SG11202000808WA - Computer-implemented method of generating a threshold vault - Google Patents
Computer-implemented method of generating a threshold vaultInfo
- Publication number
- SG11202000808WA SG11202000808WA SG11202000808WA SG11202000808WA SG11202000808WA SG 11202000808W A SG11202000808W A SG 11202000808WA SG 11202000808W A SG11202000808W A SG 11202000808WA SG 11202000808W A SG11202000808W A SG 11202000808WA SG 11202000808W A SG11202000808W A SG 11202000808WA
- Authority
- SG
- Singapore
- Prior art keywords
- generating
- computer
- implemented method
- threshold vault
- vault
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Optimization (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Algebra (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Saccharide Compounds (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1713064.2A GB201713064D0 (en) | 2017-08-15 | 2017-08-15 | Computer-implemented methods and systems |
IB2017054961 | 2017-08-15 | ||
IB2017055497 | 2017-09-12 | ||
GBGB1714660.6A GB201714660D0 (en) | 2017-08-15 | 2017-09-12 | Computer-implemented methods and systems |
IB2017057782 | 2017-12-11 | ||
PCT/IB2018/055604 WO2019034951A1 (en) | 2017-08-15 | 2018-07-26 | Threshold digital signature method and system |
PCT/IB2018/056094 WO2019034986A1 (en) | 2017-08-15 | 2018-08-13 | Computer-implemented method of generating a threshold vault |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202000808WA true SG11202000808WA (en) | 2020-02-27 |
Family
ID=67702926
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202000808WA SG11202000808WA (en) | 2017-08-15 | 2018-08-13 | Computer-implemented method of generating a threshold vault |
Country Status (8)
Country | Link |
---|---|
US (2) | US11381389B2 (en) |
EP (2) | EP4325770A3 (en) |
JP (2) | JP7202358B2 (en) |
KR (2) | KR20240011260A (en) |
CN (1) | CN110999207B (en) |
SG (1) | SG11202000808WA (en) |
TW (2) | TW202403575A (en) |
WO (1) | WO2019034986A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116760547A (en) * | 2023-08-21 | 2023-09-15 | 湖南湘江树图信息科技创新中心有限公司 | Distributed private key management method and system |
CN116865957A (en) * | 2023-07-04 | 2023-10-10 | 北京邮电大学 | Quantum security multiparty computing system |
Families Citing this family (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6753403B2 (en) * | 2015-08-26 | 2020-09-09 | 日本電気株式会社 | Information processing equipment, authentication systems, authentication methods, and computer programs |
US10505723B1 (en) * | 2017-04-26 | 2019-12-10 | Wells Fargo Bank, N.A. | Secret sharing information management and security system |
KR102667837B1 (en) | 2017-08-30 | 2024-05-21 | 인퍼, 인코포레이티드 | High-precision privacy-preserving real-value function evaluation |
US11481761B2 (en) | 2018-06-03 | 2022-10-25 | VVOW Company Limited | Peer-to-peer cryptocurrency and crypto asset trading platform |
WO2020123926A1 (en) * | 2018-12-13 | 2020-06-18 | Login Id Inc. | Decentralized computing systems and methods for performing actions using stored private data |
EP3696670A1 (en) * | 2019-02-13 | 2020-08-19 | UVUE Limited | Distributed computation system and method of operation thereof |
IL285484B1 (en) * | 2019-02-22 | 2024-03-01 | Inpher Inc | Arithmetic for secure multi-party computation with modular integers |
US10951415B2 (en) * | 2019-03-13 | 2021-03-16 | Digital 14 Llc | System, method, and computer program product for implementing zero round trip secure communications based on noisy secrets with a polynomial secret sharing scheme |
US10892891B2 (en) * | 2019-03-13 | 2021-01-12 | Digital 14 Llc | System, method, and computer program product for zero round trip secure communications based on two noisy secrets |
US11451406B2 (en) * | 2019-04-04 | 2022-09-20 | Moac Blockchain Tech Inc | Cross-chain messaging and message validation |
US11646877B2 (en) * | 2019-05-14 | 2023-05-09 | Samsung Sds Co., Ltd. | Apparatus and method for generating secret key, apparatus and method for generating evaluation key |
GB2584154A (en) | 2019-05-24 | 2020-11-25 | Nchain Holdings Ltd | Knowledge proof |
US10790990B2 (en) * | 2019-06-26 | 2020-09-29 | Alibaba Group Holding Limited | Ring signature-based anonymous transaction |
CN110457936B (en) * | 2019-07-01 | 2020-08-14 | 阿里巴巴集团控股有限公司 | Data interaction method and device and electronic equipment |
CN111064557A (en) * | 2019-12-25 | 2020-04-24 | 杭州安司源科技有限公司 | Distributed trusteeship digital currency threshold signature key distribution method |
CN113129001B (en) * | 2019-12-31 | 2023-02-17 | 上海证锘信息科技有限公司 | Anti-quantum attack threshold signature method for block chain cross-chain and asset hosting |
GB2597123B (en) * | 2020-05-14 | 2023-08-30 | Hung Hung Chiu | A method for creating a hierarchical threshold signature digital asset wallet |
CN113746623B (en) * | 2020-05-28 | 2023-03-24 | 华为技术有限公司 | Threshold key verification method and related equipment |
US11621834B2 (en) * | 2020-06-15 | 2023-04-04 | Acronis International Gmbh | Systems and methods for preserving data integrity when integrating secure multiparty computation and blockchain technology |
GB2597539A (en) * | 2020-07-28 | 2022-02-02 | Nchain Holdings Ltd | Generating shared private keys |
EP3955110A1 (en) | 2020-08-12 | 2022-02-16 | UVUE Limited | Distributed computing system and method of operation thereof |
GB2598112A (en) * | 2020-08-18 | 2022-02-23 | Nchain Holdings Ltd | Threshold signatures |
GB2600684A (en) * | 2020-10-28 | 2022-05-11 | Nchain Holdings Ltd | Identifying denial-of-service attacks |
CN112635010B (en) * | 2020-12-28 | 2023-07-07 | 扬州大学 | Data storage and sharing method under edge computing based on double block chains |
CN112906038B (en) * | 2021-03-26 | 2023-04-07 | 成都卫士通信息产业股份有限公司 | Thresholding processing method, device and equipment based on SM9 key and storage medium |
CN113438070B (en) * | 2021-05-25 | 2023-07-21 | 中国科学院计算技术研究所 | CAPSS-based block chain key recovery method and system |
CN113569261B (en) * | 2021-07-30 | 2024-05-14 | 华北电力科学研究院有限责任公司 | Power grid data processing method and device, electronic equipment and storage medium |
GB2612309A (en) * | 2021-10-26 | 2023-05-03 | Nchain Licensing Ag | Threshold signature scheme |
GB2612310A (en) * | 2021-10-26 | 2023-05-03 | Nchain Licensing Ag | Generating shared keys |
US11811752B1 (en) * | 2022-08-03 | 2023-11-07 | 1080 Network, Inc. | Systems, methods, and computing platforms for executing credential-less network-based communication exchanges |
CN116915416B (en) * | 2023-09-14 | 2023-12-15 | 北京信安世纪科技股份有限公司 | Certificate signing method and device and certificate obtaining method and device |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5764767A (en) | 1996-08-21 | 1998-06-09 | Technion Research And Development Foundation Ltd. | System for reconstruction of a secret shared by a plurality of participants |
EP1944906A3 (en) * | 1998-05-22 | 2012-07-04 | Certco Incorporated | Robust efficient distributed RSA-key generation |
US6363481B1 (en) | 1998-08-03 | 2002-03-26 | Nortel Networks Limited | Method and apparatus for secure data storage using distributed databases |
JP3560860B2 (en) | 1999-07-23 | 2004-09-02 | 株式会社東芝 | Secret sharing system, device, and storage medium |
JP4292835B2 (en) | 2003-03-13 | 2009-07-08 | 沖電気工業株式会社 | Secret reconstruction method, distributed secret reconstruction device, and secret reconstruction system |
CN101425902A (en) * | 2008-11-12 | 2009-05-06 | 电子科技大学 | Threshold digital signature method and system having forward security |
US20110213975A1 (en) | 2010-03-01 | 2011-09-01 | Alessandro Sorniotti | Secret interest groups in online social networks |
US8874991B2 (en) | 2011-04-01 | 2014-10-28 | Cleversafe, Inc. | Appending data to existing data stored in a dispersed storage network |
EP2689333B1 (en) | 2012-07-06 | 2014-09-10 | NEC Europe Ltd. | Method and system for storing and reading data in or from a key value storage |
TW201424322A (en) * | 2012-12-04 | 2014-06-16 | Cheng-Chung Lee | System for validating digital signature represented by signature identification and method thereof |
US9450938B1 (en) | 2013-03-13 | 2016-09-20 | Hrl Laboratories, Llc | Information secure proactive multiparty computation (PMPC) protocol with linear bandwidth complexity |
US9489522B1 (en) * | 2013-03-13 | 2016-11-08 | Hrl Laboratories, Llc | Method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ECDSA) based digital signatures with proactive security |
US9350550B2 (en) * | 2013-09-10 | 2016-05-24 | M2M And Iot Technologies, Llc | Power management and security for wireless modules in “machine-to-machine” communications |
WO2015160839A1 (en) | 2014-04-17 | 2015-10-22 | Hrl Laboratories, Llc | A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security |
US10432409B2 (en) * | 2014-05-05 | 2019-10-01 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
WO2016015141A1 (en) * | 2014-07-28 | 2016-02-04 | Infosec Global Inc. | System and method for cryptographic suite management |
WO2016049406A1 (en) * | 2014-09-26 | 2016-03-31 | Technicolor Usa, Inc. | Method and apparatus for secure non-interactive threshold signatures |
US9813234B2 (en) | 2015-05-11 | 2017-11-07 | The United States of America, as represented by the Secretery of the Air Force | Transferable multiparty computation |
US9735958B2 (en) | 2015-05-19 | 2017-08-15 | Coinbase, Inc. | Key ceremony of a security system forming part of a host computer for cryptographic transactions |
EP3259724B1 (en) * | 2016-02-23 | 2021-03-24 | Nchain Holdings Limited | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
AU2017223133B2 (en) | 2016-02-23 | 2022-09-08 | nChain Holdings Limited | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
US10046228B2 (en) * | 2016-05-02 | 2018-08-14 | Bao Tran | Smart device |
US20170345011A1 (en) * | 2016-05-26 | 2017-11-30 | Hitfin, Inc. | System and method executed on a blockchain network |
CN107040380A (en) * | 2017-06-13 | 2017-08-11 | 厦门大学 | A kind of improvement mould of the elliptic curve cryptosystem based on binary field removes method |
US10700850B2 (en) * | 2018-11-27 | 2020-06-30 | Alibaba Group Holding Limited | System and method for information protection |
BR112019007232B1 (en) * | 2018-11-27 | 2022-02-15 | Advanced New Technologies Co., Ltd | COMPUTER-IMPLEMENTED METHODS FOR INFORMATION PROTECTION, SYSTEMS FOR INFORMATION PROTECTION AND NON-TRANSITORY COMPUTER-LEABLE STORAGE MEDIA |
-
2018
- 2018-08-13 EP EP24150264.0A patent/EP4325770A3/en active Pending
- 2018-08-13 JP JP2020506804A patent/JP7202358B2/en active Active
- 2018-08-13 US US16/639,099 patent/US11381389B2/en active Active
- 2018-08-13 WO PCT/IB2018/056094 patent/WO2019034986A1/en unknown
- 2018-08-13 CN CN201880053433.XA patent/CN110999207B/en active Active
- 2018-08-13 EP EP18765195.5A patent/EP3669491B1/en active Active
- 2018-08-13 SG SG11202000808WA patent/SG11202000808WA/en unknown
- 2018-08-13 KR KR1020247001616A patent/KR20240011260A/en active Application Filing
- 2018-08-13 KR KR1020207005181A patent/KR102627049B1/en active IP Right Grant
- 2018-08-14 TW TW112136001A patent/TW202403575A/en unknown
- 2018-08-14 TW TW107128337A patent/TWI822693B/en active
-
2022
- 2022-06-23 US US17/847,976 patent/US20230013158A1/en active Pending
- 2022-12-23 JP JP2022206111A patent/JP2023024683A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116865957A (en) * | 2023-07-04 | 2023-10-10 | 北京邮电大学 | Quantum security multiparty computing system |
CN116760547A (en) * | 2023-08-21 | 2023-09-15 | 湖南湘江树图信息科技创新中心有限公司 | Distributed private key management method and system |
Also Published As
Publication number | Publication date |
---|---|
US20200213099A1 (en) | 2020-07-02 |
TW202403575A (en) | 2024-01-16 |
EP3669491A1 (en) | 2020-06-24 |
EP3669491B1 (en) | 2024-02-07 |
KR20240011260A (en) | 2024-01-25 |
CN110999207A (en) | 2020-04-10 |
KR20200035280A (en) | 2020-04-02 |
JP2023024683A (en) | 2023-02-16 |
US20230013158A1 (en) | 2023-01-19 |
EP4325770A2 (en) | 2024-02-21 |
TWI822693B (en) | 2023-11-21 |
TW201921888A (en) | 2019-06-01 |
JP7202358B2 (en) | 2023-01-11 |
JP2020532168A (en) | 2020-11-05 |
US11381389B2 (en) | 2022-07-05 |
CN110999207B (en) | 2024-05-31 |
EP4325770A3 (en) | 2024-04-24 |
KR102627049B1 (en) | 2024-01-19 |
WO2019034986A1 (en) | 2019-02-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202000808WA (en) | Computer-implemented method of generating a threshold vault | |
PL3490395T3 (en) | Method of generating aerosol | |
PL3448674T3 (en) | A veneered element and method of producing such a veneered element | |
GB2522494B (en) | Perforating gun assembly and method of forming wellbore perfortions | |
GB2548555B (en) | A method of redatuming geophysical data | |
EP3426748A4 (en) | Method of increasing the density of a well treatment brine | |
GB201703847D0 (en) | Curable composition and resing for treatment of a subterranean formation | |
GB2542317B (en) | Reverse cementation of liner string for formation stimulation | |
GB2575408B (en) | A banknote and a method of producing a banknote | |
PL3576958T3 (en) | Method of forming a security document | |
GB201718895D0 (en) | A method of generating training data | |
GB201522544D0 (en) | Method of forming a closure | |
PL3242801T3 (en) | Method of producing a security element and security element | |
HK1257292A1 (en) | Method of generating a georeferenced plan | |
TWI563099B (en) | A plated steel and a method of producing thereof | |
EP3497875C0 (en) | A method of generating a secure record of a conversation | |
PL3177781T3 (en) | A beam and a method of producing such a beam | |
GB201521886D0 (en) | A method of treating a well | |
IL246869A0 (en) | Introductory assembly and method for inserting intracardiac instruments | |
GB201501940D0 (en) | A method of forming a closure | |
GB201417528D0 (en) | A method of colouring titanium or titanium alloy | |
GB201805448D0 (en) | Computer-implemented method | |
ZA201803802B (en) | Method of forming a closure member | |
GB201721461D0 (en) | Computer-implemented methods of evaluating | |
GB201615934D0 (en) | A method of combining data |