SG10201910373PA - Cryptographic datashare control for blockchain - Google Patents

Cryptographic datashare control for blockchain

Info

Publication number
SG10201910373PA
SG10201910373PA SG10201910373PA SG10201910373PA SG10201910373PA SG 10201910373P A SG10201910373P A SG 10201910373PA SG 10201910373P A SG10201910373P A SG 10201910373PA SG 10201910373P A SG10201910373P A SG 10201910373PA SG 10201910373P A SG10201910373P A SG 10201910373PA
Authority
SG
Singapore
Prior art keywords
datashare
blockchain
cryptographic
control
datashare control
Prior art date
Application number
SG10201910373PA
Inventor
David Treat
John Velissarios
Teresa Sheausan Tung
Luiz Pizzato
Deborah Garand
Kermany Atieh Ranjbar
Chia Jung Chang
Arjun Sitaraman Krishnan
Original Assignee
Accenture Global Solutions Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Accenture Global Solutions Ltd filed Critical Accenture Global Solutions Ltd
Publication of SG10201910373PA publication Critical patent/SG10201910373PA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Accounting & Taxation (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Data Mining & Analysis (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
SG10201910373PA 2018-11-08 2019-11-06 Cryptographic datashare control for blockchain SG10201910373PA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862757273P 2018-11-08 2018-11-08
US16/672,761 US10721217B2 (en) 2018-11-08 2019-11-04 Cryptographic datashare control for blockchain

Publications (1)

Publication Number Publication Date
SG10201910373PA true SG10201910373PA (en) 2020-06-29

Family

ID=68470408

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10201910373PA SG10201910373PA (en) 2018-11-08 2019-11-06 Cryptographic datashare control for blockchain

Country Status (6)

Country Link
US (2) US10721217B2 (en)
EP (1) EP3651405B1 (en)
JP (2) JP2020092414A (en)
CN (1) CN111159723B (en)
AU (1) AU2019261730B2 (en)
SG (1) SG10201910373PA (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11405365B2 (en) 2019-03-13 2022-08-02 Springcoin, Inc. Method and apparatus for effecting a data-based activity
US11374910B2 (en) * 2019-03-13 2022-06-28 Springcoin, Inc. Method and apparatus for effecting a data-based activity
US11941619B2 (en) * 2019-12-12 2024-03-26 Paypal, Inc. Validation and storage of transaction data for a blockchain
CN111131317B (en) 2019-12-31 2022-04-26 百度在线网络技术(北京)有限公司 Data processing method, device, equipment and medium based on block chain
US11637817B2 (en) 2020-03-12 2023-04-25 Springcoin, Inc. Method and apparatus for effecting a data-based activity
CN111859446A (en) * 2020-06-16 2020-10-30 北京农业信息技术研究中心 Agricultural product traceability information sharing-privacy protection method and system
CN113347008B (en) * 2021-08-05 2021-11-26 南京可信区块链与算法经济研究院有限公司 Loan information storage method adopting addition homomorphic encryption
CN115118411B (en) * 2022-08-29 2022-11-29 人民法院信息技术服务中心 Method, device and equipment for down-link multi-party trusted computing and storage medium
CN117521164B (en) * 2024-01-08 2024-05-03 南湖实验室 Self-adaptive homomorphic encryption method based on trusted execution environment

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1830190A (en) 2003-07-29 2006-09-06 汤姆森特许公司 Controlling access to a network using redirection
KR101243713B1 (en) 2011-07-08 2013-03-13 이광민 Wireless lan access point and method for accessing wireless lan
US8495714B2 (en) 2011-07-20 2013-07-23 Bridgewater Systems Corp. Systems and methods for authenticating users accessing unsecured wifi access points
US8844013B2 (en) 2011-10-04 2014-09-23 Salesforce.Com, Inc. Providing third party authentication in an on-demand service environment
US9479488B2 (en) 2012-01-26 2016-10-25 Facebook, Inc. Network access based on social-networking information
US10572684B2 (en) * 2013-11-01 2020-02-25 Anonos Inc. Systems and methods for enforcing centralized privacy controls in de-centralized systems
JP6677653B2 (en) * 2014-12-25 2020-04-08 国立大学法人 東京大学 Control device, analysis device and decoding device
US10013573B2 (en) * 2015-12-16 2018-07-03 International Business Machines Corporation Personal ledger blockchain
WO2017148527A1 (en) * 2016-03-03 2017-09-08 Nec Europe Ltd. Method for managing data in a network of nodes
US10992649B2 (en) * 2016-04-01 2021-04-27 Consensys Software Inc. Systems and methods for privacy in distributed ledger transactions
CN106549749B (en) * 2016-12-06 2019-12-24 杭州趣链科技有限公司 Block chain privacy protection method based on addition homomorphic encryption
CN106845960B (en) * 2017-01-24 2018-03-20 上海壹账通区块链科技有限公司 Method for secure transactions and system based on block chain
US20180285839A1 (en) * 2017-04-04 2018-10-04 Datient, Inc. Providing data provenance, permissioning, compliance, and access control for data storage systems using an immutable ledger overlay network
GB201706071D0 (en) * 2017-04-18 2017-05-31 Nchain Holdings Ltd Computer-implemented system and method
CN107911216B (en) * 2017-10-26 2020-07-14 矩阵元技术(深圳)有限公司 Block chain transaction privacy protection method and system
CN108462568B (en) * 2018-02-11 2021-08-06 西安电子科技大学 Block chain-based secure file storage and sharing method and cloud storage system
WO2019173519A1 (en) * 2018-03-06 2019-09-12 Jordan Simons Customized view of restricted information recorded into a blockchain
CA3041160C (en) * 2018-11-07 2022-11-29 Alibaba Group Holding Limited Blockchain data protection based on account note model with zero-knowledge proof

Also Published As

Publication number Publication date
US20200153803A1 (en) 2020-05-14
JP7149445B2 (en) 2022-10-06
CN111159723B (en) 2023-11-07
JP2022141772A (en) 2022-09-29
EP3651405A1 (en) 2020-05-13
AU2019261730A1 (en) 2020-05-28
US10721217B2 (en) 2020-07-21
JP2020092414A (en) 2020-06-11
US20200351253A1 (en) 2020-11-05
EP3651405B1 (en) 2021-12-29
CN111159723A (en) 2020-05-15
AU2019261730B2 (en) 2021-02-11
US11297043B2 (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CA206257S (en) Control device
CA206264S (en) Control device
EP3827381C0 (en) Multi-qubit control
SG10201910373PA (en) Cryptographic datashare control for blockchain
GB2608088B (en) Control system
CA187726S (en) Headware for computer control
CA217487S (en) Control device
CA212393S (en) Control device
CA194575S (en) Control device
GB201811807D0 (en) Encryption system
CA208042S (en) Control device
HK1258974A1 (en) Mobile-object control system
GB201710302D0 (en) Control system
SG10201905100QA (en) Control apparatus
GB201808757D0 (en) Threat control
ZA202100616B (en) Control arrangement
GB202017738D0 (en) Control arrangement
PL3524860T3 (en) Control member
GB2580353B (en) Securing device for increased control
GB201819719D0 (en) Control system
GB201913422D0 (en) Machine-human interaction control device
GB201812873D0 (en) Control system
SG11202009628UA (en) Device operation control
GB201815107D0 (en) Machine-human interaction control device
GB201814844D0 (en) Magflow input offset control