MX2021006820A - Uso de protocolos de cadena de bloques virtual para implementar un intercambio electronico justo. - Google Patents
Uso de protocolos de cadena de bloques virtual para implementar un intercambio electronico justo.Info
- Publication number
- MX2021006820A MX2021006820A MX2021006820A MX2021006820A MX2021006820A MX 2021006820 A MX2021006820 A MX 2021006820A MX 2021006820 A MX2021006820 A MX 2021006820A MX 2021006820 A MX2021006820 A MX 2021006820A MX 2021006820 A MX2021006820 A MX 2021006820A
- Authority
- MX
- Mexico
- Prior art keywords
- sender
- data payload
- recipient
- implement
- key
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0847—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Information Transfer Between Computers (AREA)
- Electrophonic Musical Instruments (AREA)
- Exchange Systems With Centralized Control (AREA)
- Structure Of Telephone Exchanges (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Los métodos para un protocolo de cadena de bloques virtual incluyen generar una clave pública y una clave privada para transmitir un mensaje desde un emisor a un destinatario. El emisor encripta el mensaje usando la clave pública y una clave criptográfica del destinatario para generar una primera carga útil de datos. El emisor firma una función de troceo de la primera carga útil de datos usando una clave criptográfica del emisor para generar una segunda carga útil de datos. El emisor transmite la primera carga útil de datos y la segunda carga útil de datos al destinatario. El emisor recibe una versión firmada de la segunda carga útil de datos firmada usando la clave criptográfica del destinatario. El emisor determina que se ha publicado la versión firmada de la segunda carga útil de datos en una cadena de bloques. El emisor publica la clave privada en la cadena de bloques.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201862777410P | 2018-12-10 | 2018-12-10 | |
US201862778482P | 2018-12-12 | 2018-12-12 | |
PCT/US2019/065524 WO2020123538A1 (en) | 2018-12-10 | 2019-12-10 | Using virtual blockchain protocols to implement a fair electronic exchange |
Publications (1)
Publication Number | Publication Date |
---|---|
MX2021006820A true MX2021006820A (es) | 2021-07-02 |
Family
ID=69724039
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2021006820A MX2021006820A (es) | 2018-12-10 | 2019-12-10 | Uso de protocolos de cadena de bloques virtual para implementar un intercambio electronico justo. |
Country Status (12)
Country | Link |
---|---|
US (2) | US11405186B2 (es) |
EP (1) | EP3895372A1 (es) |
JP (2) | JP7369772B2 (es) |
KR (1) | KR20210100660A (es) |
CN (1) | CN113475037A (es) |
AU (2) | AU2019396425B2 (es) |
BR (1) | BR112021011165A2 (es) |
CA (1) | CA3122537A1 (es) |
IL (2) | IL282861B2 (es) |
MX (1) | MX2021006820A (es) |
SG (1) | SG11202104773QA (es) |
WO (1) | WO2020123538A1 (es) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210342803A1 (en) * | 2020-02-17 | 2021-11-04 | Electronics And Telecommunications Research Institute | Method and apparatus for using a service through blockchain system |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6557134B2 (en) * | 1997-09-30 | 2003-04-29 | Glenayre Electronics, Inc. | ARQ method for wireless communication |
US7010683B2 (en) * | 2000-01-14 | 2006-03-07 | Howlett-Packard Development Company, L.P. | Public key validation service |
JP4614377B2 (ja) * | 2000-03-01 | 2011-01-19 | キヤノン株式会社 | 暗号化データ管理システム及び方法、記憶媒体 |
US7885412B2 (en) * | 2005-09-29 | 2011-02-08 | International Business Machines Corporation | Pre-generation of generic session keys for use in communicating within communications environments |
EP3257227B1 (en) * | 2015-02-13 | 2021-03-31 | Visa International Service Association | Confidential communication management |
US10402792B2 (en) * | 2015-08-13 | 2019-09-03 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
JP6452156B2 (ja) * | 2015-09-03 | 2019-01-16 | 日本電信電話株式会社 | 許諾情報管理システム、利用者端末、権利者端末、許諾情報管理方法、および、許諾情報管理プログラム |
CN116957790A (zh) * | 2016-02-23 | 2023-10-27 | 区块链控股有限公司 | 一种实现区块链上交换的通证化方法及系统 |
US10594702B2 (en) * | 2016-12-16 | 2020-03-17 | ULedger, Inc. | Electronic interaction authentication and verification, and related systems, devices, and methods |
CN106790253A (zh) * | 2017-01-25 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | 基于区块链的认证方法和装置 |
CN107040383B (zh) * | 2017-04-24 | 2018-01-30 | 中山大学 | 一种基于区块链的盲可验证加密签名方法 |
CN110546939B (zh) * | 2017-04-26 | 2022-07-26 | 维萨国际服务协会 | 用于记录表示多个交互的数据的系统和方法 |
GB201709760D0 (en) * | 2017-06-19 | 2017-08-02 | Nchain Holdings Ltd | Computer-Implemented system and method |
WO2018235845A1 (ja) * | 2017-06-21 | 2018-12-27 | 日本電信電話株式会社 | 鍵交換システムおよび鍵交換方法 |
GB201803815D0 (en) * | 2018-03-09 | 2018-04-25 | Nchain Holdings Ltd | Computer-implemented methods and systems |
JP6907144B2 (ja) * | 2018-03-27 | 2021-07-21 | Kddi株式会社 | アクセス制限システム、アクセス制限方法及びアクセス制限プログラム |
US11165756B2 (en) * | 2018-06-11 | 2021-11-02 | Fujitsu Limited | Delayed-access encryption for blockchain field |
CN108833438B (zh) * | 2018-07-18 | 2020-04-14 | 电子科技大学 | 一种基于区块链的工业物联网信息安全存储方法 |
JP6838260B2 (ja) * | 2018-11-14 | 2021-03-03 | カウリー株式会社 | ブロックチェーン制御方法 |
-
2019
- 2019-12-10 WO PCT/US2019/065524 patent/WO2020123538A1/en unknown
- 2019-12-10 US US16/709,719 patent/US11405186B2/en active Active
- 2019-12-10 CN CN201980081455.1A patent/CN113475037A/zh active Pending
- 2019-12-10 SG SG11202104773QA patent/SG11202104773QA/en unknown
- 2019-12-10 BR BR112021011165-4A patent/BR112021011165A2/pt unknown
- 2019-12-10 KR KR1020217020390A patent/KR20210100660A/ko active IP Right Grant
- 2019-12-10 JP JP2021533296A patent/JP7369772B2/ja active Active
- 2019-12-10 AU AU2019396425A patent/AU2019396425B2/en active Active
- 2019-12-10 MX MX2021006820A patent/MX2021006820A/es unknown
- 2019-12-10 IL IL282861A patent/IL282861B2/en unknown
- 2019-12-10 EP EP19856488.2A patent/EP3895372A1/en active Pending
- 2019-12-10 IL IL301597A patent/IL301597A/en unknown
- 2019-12-10 CA CA3122537A patent/CA3122537A1/en active Pending
-
2022
- 2022-06-24 US US17/808,922 patent/US20230125327A1/en active Pending
-
2023
- 2023-06-14 AU AU2023203711A patent/AU2023203711A1/en active Pending
- 2023-10-16 JP JP2023178230A patent/JP2024003002A/ja active Pending
Also Published As
Publication number | Publication date |
---|---|
IL282861B1 (en) | 2023-05-01 |
JP7369772B2 (ja) | 2023-10-26 |
SG11202104773QA (en) | 2021-06-29 |
IL301597A (en) | 2023-05-01 |
KR20210100660A (ko) | 2021-08-17 |
US20200186334A1 (en) | 2020-06-11 |
JP2024003002A (ja) | 2024-01-11 |
CA3122537A1 (en) | 2020-06-18 |
IL282861B2 (en) | 2023-09-01 |
AU2019396425B2 (en) | 2023-03-16 |
AU2019396425A2 (en) | 2021-06-03 |
CN113475037A (zh) | 2021-10-01 |
US20230125327A1 (en) | 2023-04-27 |
AU2019396425A1 (en) | 2021-05-20 |
AU2023203711A1 (en) | 2023-07-06 |
US11405186B2 (en) | 2022-08-02 |
EP3895372A1 (en) | 2021-10-20 |
BR112021011165A2 (pt) | 2021-08-31 |
JP2022512220A (ja) | 2022-02-02 |
WO2020123538A1 (en) | 2020-06-18 |
IL282861A (en) | 2021-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA3011012A1 (en) | Generating and sending encrypted payment data messages between computing devices to effect a transfer of funds | |
US10187361B2 (en) | Method for secure communication using asymmetric and symmetric encryption over insecure communications | |
US11095624B2 (en) | End-to-end encryption for personal communication nodes | |
WO2019204670A3 (en) | Decentralized protocol for maintaining cryptographically proven multi-step referral networks | |
MX2021014176A (es) | Metodo y sistema para una variante de cadena de bloques utilizando firmas digitales. | |
MX2019004655A (es) | Recuperacion de informacion de transaccion cifrada en transacciones confidenciales de cadena de bloques. | |
CN103795523B (zh) | 用于电子招投标的电子标书多层加解密系统及方法 | |
GB2603096A (en) | Forward secrecy in transport layer security using ephemral keys | |
SG11201903671WA (en) | Data transmission method, apparatus and system | |
MX2018003295A (es) | Método criptográfico, implementado por computadora para mejorar una red informatica, y terminal, sistema y medio legible por computadora para la misma. | |
JP2018525891A5 (es) | ||
WO2011016900A3 (en) | Hardware based cryptography | |
GB2505590A (en) | System and method for secure instant messaging | |
JP2006276093A5 (es) | ||
ATE523007T1 (de) | Verfahren und programmprodukt zur sicherstellung der vertraulichkeit einer email-adresse in einer email | |
CN106850522A (zh) | 一种即时通信中群组文件加密传输的实现方法 | |
CN109743171A (zh) | 一种解决多方数字签名、时间戳及加密的密钥串联方法 | |
CN106355104A (zh) | 一种基于沙箱技术实现原文隐私保护的电子签名方法 | |
CN104967513A (zh) | 具有多重安全属性的基于身份的多接收者环签密方法 | |
US20170279608A1 (en) | Method for using dynamic Public Key Infrastructure to send and receive encrypted messages between software applications | |
EP4274157A3 (en) | Communicating securely with devices in a distributed control system | |
EE201700036A (et) | Meetod, seade ja süsteem krüptograafilise liitsignatuuri genereerimiseks ning masinloetav andmekandja | |
CN107733646A (zh) | 加密方法、解密方法和加密解密系统 | |
Kallam | Diffie-hellman: key exchange and public key cryptosystems | |
CN104200154A (zh) | 一种基于标识的安装包签名方法及其装置 |