MX2019007687A - Sistemas y metodos para la verificacion de la autenticidad de informacion legible por computadora utilizando una cadena en bloques. - Google Patents
Sistemas y metodos para la verificacion de la autenticidad de informacion legible por computadora utilizando una cadena en bloques.Info
- Publication number
- MX2019007687A MX2019007687A MX2019007687A MX2019007687A MX2019007687A MX 2019007687 A MX2019007687 A MX 2019007687A MX 2019007687 A MX2019007687 A MX 2019007687A MX 2019007687 A MX2019007687 A MX 2019007687A MX 2019007687 A MX2019007687 A MX 2019007687A
- Authority
- MX
- Mexico
- Prior art keywords
- computer readable
- readable information
- user computing
- hashed
- blockchain
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2365—Ensuring data consistency and integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
Un método para asegurar que la información legible por computadora sea auténtica, que incluye: generar una clave pública asociada con la información legible por computadora, cifrar la información legible por computadora para obtener una información cifrada legible por computadora, encriptar la información legible por computadora con una clave privada para crear una firma digital, en donde la información legible por computadora y la firma digital se almacenan en un bloque de una cadena de bloques, autentificando el dispositivo de cómputo del usuario en respuesta a una solicitud del dispositivo de cómputo del usuario para descargar la información legible de la computadora, transmitiendo la clave pública y la firma digital a un dispositivo de cómputo de usuario autenticado, e instruyendo al dispositivo de cómputo autenticando del usuario que desencripte la firma digital utilizando la clave pública para obtener la información cifrada legible por computadora y descargar la información cifrada legible por computadora al sistema de cómputo autenticado de usuario para recuperar la información legible por computadora.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662438728P | 2016-12-23 | 2016-12-23 | |
PCT/US2017/066141 WO2018118591A1 (en) | 2016-12-23 | 2017-12-13 | Verifying authenticity of computer readable information using the blockchain |
Publications (1)
Publication Number | Publication Date |
---|---|
MX2019007687A true MX2019007687A (es) | 2019-10-15 |
Family
ID=62627896
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2019007687A MX2019007687A (es) | 2016-12-23 | 2017-12-13 | Sistemas y metodos para la verificacion de la autenticidad de informacion legible por computadora utilizando una cadena en bloques. |
Country Status (5)
Country | Link |
---|---|
US (1) | US10594495B2 (es) |
CA (1) | CA3045897A1 (es) |
GB (1) | GB2573666A (es) |
MX (1) | MX2019007687A (es) |
WO (1) | WO2018118591A1 (es) |
Families Citing this family (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180232731A1 (en) * | 2017-02-14 | 2018-08-16 | Digital Treasury Corporation | Supply chain recording method with traceable function by implementing blockchain technique |
WO2018201147A2 (en) * | 2017-04-28 | 2018-11-01 | Neuromesh Inc. | Methods, apparatus, and systems for controlling internet-connected devices having embedded systems with dedicated functions |
US11238164B2 (en) * | 2017-07-10 | 2022-02-01 | Burstiq, Inc. | Secure adaptive data storage platform |
US10268829B2 (en) | 2017-08-11 | 2019-04-23 | Dragonchain, Inc. | Security systems and methods based on cryptographic utility token inventory tenure |
US10135607B1 (en) | 2017-08-11 | 2018-11-20 | Dragonchain, Inc. | Distributed ledger interaction systems and methods |
US10659473B2 (en) * | 2017-11-09 | 2020-05-19 | Nokia Solutions And Networks Oy | Method and apparatus for blockchain powered integrity protection system |
US11138590B2 (en) * | 2017-12-11 | 2021-10-05 | Titan Seal, Inc. | Apparatus and method for embedding digital certifications within documents |
WO2019144042A2 (en) * | 2018-01-21 | 2019-07-25 | CipherTrace, Inc. | Distributed security mechanism for blockchains and distributed ledgers |
US11121872B2 (en) * | 2018-01-23 | 2021-09-14 | Zeronorth, Inc. | Trusted verification of cybersecurity remediation |
US11539748B2 (en) | 2018-01-23 | 2022-12-27 | Zeronorth, Inc. | Monitoring and reporting enterprise level cybersecurity remediation |
US11893638B2 (en) * | 2018-02-07 | 2024-02-06 | Verasity Limited S.R.L. | System and method for content stake via blockchain |
US11139977B2 (en) * | 2018-02-07 | 2021-10-05 | Verasity Limited | System and method for proof of view via blockchain |
US11438139B2 (en) * | 2018-02-07 | 2022-09-06 | Raouf Boutaba | Blockchain based secure naming and update verification |
US10956931B2 (en) * | 2018-02-07 | 2021-03-23 | Verasity Foundation Company Limited | System and method for proof of view via blockchain |
US20190251627A1 (en) * | 2018-02-11 | 2019-08-15 | Loopring Project Ltd | Methods and systems for digital asset transaction |
US10693662B2 (en) * | 2018-02-22 | 2020-06-23 | Idlogiq Inc. | Methods for secure serialization of supply chain product units |
US10778426B1 (en) * | 2018-03-29 | 2020-09-15 | EMC IP Holding Company LLC | Validation of sensor data using a blockchain |
JP2021523504A (ja) * | 2018-05-06 | 2021-09-02 | ストロング フォース ティエクス ポートフォリオ 2018,エルエルシーStrong Force Tx Portfolio 2018,Llc | エネルギー、コンピュータ、ストレージ、及びその他のリソースの、スポット市場及び先物市場における分散型元帳及びその他のトランザクションの実行を自動化する、機械及びシステムを改善するための方法及びシステム |
US11544782B2 (en) | 2018-05-06 | 2023-01-03 | Strong Force TX Portfolio 2018, LLC | System and method of a smart contract and distributed ledger platform with blockchain custody service |
US11669914B2 (en) | 2018-05-06 | 2023-06-06 | Strong Force TX Portfolio 2018, LLC | Adaptive intelligence and shared infrastructure lending transaction enablement platform responsive to crowd sourced information |
US11550299B2 (en) | 2020-02-03 | 2023-01-10 | Strong Force TX Portfolio 2018, LLC | Automated robotic process selection and configuration |
US11836718B2 (en) | 2018-05-31 | 2023-12-05 | CipherTrace, Inc. | Systems and methods for crypto currency automated transaction flow detection |
CN109064328B (zh) * | 2018-07-09 | 2022-04-15 | 夸克链科技(深圳)有限公司 | 一种区块链的共识方法 |
US20200027169A1 (en) * | 2018-07-21 | 2020-01-23 | Renato Valencia | Blockchain-enabled double entry recordkeeping system and method of implementing the same |
US10922309B2 (en) | 2018-11-19 | 2021-02-16 | Dragonchain, Inc. | Distributed ledger interaction system and methods |
US11546373B2 (en) | 2018-11-20 | 2023-01-03 | CipherTrace, Inc. | Cryptocurrency based malware and ransomware detection systems and methods |
US11212117B2 (en) * | 2018-12-03 | 2021-12-28 | T-Mobile Usa, Inc. | Tamper-resistant software development lifecycle provenance |
CN111294315B (zh) * | 2018-12-07 | 2022-08-23 | 中国移动通信集团贵州有限公司 | 基于区块链的安全认证方法、装置、设备及存储介质 |
US10992714B2 (en) | 2019-01-07 | 2021-04-27 | International Business Machines Corporation | Certifying authenticity via dynamic dimensional coordinate scanning and decentralized data storage |
CN109828832B (zh) * | 2019-01-30 | 2021-12-28 | 百度在线网络技术(北京)有限公司 | 基于区块链的数据流通方法、装置、设备和介质 |
CN109903135A (zh) * | 2019-02-27 | 2019-06-18 | 成都金晨数通科技有限公司 | 一种基于区块链的珠宝电子信息共享系统 |
CA3058239C (en) * | 2019-03-26 | 2021-01-05 | Alibaba Group Holding Limited | Field-programmable gate array based trusted execution environment for use in a blockchain network |
KR102030053B1 (ko) * | 2019-04-30 | 2019-10-10 | (주)그린아이티코리아 | 경량화된 보안 방식을 지원하는 주차 관제 시스템 및 방법 |
US11204982B2 (en) * | 2019-06-06 | 2021-12-21 | International Business Machines Corporation | Streamlining licensing entitlement |
CN112241513B (zh) * | 2019-07-19 | 2024-04-19 | 傲为有限公司 | 一种待认证数字资产处理系统 |
CN112380573B (zh) * | 2019-07-29 | 2024-05-14 | 创新先进技术有限公司 | 一种块链式账本中的数字签名方法、装置及设备 |
CN110490003B (zh) * | 2019-08-09 | 2022-04-22 | 杭州安存网络科技有限公司 | 用户可信数据生成方法、获取方法、装置及系统 |
US11982993B2 (en) | 2020-02-03 | 2024-05-14 | Strong Force TX Portfolio 2018, LLC | AI solution selection for an automated robotic process |
US11340875B2 (en) * | 2020-06-02 | 2022-05-24 | Sri International | Searchable storage of sequential application programs |
US11651096B2 (en) | 2020-08-24 | 2023-05-16 | Burstiq, Inc. | Systems and methods for accessing digital assets in a blockchain using global consent contracts |
US12101332B1 (en) * | 2020-10-09 | 2024-09-24 | Edjx, Inc. | Systems and methods for a federated tactical edge cloud |
EP4272369A1 (en) | 2020-12-29 | 2023-11-08 | Ciphertrace, Inc. | Systems and methods for correlating cryptographic addresses between blockchain networks |
US12026789B2 (en) | 2021-02-08 | 2024-07-02 | CipherTrace, Inc. | Systems and methods of forensic analysis of cryptocurrency transactions |
US12015602B2 (en) | 2021-08-16 | 2024-06-18 | Bank Of America Corporation | Information security system and method for secure data transmission among user profiles using a blockchain network |
CN113627910A (zh) * | 2021-09-03 | 2021-11-09 | 杭州复杂美科技有限公司 | 一种区块链匿名红包发送方法、设备及储存介质 |
CN113626533B (zh) * | 2021-10-11 | 2022-01-25 | 聊城中塑电子科技有限公司 | 一种紫外线功率检测方法、装置及电子设备 |
CN114357385A (zh) * | 2021-12-24 | 2022-04-15 | 北京鼎普科技股份有限公司 | 一种软件防护和授权方法、系统及装置 |
CN115297119B (zh) * | 2022-10-09 | 2023-02-03 | 江西信惠链科技有限公司 | 基于区块链和验证计算的联合征信方法及系统 |
US20240152638A1 (en) * | 2022-11-03 | 2024-05-09 | Avago Technologies International Sales Pte. Limited | Blockchain-enforced data access control |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8863241B2 (en) * | 2011-02-08 | 2014-10-14 | Michael Ratiner | System and method for managing usage rights of software applications |
US9331856B1 (en) | 2014-02-10 | 2016-05-03 | Symantec Corporation | Systems and methods for validating digital signatures |
US20160164884A1 (en) | 2014-12-05 | 2016-06-09 | Skuchain, Inc. | Cryptographic verification of provenance in a supply chain |
US9967333B2 (en) | 2015-03-02 | 2018-05-08 | Dell Products Lp | Deferred configuration or instruction execution using a secure distributed transaction ledger |
US20160283920A1 (en) * | 2015-03-28 | 2016-09-29 | Justin Fisher | Authentication and verification of digital data utilizing blockchain technology |
AU2016246428B2 (en) | 2015-04-05 | 2017-11-09 | Digital Asset (Switzerland) GmbH | Digital asset intermediary electronic settlement platform |
WO2016164496A1 (en) * | 2015-04-06 | 2016-10-13 | Bitmark, Inc. | System and method for decentralized title recordation and authentication |
US9397985B1 (en) * | 2015-04-14 | 2016-07-19 | Manifold Technology, Inc. | System and method for providing a cryptographic platform for exchanging information |
EP3292484B1 (en) * | 2015-05-05 | 2021-07-07 | Ping Identity Corporation | Identity management service using a block chain |
-
2017
- 2017-12-13 GB GB1908170.2A patent/GB2573666A/en not_active Withdrawn
- 2017-12-13 MX MX2019007687A patent/MX2019007687A/es unknown
- 2017-12-13 CA CA3045897A patent/CA3045897A1/en not_active Abandoned
- 2017-12-13 US US15/840,792 patent/US10594495B2/en active Active
- 2017-12-13 WO PCT/US2017/066141 patent/WO2018118591A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
CA3045897A1 (en) | 2018-06-28 |
WO2018118591A1 (en) | 2018-06-28 |
US10594495B2 (en) | 2020-03-17 |
GB2573666A (en) | 2019-11-13 |
US20180183606A1 (en) | 2018-06-28 |
GB201908170D0 (en) | 2019-07-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2573666A (en) | Verifying authenticity of computer readable information using the blockchain | |
GB2572088A8 (en) | Controlling access to a locked space using cryptographic keys stored on a blockchain | |
PH12019501715A1 (en) | Digital certificate management method and apparatus, and electronic device | |
EA201790385A1 (ru) | Способ цифровой подписи электронного файла и способ аутентификации | |
MX2022003019A (es) | Metodo y sistema para la provision y almacenamiento de claves criptograficas distribuidas mediante criptografia de curva eliptica. | |
EA201891822A1 (ru) | Безопасность персональных устройств с использованием криптографии на основе эллиптических кривых для разделения секрета | |
MX2021014176A (es) | Metodo y sistema para una variante de cadena de bloques utilizando firmas digitales. | |
TW201612787A (en) | Network authentication method for secure electronic transactions | |
PH12018502196A1 (en) | System and methods for validating and performing operations on homomorphically encrypted data | |
MX2021003965A (es) | Tecnologia de libro mayor distribuido para identidad digital encriptada. | |
MX2019012571A (es) | Sistemas y metodos para verificacion y autenticacion de dispositivos. | |
RU2018103181A (ru) | Конфиденциальные аутентификация и обеспечение | |
MX2016014461A (es) | Aprovisionamiento de licencias de gestion de derechos digitales (drm) en un dispositivo cliente que utiliza un servidor de actualizaciones. | |
JP2018528691A5 (es) | ||
GB2496354B (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
JP2016512675A5 (es) | ||
WO2016144257A3 (en) | Method and system for facilitating authentication | |
NZ714230A (en) | System and methods for encrypting data | |
JP2017511920A5 (es) | ||
TW200520506A (en) | Method for using trusted, hardware-based identity credentials in runtime package signature to secure mobile communications and high-value transaction execution | |
NZ701459A (en) | Systems and methods for secure processing with embedded cryptographic unit | |
MX2013004764A (es) | Metodos para procesar metadatos privados. | |
PH12018550176A1 (en) | Using hardware based secure isolated region to prevent piracy and cheating on electronic devices | |
JP2016510564A5 (es) | ||
GB201016672D0 (en) | Secure exchange/authentication of electronic documents |