SG10202004056UA - Methods and Devices for Protecting and Verifying State Information of Record - Google Patents
Methods and Devices for Protecting and Verifying State Information of RecordInfo
- Publication number
- SG10202004056UA SG10202004056UA SG10202004056UA SG10202004056UA SG10202004056UA SG 10202004056U A SG10202004056U A SG 10202004056UA SG 10202004056U A SG10202004056U A SG 10202004056UA SG 10202004056U A SG10202004056U A SG 10202004056UA SG 10202004056U A SG10202004056U A SG 10202004056UA
- Authority
- SG
- Singapore
- Prior art keywords
- protecting
- record
- methods
- devices
- state information
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Automation & Control Theory (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10202004056UA SG10202004056UA (en) | 2020-05-04 | 2020-05-04 | Methods and Devices for Protecting and Verifying State Information of Record |
CN202180009041.5A CN114945933A (en) | 2020-05-04 | 2021-04-29 | Method and apparatus for protecting and verifying recorded status information |
PCT/CN2021/091092 WO2021223661A1 (en) | 2020-05-04 | 2021-04-29 | Methods and devices for protecting and verifying state information of record |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10202004056UA SG10202004056UA (en) | 2020-05-04 | 2020-05-04 | Methods and Devices for Protecting and Verifying State Information of Record |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10202004056UA true SG10202004056UA (en) | 2020-11-27 |
Family
ID=73698200
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10202004056UA SG10202004056UA (en) | 2020-05-04 | 2020-05-04 | Methods and Devices for Protecting and Verifying State Information of Record |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN114945933A (en) |
SG (1) | SG10202004056UA (en) |
WO (1) | WO2021223661A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160260095A1 (en) * | 2015-03-02 | 2016-09-08 | Dell Products, Lp | Containerized Computational Task Execution Management Using a Secure Distributed Transaction Ledger |
US20190073645A1 (en) * | 2017-09-05 | 2019-03-07 | Advr, Inc. | Systems and Methods of Decentralized Geospatial Data Gathering |
CN109257182B (en) * | 2018-10-24 | 2021-06-25 | 杭州趣链科技有限公司 | Privacy protection method based on homomorphic cryptography commitment and zero knowledge range certification |
CN109903158A (en) * | 2019-01-31 | 2019-06-18 | 武汉大学 | The method that transaction amount is in some section is proved using zero knowledge probative agreement |
-
2020
- 2020-05-04 SG SG10202004056UA patent/SG10202004056UA/en unknown
-
2021
- 2021-04-29 CN CN202180009041.5A patent/CN114945933A/en active Pending
- 2021-04-29 WO PCT/CN2021/091092 patent/WO2021223661A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2021223661A1 (en) | 2021-11-11 |
CN114945933A (en) | 2022-08-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3789900A4 (en) | Data protection method and device and storage medium | |
EP3607728A4 (en) | Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain | |
EP3745270A4 (en) | Method and device for processing bad tracks of disk and computer storage medium | |
EP4163183A4 (en) | Information security protection method and apparatus | |
EP4148609A4 (en) | Data integrity protection method and apparatus | |
GB202017216D0 (en) | Systems and methods of data record management | |
EP4287595A4 (en) | Sound recording method and related device | |
EP4174677A4 (en) | Data reading and writing method and device | |
SG10202009676VA (en) | Blockchain data recording method and apparatus thereof | |
SG10202100435SA (en) | High-speed parallel reproducing holographic disk reading method and device | |
IL267630A (en) | A system and method for increasing security of information storage and retrieval | |
SG10202004057YA (en) | Methods and Devices for Protecting and Verifying State Transition of Record | |
EP4165780A4 (en) | Systems and methods for compression and encryption of data | |
EP4179801A4 (en) | Method and device for determining timing information | |
SG10202004056UA (en) | Methods and Devices for Protecting and Verifying State Information of Record | |
SG10202011681TA (en) | Methods and devices for protecting and verifying state information of record | |
IL274840A (en) | Verifying device and application integrity | |
EP4297428A4 (en) | Tws earphone and playing method and device of tws earphone | |
EP3820078A4 (en) | Device and method for mediating configuration of authentication information | |
SG10202008586PA (en) | Methods and Devices for Protecting and Verifying State Transition of Record | |
EP4170505A4 (en) | Data writing method and device | |
SG10202102327UA (en) | Methods and devices for verifying data integrity | |
EP4024930A4 (en) | Security protection method and apparatus for air interface information | |
EP4400994A4 (en) | Data protection method and electronic device | |
EP4394635A4 (en) | Data management method and device |