SG10202004056UA - Methods and Devices for Protecting and Verifying State Information of Record - Google Patents

Methods and Devices for Protecting and Verifying State Information of Record

Info

Publication number
SG10202004056UA
SG10202004056UA SG10202004056UA SG10202004056UA SG10202004056UA SG 10202004056U A SG10202004056U A SG 10202004056UA SG 10202004056U A SG10202004056U A SG 10202004056UA SG 10202004056U A SG10202004056U A SG 10202004056UA SG 10202004056U A SG10202004056U A SG 10202004056UA
Authority
SG
Singapore
Prior art keywords
protecting
record
methods
devices
state information
Prior art date
Application number
SG10202004056UA
Inventor
Shengjiao Cao
Yuan Yuan
Hui Fang
Weitao Yang
Original Assignee
Alipay Labs Singapore Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Labs Singapore Pte Ltd filed Critical Alipay Labs Singapore Pte Ltd
Priority to SG10202004056UA priority Critical patent/SG10202004056UA/en
Publication of SG10202004056UA publication Critical patent/SG10202004056UA/en
Priority to CN202180009041.5A priority patent/CN114945933A/en
Priority to PCT/CN2021/091092 priority patent/WO2021223661A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Automation & Control Theory (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)
SG10202004056UA 2020-05-04 2020-05-04 Methods and Devices for Protecting and Verifying State Information of Record SG10202004056UA (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
SG10202004056UA SG10202004056UA (en) 2020-05-04 2020-05-04 Methods and Devices for Protecting and Verifying State Information of Record
CN202180009041.5A CN114945933A (en) 2020-05-04 2021-04-29 Method and apparatus for protecting and verifying recorded status information
PCT/CN2021/091092 WO2021223661A1 (en) 2020-05-04 2021-04-29 Methods and devices for protecting and verifying state information of record

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SG10202004056UA SG10202004056UA (en) 2020-05-04 2020-05-04 Methods and Devices for Protecting and Verifying State Information of Record

Publications (1)

Publication Number Publication Date
SG10202004056UA true SG10202004056UA (en) 2020-11-27

Family

ID=73698200

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10202004056UA SG10202004056UA (en) 2020-05-04 2020-05-04 Methods and Devices for Protecting and Verifying State Information of Record

Country Status (3)

Country Link
CN (1) CN114945933A (en)
SG (1) SG10202004056UA (en)
WO (1) WO2021223661A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160260095A1 (en) * 2015-03-02 2016-09-08 Dell Products, Lp Containerized Computational Task Execution Management Using a Secure Distributed Transaction Ledger
US20190073645A1 (en) * 2017-09-05 2019-03-07 Advr, Inc. Systems and Methods of Decentralized Geospatial Data Gathering
CN109257182B (en) * 2018-10-24 2021-06-25 杭州趣链科技有限公司 Privacy protection method based on homomorphic cryptography commitment and zero knowledge range certification
CN109903158A (en) * 2019-01-31 2019-06-18 武汉大学 The method that transaction amount is in some section is proved using zero knowledge probative agreement

Also Published As

Publication number Publication date
WO2021223661A1 (en) 2021-11-11
CN114945933A (en) 2022-08-26

Similar Documents

Publication Publication Date Title
EP3789900A4 (en) Data protection method and device and storage medium
EP3607728A4 (en) Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
EP3745270A4 (en) Method and device for processing bad tracks of disk and computer storage medium
EP4163183A4 (en) Information security protection method and apparatus
EP4148609A4 (en) Data integrity protection method and apparatus
GB202017216D0 (en) Systems and methods of data record management
EP4287595A4 (en) Sound recording method and related device
EP4174677A4 (en) Data reading and writing method and device
SG10202009676VA (en) Blockchain data recording method and apparatus thereof
SG10202100435SA (en) High-speed parallel reproducing holographic disk reading method and device
IL267630A (en) A system and method for increasing security of information storage and retrieval
SG10202004057YA (en) Methods and Devices for Protecting and Verifying State Transition of Record
EP4165780A4 (en) Systems and methods for compression and encryption of data
EP4179801A4 (en) Method and device for determining timing information
SG10202004056UA (en) Methods and Devices for Protecting and Verifying State Information of Record
SG10202011681TA (en) Methods and devices for protecting and verifying state information of record
IL274840A (en) Verifying device and application integrity
EP4297428A4 (en) Tws earphone and playing method and device of tws earphone
EP3820078A4 (en) Device and method for mediating configuration of authentication information
SG10202008586PA (en) Methods and Devices for Protecting and Verifying State Transition of Record
EP4170505A4 (en) Data writing method and device
SG10202102327UA (en) Methods and devices for verifying data integrity
EP4024930A4 (en) Security protection method and apparatus for air interface information
EP4400994A4 (en) Data protection method and electronic device
EP4394635A4 (en) Data management method and device