PT3782058T - Motor de verificação de documento e entidade descentralizado - Google Patents
Motor de verificação de documento e entidade descentralizadoInfo
- Publication number
- PT3782058T PT3782058T PT197876600T PT19787660T PT3782058T PT 3782058 T PT3782058 T PT 3782058T PT 197876600 T PT197876600 T PT 197876600T PT 19787660 T PT19787660 T PT 19787660T PT 3782058 T PT3782058 T PT 3782058T
- Authority
- PT
- Portugal
- Prior art keywords
- verification engine
- entity verification
- decentralized document
- decentralized
- document
- Prior art date
Links
- 238000012795 verification Methods 0.000 title 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/128—Restricting unauthorised execution of programs involving web programs, i.e. using technology especially used in internet, generally interacting with a web browser, e.g. hypertext markup language [HTML], applets, java
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN201811015112 | 2018-04-20 | ||
IN201811036931 | 2018-09-29 | ||
IN201811047339 | 2018-12-14 | ||
IN201911008056 | 2019-03-01 |
Publications (1)
Publication Number | Publication Date |
---|---|
PT3782058T true PT3782058T (pt) | 2024-06-18 |
Family
ID=68239427
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PT197876600T PT3782058T (pt) | 2018-04-20 | 2019-04-19 | Motor de verificação de documento e entidade descentralizado |
Country Status (18)
Country | Link |
---|---|
US (2) | US11664995B2 (pt) |
EP (1) | EP3782058B1 (pt) |
JP (1) | JP7090800B2 (pt) |
KR (1) | KR102545407B1 (pt) |
CN (1) | CN112292682B (pt) |
AU (1) | AU2019256002B2 (pt) |
CA (1) | CA3097092C (pt) |
DK (1) | DK3782058T3 (pt) |
ES (1) | ES2981298T3 (pt) |
FI (1) | FI3782058T3 (pt) |
HR (1) | HRP20240814T1 (pt) |
LT (1) | LT3782058T (pt) |
PL (1) | PL3782058T3 (pt) |
PT (1) | PT3782058T (pt) |
RS (1) | RS65628B1 (pt) |
SI (1) | SI3782058T1 (pt) |
WO (1) | WO2019202563A1 (pt) |
ZA (1) | ZA202007220B (pt) |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220200973A1 (en) * | 2019-04-15 | 2022-06-23 | Bear System, LLC | Blockchain schema for secure data transmission |
JP6979099B2 (ja) * | 2020-03-17 | 2021-12-08 | 株式会社大和総研 | 電子認定証受渡システムおよびプログラム |
WO2021188472A1 (en) * | 2020-03-17 | 2021-09-23 | Hi Llc | Authentication systems and methods using a brain computer interface |
JP6979098B2 (ja) * | 2020-03-17 | 2021-12-08 | 株式会社大和総研 | 電子認定証受渡システムおよびプログラム |
US11368316B2 (en) | 2020-03-24 | 2022-06-21 | International Business Machines Corporation | Applying PKI (public key infrastructure) to power of attorney documents |
CN111814193B (zh) * | 2020-08-31 | 2021-03-19 | 支付宝(杭州)信息技术有限公司 | 一种信息共享方法、装置及设备 |
JP7520691B2 (ja) * | 2020-10-28 | 2024-07-23 | キヤノン株式会社 | 画像形成装置、制御方法、プログラム |
US11552943B2 (en) * | 2020-11-13 | 2023-01-10 | Cyberark Software Ltd. | Native remote access to target resources using secretless connections |
US20220329436A1 (en) * | 2021-04-13 | 2022-10-13 | International Business Machines Corporation | Token-based identity validation via blockchain |
US20220383295A1 (en) * | 2021-05-26 | 2022-12-01 | Disney Enterprises, Inc. | Collector Container for Non-Fungible Token (NFT) Assets |
JP2024522033A (ja) | 2021-05-28 | 2024-06-10 | ニコラス, エム. ベネツィア, | デジタルユーザーエンゲージメントを管理するスマートコントラクトシステムおよび方法 |
US11575508B2 (en) * | 2021-06-02 | 2023-02-07 | International Business Machines Corporation | Unified HSM and key management service |
KR20230020262A (ko) * | 2021-08-03 | 2023-02-10 | 삼성전자주식회사 | 디지털 컨텐츠에 대한 대체불가능 토큰을 관리하는 방법 및 장치 |
KR20230027566A (ko) * | 2021-08-19 | 2023-02-28 | 삼성전자주식회사 | 디지털 컨텐츠에 대한 대체불가능 토큰을 효율적으로 검증하는 방법 및 장치 |
CN113746638B (zh) * | 2021-09-03 | 2023-04-07 | 杭州复杂美科技有限公司 | Nft存储方法、nft还原方法、计算机设备和存储介质 |
GB2611072A (en) * | 2021-09-25 | 2023-03-29 | Ip Ledger Ltd | Method of protecting digital content |
KR102586155B1 (ko) * | 2021-09-28 | 2023-10-10 | 한신대학교 산학협력단 | 모바일ip 기반의 메타버스 연동형 확장현실 현장체험 nft 시스템 |
US20230118406A1 (en) * | 2021-10-19 | 2023-04-20 | Halliburton Energy Services, Inc. | Using non-fungible tokens stored on a digital ledger for controlling ownership of well log data |
US11956363B2 (en) | 2021-11-05 | 2024-04-09 | Nicholas M. VENEZIA | Systems and methods for hierarchical organization of data within a non-fungible tokens or chain-based decentralized systems |
CN114143007B (zh) * | 2021-11-08 | 2023-05-02 | 中国科学院合肥物质科学研究院 | 一种基于nft的实验数据共享方法 |
WO2023090979A1 (ko) * | 2021-11-22 | 2023-05-25 | 배지호 | Nft(non-fungible token), 실물로서의 원본 작품 및 그 원본과 연결된 디지털 작품 간 결합관계를 생성, 유지, 관리하는 시스템 및 그 방법 |
US11520806B1 (en) * | 2021-12-08 | 2022-12-06 | Dapper Labs, Inc. | Tokenized voice authenticated narrated video descriptions |
KR102431145B1 (ko) * | 2022-01-17 | 2022-08-10 | 주식회사 와이콘즈 | 듀얼 채널 기반의 nft를 이용한 객체의 인증 관리를 위한 서비스 제공 방법 및 장치 |
KR102529551B1 (ko) * | 2022-02-10 | 2023-05-09 | 주식회사 아르스루퍼 | 위치 기반 구역 제어 서비스 장치 |
US12047515B2 (en) | 2022-03-12 | 2024-07-23 | TapText llc | System and methods for secure interactions and digital petition management |
KR102477616B1 (ko) * | 2022-03-14 | 2022-12-13 | 장미래 | 블록체인 기반 전자문서 관리 서비스 제공 장치, 방법 및 프로그램 |
CN114900354B (zh) * | 2022-05-05 | 2023-08-29 | 国网山东省电力公司德州供电公司 | 一种面向能源数据的分布式身份认证和管理方法及系统 |
US20230403144A1 (en) * | 2022-05-27 | 2023-12-14 | Keychainx Ag | Non-fungible token (nft) generation for secure applications |
US20240039722A1 (en) * | 2022-07-29 | 2024-02-01 | Unstoppable Domains, Inc. | Dynamic utilization of a non-fungible token (nft) as a user identifier based on context |
US20240070305A1 (en) * | 2022-08-24 | 2024-02-29 | Fidelity Information Services, Llc | Systems and methods for blockchain-based non-fungible token (nft) authentication |
WO2024055035A1 (en) * | 2022-09-11 | 2024-03-14 | Bridge Metaverse Llc | Computer-based tools and techniques for securely sharing user personal data using non-fungible tokens |
GB2624931A (en) * | 2022-12-01 | 2024-06-05 | Nchain Licensing Ag | Computer implemented methods and systems |
Family Cites Families (109)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5790677A (en) * | 1995-06-29 | 1998-08-04 | Microsoft Corporation | System and method for secure electronic commerce transactions |
US6466571B1 (en) * | 1999-01-19 | 2002-10-15 | 3Com Corporation | Radius-based mobile internet protocol (IP) address-to-mobile identification number mapping for wireless communication |
US8060448B2 (en) * | 2001-05-30 | 2011-11-15 | Jones Thomas C | Late binding tokens |
JP3776829B2 (ja) | 2002-05-10 | 2006-05-17 | Necフィールディング株式会社 | 携帯端末を利用した身分証明システム |
US20040003248A1 (en) * | 2002-06-26 | 2004-01-01 | Microsoft Corporation | Protection of web pages using digital signatures |
US7512975B2 (en) * | 2002-08-16 | 2009-03-31 | Intel Corporation | Hardware-assisted credential validation |
US7581107B2 (en) * | 2004-05-28 | 2009-08-25 | International Business Machines Corporation | Anonymity revocation |
US20150012339A1 (en) * | 2004-06-01 | 2015-01-08 | Daniel W. Onischuk | Computerized voting system |
JP4951518B2 (ja) * | 2004-11-12 | 2012-06-13 | コンテントガード ホールディングズ インコーポレイテッド | 権利表現の発行が許可されていることを確認するための方法、システム、および装置 |
DE102005033195A1 (de) * | 2005-07-13 | 2007-01-25 | Authentidate International Ag | Verfahren zur Zustellung und Archivierung von digitalen Dokumenten |
US20070192601A1 (en) * | 2005-08-03 | 2007-08-16 | Spain John D | System and method for user identification and authentication |
US20070039050A1 (en) * | 2005-08-15 | 2007-02-15 | Vladimir Aksenov | Web-based data collection using data collection devices |
JP4008468B2 (ja) | 2005-11-18 | 2007-11-14 | 株式会社シー・エス・イー | 商品購入連動型身分証明システム |
US20070260702A1 (en) * | 2006-05-03 | 2007-11-08 | University Of Washington | Web browser architecture for virtual machine access |
US8327142B2 (en) * | 2006-09-27 | 2012-12-04 | Secureauth Corporation | System and method for facilitating secure online transactions |
US20080137856A1 (en) * | 2006-12-06 | 2008-06-12 | Electronics & Telecommunications Research Institute | Method for generating indirect trust binding between peers in peer-to-peer network |
EP2279602B1 (en) * | 2008-05-19 | 2013-07-31 | Citrix Systems, Inc. | Systems and methods for remoting multimedia plugin calls |
US9166975B2 (en) * | 2012-02-16 | 2015-10-20 | Inbay Technologies Inc. | System and method for secure remote access to a service on a server computer |
JP5531485B2 (ja) * | 2009-07-29 | 2014-06-25 | ソニー株式会社 | 情報処理装置、情報提供サーバ、プログラム、通信システム及びログイン情報提供サーバ |
US8555054B2 (en) * | 2009-10-12 | 2013-10-08 | Palo Alto Research Center Incorporated | Apparatus and methods for protecting network resources |
US9104517B2 (en) * | 2010-01-27 | 2015-08-11 | Code Systems Corporation | System for downloading and executing a virtual application |
KR20120120955A (ko) * | 2010-02-09 | 2012-11-02 | 인터디지탈 패튼 홀딩스, 인크 | 신뢰적인 연합 아이덴티티를 위한 방법 및 장치 |
EP2545676B1 (en) * | 2010-03-08 | 2018-12-05 | Gemalto SA | System and method for using a portable security device to cryptographically sign a document in response to signature requests from a relying party to a digital signature service |
US20110239291A1 (en) * | 2010-03-26 | 2011-09-29 | Barracuda Networks, Inc. | Detecting and Thwarting Browser-Based Network Intrusion Attacks For Intellectual Property Misappropriation System and Method |
US8881227B2 (en) * | 2010-03-30 | 2014-11-04 | Authentic8, Inc. | Secure web container for a secure online user environment |
WO2011126911A1 (en) * | 2010-03-30 | 2011-10-13 | Authentic8, Inc | Disposable browsers and authentication techniques for a secure online user environment |
US8527777B2 (en) * | 2010-07-30 | 2013-09-03 | International Business Machines Corporation | Cryptographic proofs in data processing systems |
GB2505601B (en) | 2011-06-10 | 2019-01-09 | Securekey Tech Inc | Credential authentication methods and systems |
US9094385B2 (en) * | 2011-08-05 | 2015-07-28 | Battelle Memorial Institute | Intelligent sensor and controller framework for the power grid |
US8701174B1 (en) * | 2011-09-27 | 2014-04-15 | Emc Corporation | Controlling access to a protected resource using a virtual desktop and ongoing authentication |
US10296558B1 (en) * | 2012-02-27 | 2019-05-21 | Amazon Technologies, Inc. | Remote generation of composite content pages |
US9591484B2 (en) * | 2012-04-20 | 2017-03-07 | T-Mobile Usa, Inc. | Secure environment for subscriber device |
US8959629B2 (en) * | 2012-07-12 | 2015-02-17 | Sap Se | Preserving web document integrity through web template learning |
US8874916B2 (en) * | 2012-09-28 | 2014-10-28 | Intel Corporation | Introduction of discrete roots of trust |
GB2508235A (en) * | 2012-11-27 | 2014-05-28 | Ibm | Software asset management using browser plug-in |
WO2014145417A1 (en) * | 2013-03-15 | 2014-09-18 | MARKUS, Isidoro | Method and apparatus for secure interaction with a computer service provider |
WO2014151061A2 (en) * | 2013-03-15 | 2014-09-25 | Authentic8, Inc. | Secure web container for a secure online user environment |
US10270748B2 (en) * | 2013-03-22 | 2019-04-23 | Nok Nok Labs, Inc. | Advanced authentication techniques and applications |
US8935746B2 (en) * | 2013-04-22 | 2015-01-13 | Oracle International Corporation | System with a trusted execution environment component executed on a secure element |
WO2015026336A1 (en) * | 2013-08-21 | 2015-02-26 | Intel Corporation | Processing data privately in the cloud |
US9036820B2 (en) * | 2013-09-11 | 2015-05-19 | At&T Intellectual Property I, Lp | System and methods for UICC-based secure communication |
US9646150B2 (en) * | 2013-10-01 | 2017-05-09 | Kalman Csaba Toth | Electronic identity and credentialing system |
US20150180869A1 (en) * | 2013-12-23 | 2015-06-25 | Samsung Electronics Company, Ltd. | Cloud-based scalable authentication for electronic devices |
US9918226B2 (en) * | 2013-12-30 | 2018-03-13 | Apple Inc. | Spoofing protection for secure-element identifiers |
US10050787B1 (en) * | 2014-03-25 | 2018-08-14 | Amazon Technologies, Inc. | Authentication objects with attestation |
US20170109751A1 (en) * | 2014-05-02 | 2017-04-20 | Nok Nok Labs, Inc. | System and method for carrying strong authentication events over different channels |
US9577999B1 (en) * | 2014-05-02 | 2017-02-21 | Nok Nok Labs, Inc. | Enhanced security for registration of authentication devices |
US9652631B2 (en) * | 2014-05-05 | 2017-05-16 | Microsoft Technology Licensing, Llc | Secure transport of encrypted virtual machines with continuous owner access |
US9813421B2 (en) * | 2014-05-20 | 2017-11-07 | Box, Inc. | Systems and methods for secure resource access and network communication |
CN105450406B (zh) * | 2014-07-25 | 2018-10-02 | 华为技术有限公司 | 数据处理的方法和装置 |
US9455979B2 (en) * | 2014-07-31 | 2016-09-27 | Nok Nok Labs, Inc. | System and method for establishing trust using secure transmission protocols |
US9984255B2 (en) * | 2014-09-30 | 2018-05-29 | Samsung Electronics Co., Ltd. | Methods and apparatus to enable runtime checksum verification of block device images |
KR102036758B1 (ko) * | 2014-09-30 | 2019-10-28 | 사이트릭스 시스템스, 인크. | 빠른 스마트 카드 로그온 및 연합된 풀 도메인 로그온 |
US9461994B2 (en) * | 2014-11-26 | 2016-10-04 | Intel Corporation | Trusted computing base evidence binding for a migratable virtual machine |
KR101959492B1 (ko) | 2015-03-22 | 2019-03-18 | 애플 인크. | 모바일 디바이스에서의 사용자 인증 및 인간 의도 검증을 위한 방법 및 장치 |
US20160283920A1 (en) * | 2015-03-28 | 2016-09-29 | Justin Fisher | Authentication and verification of digital data utilizing blockchain technology |
US9697359B2 (en) * | 2015-04-15 | 2017-07-04 | Qualcomm Incorporated | Secure software authentication and verification |
WO2016189488A2 (en) | 2015-05-27 | 2016-12-01 | Vishal Gupta | Universal original document validation platform |
US10182040B2 (en) * | 2015-06-10 | 2019-01-15 | Massachusetts Institute Of Technology | Systems and methods for single device authentication |
US10333903B1 (en) * | 2015-06-16 | 2019-06-25 | Amazon Technologies, Inc. | Provisioning network keys to devices to allow them to provide their identity |
US9716710B2 (en) * | 2015-06-26 | 2017-07-25 | Intel Corporation | Technologies for virtualized access to security services provided by a converged manageability and security engine |
US10187357B2 (en) * | 2015-07-05 | 2019-01-22 | M2MD Technologies, Inc. | Method and system for internetwork communication with machine devices |
US9300678B1 (en) * | 2015-08-03 | 2016-03-29 | Truepic Llc | Systems and methods for authenticating photographic image data |
US10387669B1 (en) * | 2015-09-17 | 2019-08-20 | Nextlabs, Inc. | Protecting documents with centralized and discretionary policies |
CN108701276B (zh) * | 2015-10-14 | 2022-04-12 | 剑桥区块链有限责任公司 | 用于管理数字身份的系统和方法 |
US10164963B2 (en) * | 2015-10-23 | 2018-12-25 | Oracle International Corporation | Enforcing server authentication based on a hardware token |
FI20155763A (fi) * | 2015-10-26 | 2017-04-27 | Online Solutions Oy | Menetelmä ja järjestelmä sertifikaatin aitouden varmistamiseksi ssl-protokollaa käyttäen salatussa internet-yhteydessä verkkosivuun |
NL1041549B1 (en) * | 2015-10-28 | 2017-05-24 | Quiver B V | A method, system, server, client and application for sharing digital content between communication devices within an internet network. |
US10057376B2 (en) * | 2015-10-30 | 2018-08-21 | Dell Products L.P. | Remote desktop protocol client with virtual channel support implemented in a standards-based web browser |
US10298396B1 (en) * | 2015-11-10 | 2019-05-21 | Wells Fargo Bank, N.A. | Identity management service via virtual passport |
US20170147808A1 (en) * | 2015-11-19 | 2017-05-25 | International Business Machines Corporation | Tokens for multi-tenant transaction database identity, attribute and reputation management |
US10009185B2 (en) * | 2015-12-22 | 2018-06-26 | Intel Corporation | Chain of trust identification system and method |
US9855785B1 (en) * | 2016-04-04 | 2018-01-02 | Uipco, Llc | Digitally encoded seal for document verification |
US10362058B2 (en) * | 2016-05-13 | 2019-07-23 | Vmware, Inc | Secure and scalable data transfer using a hybrid blockchain-based approach |
US10225255B1 (en) * | 2016-05-27 | 2019-03-05 | Shape Security, Inc. | Count-based challenge-response credential pairs for client/server request validation |
US10469487B1 (en) * | 2016-05-31 | 2019-11-05 | Wells Fargo Bank, N.A. | Biometric electronic signature authenticated key exchange token |
US10796000B2 (en) | 2016-06-11 | 2020-10-06 | Intel Corporation | Blockchain system with nucleobase sequencing as proof of work |
US10700853B2 (en) * | 2016-07-12 | 2020-06-30 | International Business Machines Corporation | Token identity and attribute management |
EP3300331B1 (en) * | 2016-07-14 | 2019-11-20 | Huawei Technologies Co., Ltd. | Response method, apparatus and system in virtual network computing authentication, and proxy server |
AU2017100968A4 (en) * | 2016-07-18 | 2017-09-07 | Brontech Pty Ltd | System for issuance, verification and use of digital identities on a public or private ledger. |
US10637665B1 (en) * | 2016-07-29 | 2020-04-28 | Workday, Inc. | Blockchain-based digital identity management (DIM) system |
US10380359B2 (en) * | 2016-08-05 | 2019-08-13 | Sensoriant, Inc. | Software-based switch for providing products and/or services to users without compromising their privacy |
US11227675B2 (en) * | 2016-08-23 | 2022-01-18 | BBM Health LLC | Blockchain-based mechanisms for secure health information resource exchange |
US10528765B2 (en) * | 2016-09-16 | 2020-01-07 | Intel Corporation | Technologies for secure boot provisioning and management of field-programmable gate array images |
US10581847B1 (en) * | 2016-09-27 | 2020-03-03 | Amazon Technologies, Inc. | Blockchain-backed device and user provisioning |
US10614239B2 (en) * | 2016-09-30 | 2020-04-07 | Amazon Technologies, Inc. | Immutable cryptographically secured ledger-backed databases |
US10437985B2 (en) * | 2016-10-01 | 2019-10-08 | Intel Corporation | Using a second device to enroll a secure application enclave |
JP6825296B2 (ja) * | 2016-10-11 | 2021-02-03 | 富士通株式会社 | エッジサーバ,及びその暗号化通信制御方法 |
KR102604046B1 (ko) * | 2016-11-28 | 2023-11-23 | 삼성전자주식회사 | 전자 기기의 프로그램 관리 방법 및 장치 |
US10824703B1 (en) * | 2017-02-01 | 2020-11-03 | United Services Automobile Association (Usaa) | Authentication based on motion and biometric data |
WO2018164955A1 (en) * | 2017-03-06 | 2018-09-13 | Rivetz Corp. | Device enrollment protocol |
CN110945549A (zh) * | 2017-03-15 | 2020-03-31 | 努Id公司 | 用于对用于跨机构数字认证的用户拥有的凭证的通用存储和访问的方法和系统 |
KR102414732B1 (ko) * | 2017-04-05 | 2022-06-28 | 삼성에스디에스 주식회사 | 블록체인 기반 디지털 아이덴티티 관리 방법 |
US10419209B1 (en) * | 2017-04-26 | 2019-09-17 | Wells Fargo Bank, N.A. | Parallel assurance of blockchain signatures |
CN107231346A (zh) * | 2017-05-03 | 2017-10-03 | 北京海顿中科技术有限公司 | 一种云平台身份识别的方法 |
US10505917B2 (en) * | 2017-06-05 | 2019-12-10 | Amazon Technologies, Inc. | Secure device-to-device process for granting access to a physical space |
EP3413507B1 (en) * | 2017-06-09 | 2022-05-04 | Nokia Technologies Oy | Electronic documents certification |
US10938560B2 (en) * | 2017-06-21 | 2021-03-02 | Microsoft Technology Licensing, Llc | Authorization key escrow |
GB201711788D0 (en) | 2017-07-21 | 2017-09-06 | Oraclize Ltd | Apparatus and method for verificability/auditability of correct process execution on electronic platforms |
US10594487B2 (en) * | 2017-07-27 | 2020-03-17 | International Business Machines Corporation | Password management and verification with a blockchain |
WO2019032113A1 (en) * | 2017-08-10 | 2019-02-14 | Visa International Service Association | BIOMETRIC VERIFICATION METHOD USING A CERTIFICATION TOKEN |
US10681033B2 (en) * | 2017-10-16 | 2020-06-09 | Microsoft Technology Licensing, Llc | Selecting and securing proof delgates for cryptographic functions |
US10601590B1 (en) * | 2017-11-09 | 2020-03-24 | Amazon Technologies, Inc. | Secure secrets in hardware security module for use by protected function in trusted execution environment |
US10666446B2 (en) * | 2017-11-15 | 2020-05-26 | Xage Security, Inc. | Decentralized enrollment and revocation of devices |
US10903996B2 (en) * | 2018-01-22 | 2021-01-26 | Microsoft Technology Licensing, Llc | Persona selection using trust scoring |
US11411933B2 (en) * | 2018-02-23 | 2022-08-09 | Microsoft Technology Licensing, Llc | Trusted cyber physical system |
US11531783B2 (en) * | 2018-03-27 | 2022-12-20 | Workday, Inc. | Digital credentials for step-up authentication |
US11698979B2 (en) * | 2018-03-27 | 2023-07-11 | Workday, Inc. | Digital credentials for access to sensitive data |
US10958642B2 (en) * | 2018-04-05 | 2021-03-23 | The Toronto-Dominion Bank | Dynamic biometric authentication based on distributed ledger data |
-
2019
- 2019-04-19 FI FIEP19787660.0T patent/FI3782058T3/fi active
- 2019-04-19 PL PL19787660.0T patent/PL3782058T3/pl unknown
- 2019-04-19 WO PCT/IB2019/053263 patent/WO2019202563A1/en active Application Filing
- 2019-04-19 DK DK19787660.0T patent/DK3782058T3/da active
- 2019-04-19 JP JP2021506775A patent/JP7090800B2/ja active Active
- 2019-04-19 SI SI201930771T patent/SI3782058T1/sl unknown
- 2019-04-19 US US17/048,872 patent/US11664995B2/en active Active
- 2019-04-19 RS RS20240692A patent/RS65628B1/sr unknown
- 2019-04-19 KR KR1020207033232A patent/KR102545407B1/ko active IP Right Grant
- 2019-04-19 LT LTEPPCT/IB2019/053263T patent/LT3782058T/lt unknown
- 2019-04-19 CN CN201980041759.5A patent/CN112292682B/zh active Active
- 2019-04-19 ES ES19787660T patent/ES2981298T3/es active Active
- 2019-04-19 PT PT197876600T patent/PT3782058T/pt unknown
- 2019-04-19 AU AU2019256002A patent/AU2019256002B2/en active Active
- 2019-04-19 CA CA3097092A patent/CA3097092C/en active Active
- 2019-04-19 EP EP19787660.0A patent/EP3782058B1/en active Active
- 2019-04-19 HR HRP20240814TT patent/HRP20240814T1/hr unknown
-
2020
- 2020-11-19 ZA ZA2020/07220A patent/ZA202007220B/en unknown
-
2021
- 2021-05-13 US US17/320,050 patent/US11128468B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP3782058B1 (en) | 2024-03-20 |
JP2021522631A (ja) | 2021-08-30 |
HRP20240814T1 (hr) | 2024-09-27 |
EP3782058A1 (en) | 2021-02-24 |
ES2981298T3 (es) | 2024-10-08 |
PL3782058T3 (pl) | 2024-07-29 |
AU2019256002B2 (en) | 2023-08-17 |
SI3782058T1 (sl) | 2024-08-30 |
US20210266169A1 (en) | 2021-08-26 |
DK3782058T3 (da) | 2024-06-24 |
KR102545407B1 (ko) | 2023-06-20 |
CN112292682B (zh) | 2024-09-20 |
WO2019202563A1 (en) | 2019-10-24 |
KR20210003181A (ko) | 2021-01-11 |
US11128468B2 (en) | 2021-09-21 |
CN112292682A (zh) | 2021-01-29 |
FI3782058T3 (fi) | 2024-06-10 |
ZA202007220B (en) | 2021-08-25 |
AU2019256002A1 (en) | 2020-12-03 |
CA3097092C (en) | 2024-02-13 |
US20210243027A1 (en) | 2021-08-05 |
RS65628B1 (sr) | 2024-07-31 |
US11664995B2 (en) | 2023-05-30 |
CA3097092A1 (en) | 2019-10-24 |
LT3782058T (lt) | 2024-07-10 |
JP7090800B2 (ja) | 2022-06-24 |
EP3782058A4 (en) | 2021-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ZA202007220B (en) | Decentralized document and entity verification engine | |
IL275737A (en) | Variant antibodies against TIGIT | |
SG11201905878QA (en) | Identity document verification | |
PL3807794T3 (pl) | Weryfikacja wieku | |
GB201809887D0 (en) | Decentralised authentication | |
SG11202010334XA (en) | Efficient and secure authentication system | |
ZAA201801061S (en) | Engines | |
PL3781408T3 (pl) | Dająca się weryfikować za pomocą smartfona, oparta na luminoforze cecha zabezpieczająca i układ do weryfikacji | |
EP3782327A4 (en) | PEER IDENTIFICATION | |
GB201813390D0 (en) | Systems and methods for muulti-factor authentication | |
EP3751526C0 (en) | METHOD AND SYSTEM FOR AUTOMATIC VERIFICATION OF THE AUTHENTICITY OF DOCUMENTS | |
PT3634774T (pt) | Documento à prova de falsificação | |
GB201618387D0 (en) | Apparatuses and methods for signing a legal document | |
GB2579647B (en) | Engine system | |
EP3505729A4 (en) | VALVE BRIDGE AND MOTOR WITH THE VALVE BRIDGE | |
GB2562079B (en) | Continuous hash verification | |
ZA201904031B (en) | Identity document verification | |
ZA202000098B (en) | Combustion system and methods | |
EP3513846C0 (fr) | Systeme d'analyse et planche de glisse associee | |
GB201801149D0 (en) | Fuel system | |
GB201712111D0 (en) | Enhanced combustion engine | |
GB2574615B (en) | Combustion engine | |
GB2579195B (en) | Printing methods and systems | |
EP3901426C0 (en) | VALVE AND ENGINE CONTROL DEVICE | |
KR102285235B9 (ko) | 사회공익을 위한 마켓시스템 및 이의 동작방법 |