFTs are tokens used to represent ownership of unique items. They allow the tokenization of an asset on the blockchain. They can only have one official owner at a time and are secured by a distributed ledger technology database -no one can modify the record of ownership or copy/paste a new NET into existence.
[4] It is within this context that the present invention is provided. Summary [5] The present disclosure provides a system and related methods for verifying the authenticity and chain of ownership of a timepiece. The system comprises a passive NEC tag installed within a timepiece that is configured to encrypt an identifier in response to an activation signal from a user device. An NEC enabled user device sends the activation signal, receives the encrypted identifier, and sends this to a blockchain network having a plurality of timepiece identifiers stored thereon. The blockchain network verifies the identifier as matching one of the stored identifiers and mints or references a Non-Fungible Token for the timepiece. This Non-Fungible Token can indisputably prove authenticity or ownership of timepiece. Various operations of the system can be performed in a distributed manner, such as having certain operations of the blockchain network carried out automatically by smart contracts, and having certain operations of the user device controlled by dApps (decentralized applications) or Apps.
[6] Thus, according to one aspect of the present disclosure there is provided a system for authenticating and tracing a timepiece, the system comprising: a passive NFC tag installed within a timepiece, the NEC tag being configured, in response to an activation signal, to encrypt an identifier with a cryptographic key and transmit the encrypted identifier to an NFC-enabled user device.
[7] The system further comprises one or more distributed nodes comprising a blockchain network having stored thereon identifiers for a plurality of timepieces, the one or more nodes being configured to verify authentication queries comprising matching identifiers for any one of the plurality of timepieces and further configured to mint and/or reference a corresponding Non-Fungible Tokento demonstrate the verification of the timepiece; a user device comprising a wireless communications module, an NEC module, one or more processors, and a display, the one or more processors being configured to: receive the encrypted identifier from the NEC tag; decrypt the identifier using a corresponding private key; send a verification request to the nodes comprising the blockchain network; for unsuccessful verification requests, display a failure message; for successful requests, receive and store a blockchain address of a Non-Fungible Token representing authentication or proof of ownership of the timepiece and display a verification of authenticity or ownership for the timepiece.
[8] In some embodiments, the cryptographic key is a private key counterpart of a cryptographic pair.
[9] In some embodiments, the identifier is a serial number of the timepiece in which the NFC tag is installed.
[10] In some embodiments, the identifier is a locally generated random number created by the NEC tag.
[11] In some embodiments, one or more of the operations of the distributed nodes are implemented by a smart contract executed on the blockchain network.
[12] In some embodiments, one or more of the operations of the user device are implemented by a distributed application software installed on the user device.
[13] In some embodiments, the verification request comprises identifying information for an owner of the user device and timepiece, and wherein the Non-Fungible Token comprises the identifying information.
Brief Description of the Drawings
[14] Various embodiments of the invention are disclosed in the following detailed description and accompanying drawings.
[15] FIG.1 illustrates an overall process flow for the concept, with an NFC tag being installed within a timepiece, an activation signal being emitted from a user device, and an encrypted identifier of the tag being verified by a blockchain causing an NFT to be requested or issued.
[16] FIG.2 illustrates an example timepiece from various angles with the NFC tag installed therein.
[17] FIG.3 illustrates the communication between an example NEC enabled user device and a blockchain network requesting or issuing an NET in response to a verification request.
[18] Common reference numerals are used throughout the figures and the detailed description to indicate like elements. One skilled in the art will readily recognize that the above figures are examples and that other architectures, modes of operation, orders of operation, and elements/functions can be provided and implemented without departing from the characteristics and features of the invention, as set forth in the claims.
Detailed Description and Preferred Embodiment
[19] The following is a detailed description of exemplary embodiments to illustrate the principles of the invention. The embodiments are provided to illustrate aspects of the invention, but the invention is not limited to any embodiment. The scope of the invention encompasses numerous alternatives, modifications and equivalent; it is limited only by the claims.
[20] Numerous specific details are set forth in the following description in order to provide a thorough understanding of the invention. However, the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured.
[21] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any combinations of one or more of the associated listed items. As used herein, the singular forms "a," "an," and "the" are intended to include the plural forms as well as the singular forms, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, elements, components, and/or groups thereof.
[22] The present disclosure relates to verification methods as set out above for a timepiece 104 with a passive NFC tag 102 installed inside the timepiece interior 103. One or more of the operations and calculations described herein may be performed by a distributed infrastructure comprising one or more nodes managing a distributed ledger or blockchain capable of minting NFTs 110.
[23] The distributed infrastructure is configured to communicate with a set of NFC-enabled user devices 106 by various means over the network architecture, each device being capable of sending an NFC or RFID activation signal 108 to the passive tag 102 as described above. The user devices include devices configured to communicate with the distributed infrastructure via a communications tower. These devices may include but are not limited to a smartphone, a laptop, and a tablet computer with e-mail and web browser application software.
[24] Any one of the user devices may be operationally coupled to a wide area network (WAN) such as the Internet with a wireless connection. The wireless clients may be communicatively coupled to the WAN via a Wi-Fi (or Bluetooth) access point that is communicatively coupled to a modem, which is communicatively coupled to the WAN. The wireless clients may also be communicatively coupled to the WAN using a proprietary carrier network that includes communication tower.
[25] While a specific set of user devices are listed as examples of the architecture, the user devices may in fact be any suitable device. For example, user devices could include a mobile handset, mobile phone, wireless phone, portable cell phone, cellular phone, portable phone, a personal digital assistant (PDA), a tablet, a portable media device, a wearable computer, or any type of mobile terminal which is regularly carried by an end user and has all the elements necessary for operation in a wireless communication system. The wireless communications include, by way of example and not of limitation, CDMA, WCDMA, GSM, UMTS, or any other wireless communication system such as wireless local area network (WLAN), Wi-Fi or WiMAX.
[26] In some examples, each user device may be associated with or "logged in" to a user profile in order to operate within the disclosed system and method, and further configured to send requests, upload user data, and generally interact with the distributed infrastructure via a user interface displayed on the device.
[27] The operations described above for the app may be implemented by one or more servers or computers over a wireless network which the user device are communicating through. Indeed, it should be understood that the operations described herein may be carried out by any suitable processor architecture.
[28] In particular, the operations may be carried out by, but are not limited to, one or more computing environments used to implement the method such as a data center, a distributed computing environment, a dedicated hosting environment, and/or one or more other computing environments in which one or more assets used by the method re implemented; one or more computing systems or computing entities used to implement the method; one or more virtual assets used to implement the method; one or more supervisory or control systems, such as hypervisors, or other monitoring and management systems, used to monitor and control assets and/or components; one or more communications channels for sending and receiving data used to implement the method; one or more access control systems for limiting access to various components, such as firewalls and gateways; one or more traffic and/or routing systems used to direct, control, and/or buffer, data traffic to components, such as routers and switches; one or more communications endpoint proxy systems used to buffer, process, and/or direct data traffic, such as load balancers or buffers; one or more secure communication protocols and/or endpoints used to encrypt/decrypt data, such as Secure Sockets Layer (SSL) protocols, used to implement the method; one or more databases used to store data; one or more internal or external services used to implement the method; one or more backend systems, such as backend servers or other hardware used to process data and implement the method; one or more software systems used to implement the method; and/or any other assets/components in which the method is deployed, implemented, accessed, and run, e.g., operated, as discussed herein, and/or as known in the art at the time of filing, and/or as developed after the time of filing.
[29] As used herein, the terms "computing system", "computing device", and "computing entity", include, but are not limited to, a virtual asset; a server computing system; a workstation; a desktop computing system; a mobile computing system, including, but not limited to, smart phones, portable devices, and/or devices worn or carried by a user; a database system or storage cluster; a switching system; a router; any hardware system; any communications system; any form of proxy system; a gateway system; a firewall system; a load balancing system; or any device, subsystem, or mechanism that includes components that can execute all, or part, of any one of the processes and/or operations as described herein.
[30] As used herein, the terms computing system and computing entity, can denote, but are not limited to, systems made up of multiple: virtual assets; server computing systems; workstations; desktop computing systems; mobile computing systems; database systems or storage clusters; switching systems; routers; hardware systems; communications systems; proxy systems; gateway systems; firewall systems; load balancing systems; or any devices that can be used to perform the processes and/or operations as described herein.
[31] As used herein, the term "computing environment" includes, but is not limited to, a logical or physical grouping of connected or networked computing systems and/or virtual assets using the same infrastructure and systems such as, but not limited to, hardware systems, software systems, and networking/communications systems. Typically, computing environments are either known environments, e.g., "trusted" environments, or unknown, e.g., "untrusted" environments. Typically, trusted computing environments are those where the assets, infrastructure, communication and networking systems, and security systems associated with the computing systems and/or virtual assets making up the trusted computing environment, are either under the control of, or known to, a party.
[32] Unless specifically stated otherwise, as would be apparent from the above discussion, it is appreciated that throughout the above description, discussions utilizing terms such as, but not limited to, "activating", "accessing", "adding", "applying", "analyzing", "associating", "calculating", "capturing", "classifying", "comparing", "creating", "defining", "detecting", "determining"" "eliminating", "extracting", "forwarding", "generating", "identifying", "implementing", "obtaining", "processing", "providing", "receiving", "sending", "storing", "transferring", "transforming", "transmitting", "using", etc., refer to the action and process of a computing system or similar electronic device that manipulates and operates on data represented as physical (electronic) quantities within the computing system memories, resisters, caches or other information storage, transmission or display devices.
[33] Those of skill in the art will readily recognize that the algorithms and operations presented herein are not inherently related to any particular computing system, computer architecture, computer or industry standard, or any other specific apparatus. Various general purpose systems may also be used with programs in accordance with the teaching herein, or it may prove more convenient/efficient to construct more specialized apparatuses to perform the required operations described herein. The required structure for a variety of these systems will be apparent to those of skill in the art, along with equivalent variations. In addition, the present invention is not described with reference to any particular programming language and it is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any references to a specific language or languages are provided for illustrative purposes only and for enablement of the contemplated best mode of the invention at the time of filing.
[34] Unless otherwise defined, all terms (including technical terms) used herein have the same meaning as commonly understood by one having ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present disclosure and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
[35] The disclosed embodiments are illustrative, not restrictive. While specific configurations of the system for reviewing service provider experiences with clients have been described in a specific manner referring to the illustrated embodiments, it is understood that the present invention can be applied to a wide variety of solutions which fit within the scope and spirit of the claims. There are many alternative ways of implementing the invention.
[36] It is to be understood that the embodiments of the invention herein described are merely illustrative of the application of the principles of the invention. Reference herein to details of the illustrated embodiments is not intended to limit the scope of the claims, which themselves recite those features regarded as essential to the invention.

Claims (7)

  1. Claims What is claimed is: 1. A system for authenticating and tracing a timepiece, the system comprising: a passive NEC tag installed within a timepiece, the NFC tag being configured, in response to an activation signal, to encrypt an identifier with a cryptographic key and transmit the encrypted identifier to an NFC-enabled user device; and one or more distributed nodes comprising a blockchain network having stored thereon identifiers for a plurality of timepieces, the one or more nodes being configured to verify authentication queries comprising matching identifiers for any one of the plurality of timepieces and further configured to mint and/or reference a Non-Fungible Token to demonstrate the verification of the timepiece; and a user device comprising a wireless communications module, an NEC module, one or more processors, and a display, the one or more processors being configured to: receive the encrypted identifier from the NFC tag; decrypt the identifier using a corresponding private key; send a verification request to the nodes comprising the blockchain network; for unsuccessful verification requests, display a failure message; for successful requests, receive and store a blockchain address of a Non-Fungible Token representing authentication or proof of ownership of the timepiece and display a verification of authenticity or ownership for the timepiece.
  2. 2. A system according to claim 1, wherein the cryptographic key is a private key counterpart of a cryptographic pair.
  3. 3. A system according to claim 1, wherein the identifier is a serial number of the timepiece in which the NEC tag is installed.
  4. 4. A system according to claim 1, wherein the identifier is a locally generated random number created by the NFC tag.
  5. 5. A system according to claim 1, wherein one or more of the operations of the distributed nodes are implemented by a smart contract executed on the blockchain network.
  6. 6. A system according to claim 1, wherein one or more of the operations of the user device are implemented by a distributed application software installed on the user device.
  7. 7. A system according to claim 1, wherein the verification request comprises identifying information for an owner of the user device and timepiece, and wherein the Non-Fungible Token comprises the identifying information.
GB2212098.4A 2022-08-19 2022-08-19 System and related methods for authentication and ownership tracing of a timepiece Pending GB2621627A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB2212098.4A GB2621627A (en) 2022-08-19 2022-08-19 System and related methods for authentication and ownership tracing of a timepiece

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB2212098.4A GB2621627A (en) 2022-08-19 2022-08-19 System and related methods for authentication and ownership tracing of a timepiece

Publications (2)

Publication Number Publication Date
GB202212098D0 GB202212098D0 (en) 2022-10-05
GB2621627A true GB2621627A (en) 2024-02-21

Family

ID=83902170

Family Applications (1)

Application Number Title Priority Date Filing Date
GB2212098.4A Pending GB2621627A (en) 2022-08-19 2022-08-19 System and related methods for authentication and ownership tracing of a timepiece

Country Status (1)

Country Link
GB (1) GB2621627A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013190119A2 (en) * 2012-06-21 2013-12-27 St1 Aufzüge Gmbh Wristwatch device
US20210103938A1 (en) * 2019-10-03 2021-04-08 collectID AG Methods and systems for authenticating physical products via near field communication tags and recording authentication transactions on a blockchain
US11348152B1 (en) * 2022-01-27 2022-05-31 Offstage Holdings, Inc. Systems and methods for creating apparel that provides embedded verification of a transferrable non-fungible token
US11374756B1 (en) * 2021-07-12 2022-06-28 CreateMe Technologies LLC Tracking apparel items using distributed ledgers

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013190119A2 (en) * 2012-06-21 2013-12-27 St1 Aufzüge Gmbh Wristwatch device
US20210103938A1 (en) * 2019-10-03 2021-04-08 collectID AG Methods and systems for authenticating physical products via near field communication tags and recording authentication transactions on a blockchain
US11374756B1 (en) * 2021-07-12 2022-06-28 CreateMe Technologies LLC Tracking apparel items using distributed ledgers
US11348152B1 (en) * 2022-01-27 2022-05-31 Offstage Holdings, Inc. Systems and methods for creating apparel that provides embedded verification of a transferrable non-fungible token

Also Published As

Publication number Publication date
GB202212098D0 (en) 2022-10-05

Similar Documents

Publication Publication Date Title
US10887275B2 (en) Token based network service among IoT applications
Nguyen et al. Blockchain for 5G and beyond networks: A state of the art survey
US11503076B2 (en) System and method for encryption key management, federation and distribution
US11218473B2 (en) Systems and methods for identifying suspicious logins
US10425465B1 (en) Hybrid cloud API management
US11968265B2 (en) Systems and methods for asynchronous API-driven external application services for a blockchain
US20170374017A1 (en) Verification of server name in a proxy device for connection requests made using domain names
US11658963B2 (en) Cooperative communication validation
US10282461B2 (en) Structure-based entity analysis
JP2023542681A (en) Integrating device identity into blockchain permission frameworks
WO2019011187A1 (en) Method, device, and apparatus for loss reporting, removing loss report, and service management of electronic account
US20230163967A1 (en) Decentralized authorization of user access requests in a multi-tenant distributed service architecture
CN114553440B (en) Cross-data center identity authentication method and system based on block chain and attribute signature
US10116634B2 (en) Intercepting secure session upon receipt of untrusted certificate
Monir A Lightweight Attribute-Based Access Control System for IoT.
US8281123B2 (en) Apparatus and method for managing and protecting information during use of semi-trusted interfaces
CN104753774A (en) Distributed enterprise integrated access gateway
US8583913B1 (en) Securely determining internet connectivity between networks
Yan et al. Location-based services and privacy protection under mobile cloud computing
US12047353B2 (en) Verified anonymous persona for a distributed token
US20220278966A1 (en) Secure Virtual Personalized Network with Preconfigured Wallets
GB2621627A (en) System and related methods for authentication and ownership tracing of a timepiece
US20230032867A1 (en) Certificate revocation at datacenters
Dixit et al. Smart-contract enabled decentralized identity management framework for industry 4.0
Bargavi et al. Exploring the Integration of Blockchain in 6G Networks for Improved Security and Efficiency