SG11201804697PA - Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography - Google Patents

Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography

Info

Publication number
SG11201804697PA
SG11201804697PA SG11201804697PA SG11201804697PA SG11201804697PA SG 11201804697P A SG11201804697P A SG 11201804697PA SG 11201804697P A SG11201804697P A SG 11201804697PA SG 11201804697P A SG11201804697P A SG 11201804697PA SG 11201804697P A SG11201804697P A SG 11201804697PA
Authority
SG
Singapore
Prior art keywords
key
international
access
private
pct
Prior art date
Application number
SG11201804697PA
Inventor
Steven Davis
Original Assignee
Mastercard International Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mastercard International Inc filed Critical Mastercard International Inc
Publication of SG11201804697PA publication Critical patent/SG11201804697PA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves

Abstract

INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (19) World Intellectual Property -' Organization International Bureau res., 00) (43) International Publication Date .... ....r .„,„1 27 July 2017 (27.07.2017) WIPO I PCT ID Hit (10) WO International 2017/127238 111111111111111111111111111111111111111111111111111111111111t111111111111111 Publication Al Number (51) International Patent Classification: AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, HO4L 29/06 (2006.01) HO4L 9/08 (2006.01) BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DJ, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, (21) International Application Number: HN, HR, HU, ID, IL, IN, IR, IS, JP, KE, KG, KH, KN, PCT/US2017/012437 KP, KR, KW, KZ, LA, LC, LK, LR, LS, LU, LY, MA, (22) International Filing Date: MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, 6 January 2017 (06.01.2017) NI, NO, NZ, OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, (25) Filing Language: English TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, (26) Publication Language: English ZA, ZM, ZW. (30) Priority Data: (84) Designated States (unless otherwise indicated, for every 15/001,775 20 January 2016 (20.01.2016) US kind of regional protection available): ARIPO (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, (71) Applicant: MASTERCARD INTERNATIONAL IN- TZ, UG, ZM, ZW), Eurasian (AM, AZ, BY, KG, KZ, RU, CORPORATED [US/US]; 2000 Purchase Street, Pur- TJ, TM), European (AL, AT, BE, BG, CH, CY, CZ, DE, chase, NY 10577 (US). DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, (72) Inventor: DAVIS, Steven, Charles; 128 Glenallen Drive, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, Saint Peters, MO 63376-1732 (US). SM, TR), OAPI (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG). (74) Agent: DOBBYN, Colm, J ; Mastercard International In- Published: corporated, 2000 Purchase Street, Purchase, NY 10577 (US). — with international search report (Art 21(3)) (81) Designated States (unless otherwise indicated, for every kind of national protection available): AE, AG, AL, AM, (54) Title: METHOD AND SYSTEM FOR DISTRIBUTED CRYPTOGRAPHIC KEY PROVISIONING AND STORAGE VIA — ELLIPTIC CURVE CRYPTOGRAPHY (57) : A method for distributing mul- tiple cryptographic keys used to access data includes: receiving a data signal superimposed key with an access request, wherein the access ioo 106 key request includes at least a number, n, 1021a 4 than 1, keys; greater of requested generating n Block:ham Network key pairs using a key pair generation al- key includes gorithm, wherein each pair a 4 private key and a public key; deriving an ac- cess private key by applying the key private 1 04b included in key key each of then pairs to a derivation algorithm; generating an access ----..._„ key corresponding to the derived public ac- , cess private key using the key pair generation algorithm; and electronically transmitting a data signal superimposed with a private key -..,_ 02 -''\"----.,*. 11 04e- .4t airs GC included in one of the n ke y p for each of the n key pairs. ('9') Computeig Processre ei De‘nces Server IN ei FIG. 1 1-1 IN 1-1 0 ei O
SG11201804697PA 2016-01-20 2017-01-06 Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography SG11201804697PA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/001,775 US10103885B2 (en) 2016-01-20 2016-01-20 Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography
PCT/US2017/012437 WO2017127238A1 (en) 2016-01-20 2017-01-06 Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography

Publications (1)

Publication Number Publication Date
SG11201804697PA true SG11201804697PA (en) 2018-07-30

Family

ID=57868395

Family Applications (2)

Application Number Title Priority Date Filing Date
SG11201804697PA SG11201804697PA (en) 2016-01-20 2017-01-06 Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography
SG10202002256UA SG10202002256UA (en) 2016-01-20 2017-01-06 Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography

Family Applications After (1)

Application Number Title Priority Date Filing Date
SG10202002256UA SG10202002256UA (en) 2016-01-20 2017-01-06 Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography

Country Status (13)

Country Link
US (4) US10103885B2 (en)
EP (2) EP3381172B1 (en)
JP (2) JP7045997B2 (en)
CN (2) CN112804257B (en)
AU (2) AU2017208878B2 (en)
BR (1) BR112018011353B1 (en)
CA (1) CA3009338C (en)
DK (1) DK3381172T3 (en)
ES (1) ES2781091T3 (en)
HK (1) HK1259028A1 (en)
MX (2) MX2018007856A (en)
SG (2) SG11201804697PA (en)
WO (1) WO2017127238A1 (en)

Families Citing this family (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US10103885B2 (en) 2016-01-20 2018-10-16 Mastercard International Incorporated Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography
DE102016103498A1 (en) * 2016-02-26 2017-08-31 Infineon Technologies Ag A method of communicating data from a sensor device to an electronic control unit, a sensor device, and an electronic control unit
US10341309B1 (en) 2016-06-13 2019-07-02 Allstate Insurance Company Cryptographically protecting data transferred between spatially distributed computing devices using an intermediary database
US10067810B2 (en) * 2016-07-28 2018-09-04 Cisco Technology, Inc. Performing transactions between application containers
EP3866388B1 (en) * 2016-08-10 2022-11-30 Nextlabs, Inc. Sharing encrypted documents within and outside an organization
US20210279723A1 (en) 2017-01-25 2021-09-09 State Farm Mutual Automobile Insurance Company Systems and methods for industry reporting via blockchain
US11128452B2 (en) * 2017-03-25 2021-09-21 AVAST Software s.r.o. Encrypted data sharing with a hierarchical key structure
US10749670B2 (en) * 2017-05-18 2020-08-18 Bank Of America Corporation Block chain decoding with fair delay for distributed network devices
US11411744B2 (en) * 2017-05-25 2022-08-09 Nec Network And Sensor Systems, Ltd. Encryption communication method, information processing apparatus, and program
WO2018235845A1 (en) * 2017-06-21 2018-12-27 日本電信電話株式会社 Key exchange system and key exchange method
US20180373882A1 (en) * 2017-06-23 2018-12-27 Thijs Veugen Privacy preserving computation protocol for data analytics
US11132451B2 (en) * 2017-08-31 2021-09-28 Parity Technologies Ltd. Secret data access control systems and methods
US10929823B2 (en) 2017-09-12 2021-02-23 Northwestern University Peer auditing in a blockchain distribution network
JP7448220B2 (en) 2017-10-19 2024-03-12 オートンハイブ コーポレイション Key generation/deposit system and method for multipoint authentication
US11488433B2 (en) 2018-01-11 2022-11-01 Mastercard International Incorporated Method and system for public elections on a moderated blockchain
US11431477B2 (en) 2018-05-14 2022-08-30 nChain Holdings Limited Computer-implemented systems and methods for using a blockchain to perform an atomic swap
CN110493168A (en) * 2018-07-19 2019-11-22 江苏恒宝智能系统技术有限公司 Medical curative effect based on asymmetric encryption techniques monitors sharing method
CN109104419B (en) * 2018-07-27 2021-06-01 苏州朗润创新知识产权运营有限公司 Block chain account generation method and system
US10764039B2 (en) 2018-08-01 2020-09-01 The Toronto-Dominion Bank Dynamic generation and management of asymmetric cryptographic keys using distributed ledgers
US10491404B1 (en) * 2018-09-12 2019-11-26 Hotpyp, Inc. Systems and methods for cryptographic key generation and authentication
KR20200034020A (en) 2018-09-12 2020-03-31 삼성전자주식회사 Electronic apparatus and control method thereof
JP7104248B2 (en) 2018-10-12 2022-07-20 ティーゼロ・アイピー,エルエルシー An encrypted asset encryption key part that allows the assembly of an asset encryption key using a subset of the encrypted asset encryption key parts
US20220027903A1 (en) * 2018-11-27 2022-01-27 nChain Holdings Limited Systems and methods for efficient and secure processing, accessing and transmission of data via a blockchain network
CA3041220C (en) 2018-11-27 2022-07-19 Alibaba Group Holding Limited Asymmetric key management in consortium blockchain networks
US11349653B2 (en) 2018-12-18 2022-05-31 Hewlett Packard Enterprise Development Lp Multiple-site private network secured by IPsec using blockchain network for key exchange
US10937339B2 (en) 2019-01-10 2021-03-02 Bank Of America Corporation Digital cryptosystem with re-derivable hybrid keys
CN109921900A (en) * 2019-02-18 2019-06-21 深圳市优学链科技有限公司 A kind of algorithm of distributed key generation
US11245516B2 (en) * 2019-04-24 2022-02-08 Veridify Security Inc. Shared secret data production with use of concealed cloaking elements
US20200358604A1 (en) * 2019-05-08 2020-11-12 Samsung Sds Co., Ltd. Apparatus and method for sharing data
KR102625088B1 (en) * 2019-05-08 2024-01-16 삼성에스디에스 주식회사 Apparatus and method for sharing data
EP3754896A1 (en) * 2019-06-18 2020-12-23 Koninklijke Philips N.V. Authenticated key agreement
US11516147B2 (en) * 2019-10-02 2022-11-29 Red Hat, Inc. Blockchain-based dynamic storage provisioner
KR20230024279A (en) * 2020-05-11 2023-02-20 오튼하이브 코퍼레이션 How to generate a key using controlled compromise in a computer network
TWI776416B (en) * 2021-03-08 2022-09-01 英屬開曼群島商現代財富控股有限公司 Threshold signature scheme system for hierarchical deterministic wallet and method thereof
TWI759138B (en) * 2021-03-15 2022-03-21 英屬開曼群島商現代財富控股有限公司 Threshold signature scheme system based on inputting password and method thereof
CN113364769B (en) * 2021-06-03 2022-04-15 浙江大学 Method for constructing hidden channel in block chain network

Family Cites Families (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6850252B1 (en) * 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
US6330671B1 (en) * 1997-06-23 2001-12-11 Sun Microsystems, Inc. Method and system for secure distribution of cryptographic keys on multicast networks
JPH11239124A (en) * 1998-02-23 1999-08-31 Nippon Telegr & Teleph Corp <Ntt> Method and device for restoring secret key
JP3331327B2 (en) 1998-12-09 2002-10-07 日本電信電話株式会社 Key management method and program recording medium
WO2000049768A1 (en) * 1999-02-17 2000-08-24 Thomas Mittelholzer Method for signature splitting to protect private keys
SE9902339L (en) 1999-06-21 2001-02-20 Ericsson Telefon Ab L M Device comprising a capacitive proximity sensing sensor
US6834112B1 (en) * 2000-04-21 2004-12-21 Intel Corporation Secure distribution of private keys to multiple clients
US7181017B1 (en) * 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
JP2004048479A (en) * 2002-07-12 2004-02-12 Kddi Corp Encryption key management method of shared encryption information
US6931133B2 (en) * 2002-09-03 2005-08-16 Verisign, Inc. Method and system of securely escrowing private keys in a public key infrastructure
WO2006054843A1 (en) * 2004-11-17 2006-05-26 Samsung Electronics Co., Ltd. Method for transmitting content in home network using user-binding
US20100217987A1 (en) * 2006-02-07 2010-08-26 Ravindra Waman Shevade Document Security Management System
JP2008021164A (en) * 2006-07-13 2008-01-31 Konica Minolta Holdings Inc Information processor, data management method, and computer program
US8254579B1 (en) * 2007-01-31 2012-08-28 Hewlett-Packard Development Company, L.P. Cryptographic key distribution using a trusted computing platform
CN101459505B (en) * 2007-12-14 2011-09-14 华为技术有限公司 Method, system for generating private key for user, user equipment and cipher key generating center
WO2010067433A1 (en) * 2008-12-11 2010-06-17 三菱電機株式会社 Self-authentication communication device, self-authentication verification communication device, device authentication system, device authentication method for device authentication system, self-authentication communication program, and self-authentication verification communication program
CN101917403B (en) * 2010-07-23 2013-06-05 华中科技大学 Distributed key management method for ciphertext storage
IL213662A0 (en) * 2011-06-20 2011-11-30 Eliphaz Hibshoosh Key generation using multiple sets of secret shares
IL216162A0 (en) * 2011-11-06 2012-02-29 Nds Ltd Electronic content distribution based on secret sharing
US9053329B2 (en) * 2012-05-24 2015-06-09 Lockbox Llc Systems and methods for validated secure data access
US10728231B2 (en) * 2012-07-09 2020-07-28 Massachusetts Institute Of Technology Data security using inter-zone gate circuits
US9350536B2 (en) * 2012-08-16 2016-05-24 Digicert, Inc. Cloud key management system
US9311500B2 (en) * 2013-09-25 2016-04-12 Amazon Technologies, Inc. Data security using request-supplied keys
CN103560882B (en) * 2013-10-29 2016-08-17 武汉理工大学 A kind of elliptic curve cipher system based on mark
JP2015099961A (en) * 2013-11-18 2015-05-28 三菱電機株式会社 Information delivery system, server device, information generating device, terminal device, information delivery method, and program
US10700856B2 (en) * 2013-11-19 2020-06-30 Network-1 Technologies, Inc. Key derivation for a module using an embedded universal integrated circuit card
US9280678B2 (en) * 2013-12-02 2016-03-08 Fortinet, Inc. Secure cloud storage distribution and aggregation
US20150213433A1 (en) * 2014-01-28 2015-07-30 Apple Inc. Secure provisioning of credentials on an electronic device using elliptic curve cryptography
US20150254640A1 (en) * 2014-03-05 2015-09-10 Cryptographi, Inc. Method and apparatus for digital currency paper wallet
US10796302B2 (en) * 2014-04-23 2020-10-06 Minkasu, Inc. Securely storing and using sensitive information for making payments using a wallet application
EP3155754B1 (en) * 2014-06-13 2018-10-24 Bicdroid Inc. Methods, systems and computer program product for providing encryption on a plurality of devices
US20160191470A1 (en) * 2014-08-07 2016-06-30 Ajay Movalia Method and apparatus for securely transmitting communication between multiple users
WO2016033610A1 (en) * 2014-08-29 2016-03-03 Visa International Service Association Methods for secure cryptogram generation
CN104717297A (en) * 2015-03-30 2015-06-17 上海交通大学 Safety cloud storage method and system
US20170132626A1 (en) * 2015-11-05 2017-05-11 Mastercard International Incorporated Method and system for processing of a blockchain transaction in a transaction processing network
US9832024B2 (en) * 2015-11-13 2017-11-28 Visa International Service Association Methods and systems for PKI-based authentication
US10103885B2 (en) 2016-01-20 2018-10-16 Mastercard International Incorporated Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography

Also Published As

Publication number Publication date
AU2019246903A1 (en) 2019-10-31
WO2017127238A1 (en) 2017-07-27
US20190342094A1 (en) 2019-11-07
US20170207917A1 (en) 2017-07-20
AU2017208878A1 (en) 2018-06-07
US10396988B2 (en) 2019-08-27
HK1259028A1 (en) 2019-11-22
CN112804257A (en) 2021-05-14
US20190028275A1 (en) 2019-01-24
SG10202002256UA (en) 2020-04-29
EP3381172B1 (en) 2020-02-26
EP3381172A1 (en) 2018-10-03
CN108463983B (en) 2021-02-12
AU2019246903B2 (en) 2021-08-12
ES2781091T3 (en) 2020-08-28
JP2019507539A (en) 2019-03-14
CA3009338C (en) 2020-10-27
US20210044437A1 (en) 2021-02-11
CA3009338A1 (en) 2017-07-27
MX2018007856A (en) 2018-08-01
AU2017208878B2 (en) 2019-07-11
US10848308B2 (en) 2020-11-24
EP3668049A1 (en) 2020-06-17
BR112018011353B1 (en) 2020-03-17
JP2022046643A (en) 2022-03-23
MX2022003019A (en) 2022-04-07
EP3668049B1 (en) 2022-07-13
US10103885B2 (en) 2018-10-16
CN112804257B (en) 2023-07-11
JP7045997B2 (en) 2022-04-01
BR112018011353A2 (en) 2018-12-04
JP7370371B2 (en) 2023-10-27
DK3381172T3 (en) 2020-04-27
CN108463983A (en) 2018-08-28
US11664990B2 (en) 2023-05-30

Similar Documents

Publication Publication Date Title
SG11201804697PA (en) Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography
SG11201804361YA (en) Method for managing a trusted identity
SG11201806702XA (en) Personal device security using elliptic curve cryptography for secret sharing
SG11201804190YA (en) Method and system for blockchain variant using digital signatures
SG11201900052XA (en) Method and system for verification of identity attribute information
SG11201906532PA (en) Key establishment and data sending method and apparatus
SG11201900122WA (en) Method and system for partitioned blockchains and enhanced privacy for permissioned blockchains
SG11201903566XA (en) Regulating blockchain confidential transactions
SG11201903562QA (en) Recovering encrypted transaction information in blockchain confidential transactions
SG11201909630TA (en) Anti-replay attack authentication protocol
SG11201905456UA (en) Addressing a trusted execution environment using encryption key
SG11201805589VA (en) System and method for implementing secure communications for internet of things (iot) devices
SG11201903553VA (en) Blockchain data protection using homomorphic encryption
SG11201808086QA (en) Method and system for an efficient consensus mechanism for permissioned blockchains using audit guarantees
SG11201910054WA (en) Securely executing smart contract operations in a trusted execution environment
SG11201907281WA (en) Blockchain data protection based on generic account model and homomorphic encryption
SG11201806709PA (en) Universal tokenisation system for blockchain-based cryptocurrencies
SG11201806650VA (en) Systems and methods for providing a personal distributed ledger
SG11201905458WA (en) Addressing a trusted execution environment using signing key
SG11201809010TA (en) System and methods for validating and performing operations on homomorphically encrypted data
SG11201808991WA (en) Method and system for secure data transmission
SG11201803742YA (en) Method and system for processing of a blockchain transaction in a transaction processing network
SG11201811426UA (en) Distributed electronic record and transaction history
SG11201903141QA (en) Business processing method and apparatus
SG11201903459UA (en) Sharing protection for a screen sharing experience