MX2021009703A - Metodos y sistemas para el anclaje basado en token de un objeto fisico en un entorno de libro mayor distribuido. - Google Patents
Metodos y sistemas para el anclaje basado en token de un objeto fisico en un entorno de libro mayor distribuido.Info
- Publication number
- MX2021009703A MX2021009703A MX2021009703A MX2021009703A MX2021009703A MX 2021009703 A MX2021009703 A MX 2021009703A MX 2021009703 A MX2021009703 A MX 2021009703A MX 2021009703 A MX2021009703 A MX 2021009703A MX 2021009703 A MX2021009703 A MX 2021009703A
- Authority
- MX
- Mexico
- Prior art keywords
- physical object
- token
- identification data
- computer
- systems
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
- G06Q10/0833—Tracking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement or balancing against orders
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/02—Agriculture; Fishing; Mining
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
La invención se refiere a un método, sistema y programa informático implementado por computadora para la tokenización de un objeto físico. El método comprende generar o recibir datos de identificación de objetos basados en una inspección del objeto físico, los datos de identificación del objeto comprenden al menos un valor hash criptográfico como una representación virtual resistente a colisiones del objeto físico; y generar un token no certificado que se asigna al objeto físico y que representa los datos de identificación del objeto. La invención se refiere además a un método, sistema y programa informático implementado por computadora para certificar un token que incluye datos de identificación del objeto. Además, la invención se refiere a un método, sistema y programa informático de tokenización de un proceso implementado por computadora.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP19157030 | 2019-02-13 | ||
PCT/EP2020/053374 WO2020165111A1 (en) | 2019-02-13 | 2020-02-11 | Methods and systems for token-based anchoring of a physical object in a distributed ledger environment |
Publications (1)
Publication Number | Publication Date |
---|---|
MX2021009703A true MX2021009703A (es) | 2021-09-14 |
Family
ID=65493814
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2021009703A MX2021009703A (es) | 2019-02-13 | 2020-02-11 | Metodos y sistemas para el anclaje basado en token de un objeto fisico en un entorno de libro mayor distribuido. |
Country Status (12)
Country | Link |
---|---|
US (1) | US11283610B2 (es) |
EP (1) | EP3534288A3 (es) |
JP (1) | JP2022521488A (es) |
KR (1) | KR20210125538A (es) |
CN (1) | CN113412602A (es) |
AU (1) | AU2020221497A1 (es) |
CA (1) | CA3129906A1 (es) |
IL (1) | IL285471A (es) |
MX (1) | MX2021009703A (es) |
SG (1) | SG11202108698PA (es) |
TW (1) | TWI819191B (es) |
WO (1) | WO2020165111A1 (es) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11070379B2 (en) * | 2019-04-18 | 2021-07-20 | Advanced New Technologies Co., Ltd. | Signature verification for a blockchain ledger |
US10585882B1 (en) | 2019-09-23 | 2020-03-10 | Trace, LLC | Systems and methods for writing updates to and/or reading previously stored updates of assets implemented as smart contracts on a decentralized database |
US11954681B2 (en) * | 2019-09-30 | 2024-04-09 | Southeast University | Blockchain-enhanced open internet of things access architecture |
FR3101991B1 (fr) * | 2019-10-09 | 2022-08-05 | Casanova Pierre Francois | Système et méthode d'authentification et d'assurance d’objets |
CN110809035B (zh) * | 2019-10-25 | 2021-12-03 | 广州查正源电子科技有限公司 | 一种去中心化防伪数据生成和管理方法及系统 |
EP4087182A4 (en) * | 2020-01-23 | 2023-06-28 | Tokyo University of Science Foundation | Registration device, verification device, identification device, and individual identification system |
US10956591B1 (en) * | 2020-01-27 | 2021-03-23 | Capital One Services, Llc | High performance tokenization platform for sensitive data |
US11856109B2 (en) | 2020-02-06 | 2023-12-26 | International Business Machines Corporation | Entity certification management |
US11683185B2 (en) * | 2020-02-06 | 2023-06-20 | International Business Machines Corporation | Entity certification management |
US11972440B1 (en) * | 2020-06-05 | 2024-04-30 | Trace Labs Llc | Systems and methods for providing a decentralized anti-counterfeit solution for supply chain tracking using single-use codes |
US11527566B2 (en) | 2020-07-23 | 2022-12-13 | International Business Machines Corporation | Interpreting optical signals from tailored arrays of metasurfaces |
DE102022100411A1 (de) | 2022-01-10 | 2023-07-13 | Eto Gruppe Technologies Gmbh | Verifikationsverfahren und Verifikations-Computersystem mit einer NFT-Erstellungsvorrichtung und einer Verifikationsvorrichtung |
FR3133244A1 (fr) * | 2022-03-01 | 2023-09-08 | Inkan.Link | Certification de données multi-facteurs |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI20011312A (fi) * | 2001-06-20 | 2002-12-21 | Nokia Corp | Parannettu menetelmä ja järjestely sähköisen maksumenettelyn hoitamiseksi |
US8989387B2 (en) * | 2006-03-31 | 2015-03-24 | International Business Machines Corporation | Using identifier tags and authenticity certificates for detecting counterfeited or stolen brand objects |
US8528069B2 (en) * | 2010-09-30 | 2013-09-03 | Microsoft Corporation | Trustworthy device claims for enterprise applications |
WO2012122994A1 (en) * | 2011-03-11 | 2012-09-20 | Kreft Heinz | Off-line transfer of electronic tokens between peer-devices |
US20150278487A1 (en) * | 2014-03-28 | 2015-10-01 | Enceladus IP Holdings, LLP | Security scheme for authenticating digital entities and aggregate object origins |
GB201511964D0 (en) * | 2015-07-08 | 2015-08-19 | Barclays Bank Plc | Secure digital data operations |
EP3340212B1 (en) * | 2016-12-21 | 2019-11-13 | Merck Patent GmbH | Reader device for reading a composite marking comprising a physical unclonable function for anti-counterfeiting |
DK3340213T3 (da) | 2016-12-21 | 2020-06-08 | Merck Patent Gmbh | Puf-baseret kompositsikkerhedsmærkning til bekæmpelse af vareforfalskning |
JP7185648B2 (ja) | 2017-06-27 | 2022-12-07 | ジェイピーモルガン・チェース・バンク,ナショナル・アソシエーション | 分散型台帳ゲートウェイを使用するためのシステムおよび方法 |
WO2019028026A1 (en) * | 2017-07-31 | 2019-02-07 | Chronicled, Inc. | SYSTEM, METHOD AND DEVICE FOR SECURE AND CONFIDENTIAL DETENTION TRANSACTION USING NO KNOWLEDGE PROTOCOL |
US11115217B2 (en) * | 2018-11-21 | 2021-09-07 | Avaya Inc. | Systems and methods for detecting device location and usage |
-
2019
- 2019-05-21 EP EP19175609.7A patent/EP3534288A3/en active Pending
- 2019-06-13 US US16/440,148 patent/US11283610B2/en active Active
-
2020
- 2020-02-11 MX MX2021009703A patent/MX2021009703A/es unknown
- 2020-02-11 CA CA3129906A patent/CA3129906A1/en active Pending
- 2020-02-11 JP JP2021547463A patent/JP2022521488A/ja active Pending
- 2020-02-11 SG SG11202108698PA patent/SG11202108698PA/en unknown
- 2020-02-11 KR KR1020217028945A patent/KR20210125538A/ko unknown
- 2020-02-11 WO PCT/EP2020/053374 patent/WO2020165111A1/en active Application Filing
- 2020-02-11 CN CN202080013141.0A patent/CN113412602A/zh active Pending
- 2020-02-11 AU AU2020221497A patent/AU2020221497A1/en active Pending
- 2020-02-12 TW TW109104343A patent/TWI819191B/zh active
-
2021
- 2021-08-09 IL IL285471A patent/IL285471A/en unknown
Also Published As
Publication number | Publication date |
---|---|
KR20210125538A (ko) | 2021-10-18 |
US20200259653A1 (en) | 2020-08-13 |
JP2022521488A (ja) | 2022-04-08 |
IL285471A (en) | 2021-09-30 |
EP3534288A3 (en) | 2020-08-12 |
US11283610B2 (en) | 2022-03-22 |
CN113412602A (zh) | 2021-09-17 |
TWI819191B (zh) | 2023-10-21 |
SG11202108698PA (en) | 2021-09-29 |
AU2020221497A1 (en) | 2021-10-07 |
CA3129906A1 (en) | 2020-08-20 |
WO2020165111A1 (en) | 2020-08-20 |
EP3534288A2 (en) | 2019-09-04 |
TW202040458A (zh) | 2020-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX2021009703A (es) | Metodos y sistemas para el anclaje basado en token de un objeto fisico en un entorno de libro mayor distribuido. | |
CN108023896B (zh) | 区块同步方法及系统 | |
EP3667593A4 (en) | VIRTUAL TOKEN-BASED BILLING DEPLOYING SYSTEM, VIRTUAL TOKEN GENERATING DEVICE, VIRTUAL TOKEN-VERIFICATION SERVER, VIRTUAL TOKEN-BASED BILLING PROVISION PROCESSING AND VIRTUAL PROCESSING | |
MX2019011549A (es) | Metodo, aparato y sistema de consenso de cadena de bloque. | |
MX2018005593A (es) | Metodo y sistema de procesamiento de transaccion de cadena de bloques en red de procesamiento de transaccion. | |
MY190598A (en) | Blockchain data processing method and apparatus | |
NZ774635A (en) | Methods and systems for identity creation, verification and management | |
WO2016094840A3 (en) | System, method & computer readable medium for software protection via composable process-level virtual machines | |
MY181403A (en) | Systems and method for providing information for an on-demand service | |
NZ744540A (en) | Systems and methods for providing block chain-based multifactor personal identity verification | |
PH12016502211A1 (en) | Authentication code entry system and method | |
WO2019014523A8 (en) | Systems and methods for automated decentralized multilateral transaction processing | |
GB201209821D0 (en) | Animation processing | |
EP3057303A3 (en) | Information processing system, information processing apparatus, and information processing method | |
MY189491A (en) | Database data modification request processing method and apparatus | |
CN106547648A (zh) | 一种备份数据处理方法及装置 | |
WO2021118413A3 (en) | Data processing method | |
RS63908B1 (sr) | Računarski implementiran postupak, računarski program i sistem za obradu podataka | |
MX2014011332A (es) | Metodo, sistema y aparato para generacion de codigos de lote y fechas de vencimiento. | |
SG10201908176WA (en) | Systems and methods for obtaining and executing computer code specified by code orders in an electronic trading venue | |
EP4246531A4 (en) | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD AND COMPUTER PROGRAM | |
EP4216224A4 (en) | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD AND COMPUTER PROGRAM | |
EP4307196A4 (en) | PAYMENT SYSTEM, PAYMENT METHOD AND COMPUTER PROGRAM | |
GB2555031A (en) | Model tuning using boundary flux sector surrogates | |
EP3828785A3 (en) | Composite model generation program, composite model generation method, and information processing apparatus |