SG11202000808WA - Computer-implemented method of generating a threshold vault - Google Patents
Computer-implemented method of generating a threshold vaultInfo
- Publication number
- SG11202000808WA SG11202000808WA SG11202000808WA SG11202000808WA SG11202000808WA SG 11202000808W A SG11202000808W A SG 11202000808WA SG 11202000808W A SG11202000808W A SG 11202000808WA SG 11202000808W A SG11202000808W A SG 11202000808WA SG 11202000808W A SG11202000808W A SG 11202000808WA
- Authority
- SG
- Singapore
- Prior art keywords
- generating
- computer
- implemented method
- threshold vault
- vault
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Optimization (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Algebra (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Saccharide Compounds (AREA)
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1713064.2A GB201713064D0 (en) | 2017-08-15 | 2017-08-15 | Computer-implemented methods and systems |
IB2017054961 | 2017-08-15 | ||
IB2017055497 | 2017-09-12 | ||
GBGB1714660.6A GB201714660D0 (en) | 2017-08-15 | 2017-09-12 | Computer-implemented methods and systems |
IB2017057782 | 2017-12-11 | ||
PCT/IB2018/055604 WO2019034951A1 (en) | 2017-08-15 | 2018-07-26 | METHOD AND SYSTEM FOR DIGITAL THRESHOLD SIGNATURE |
PCT/IB2018/056094 WO2019034986A1 (en) | 2017-08-15 | 2018-08-13 | METHOD USED BY DISTRIBUTED SAFE GENERATION COMPUTER |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202000808WA true SG11202000808WA (en) | 2020-02-27 |
Family
ID=67702926
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202000808WA SG11202000808WA (en) | 2017-08-15 | 2018-08-13 | Computer-implemented method of generating a threshold vault |
Country Status (7)
Country | Link |
---|---|
US (2) | US11381389B2 (ja) |
EP (2) | EP3669491B1 (ja) |
JP (2) | JP7202358B2 (ja) |
KR (2) | KR102627049B1 (ja) |
SG (1) | SG11202000808WA (ja) |
TW (2) | TWI822693B (ja) |
WO (1) | WO2019034986A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116760547A (zh) * | 2023-08-21 | 2023-09-15 | 湖南湘江树图信息科技创新中心有限公司 | 分布式私钥管理方法及系统 |
CN116865957A (zh) * | 2023-07-04 | 2023-10-10 | 北京邮电大学 | 一种量子安全多方计算系统 |
Families Citing this family (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11050745B2 (en) * | 2015-08-26 | 2021-06-29 | Nec Corporation | Information processing apparatus, authentication method, and recording medium for recording computer program |
US10505723B1 (en) | 2017-04-26 | 2019-12-10 | Wells Fargo Bank, N.A. | Secret sharing information management and security system |
US20200304293A1 (en) | 2017-08-30 | 2020-09-24 | Inpher, Inc. | High-Precision Privacy-Preserving Real-Valued Function Evaluation |
GB2576081A (en) * | 2018-06-03 | 2020-02-05 | Vvow Company Ltd | Peer-to-peer cryptocurrency and crypto asset trading platform |
WO2020123926A1 (en) * | 2018-12-13 | 2020-06-18 | Login Id Inc. | Decentralized computing systems and methods for performing actions using stored private data |
EP3696670A1 (en) * | 2019-02-13 | 2020-08-19 | UVUE Limited | Distributed computation system and method of operation thereof |
JP2022523182A (ja) * | 2019-02-22 | 2022-04-21 | インファー,インク. | モジュラー整数を使用したセキュアなマルチパーティ計算のための算術 |
US10892891B2 (en) * | 2019-03-13 | 2021-01-12 | Digital 14 Llc | System, method, and computer program product for zero round trip secure communications based on two noisy secrets |
US10951415B2 (en) * | 2019-03-13 | 2021-03-16 | Digital 14 Llc | System, method, and computer program product for implementing zero round trip secure communications based on noisy secrets with a polynomial secret sharing scheme |
US11451406B2 (en) * | 2019-04-04 | 2022-09-20 | Moac Blockchain Tech Inc | Cross-chain messaging and message validation |
US11646877B2 (en) * | 2019-05-14 | 2023-05-09 | Samsung Sds Co., Ltd. | Apparatus and method for generating secret key, apparatus and method for generating evaluation key |
GB2584154A (en) | 2019-05-24 | 2020-11-25 | Nchain Holdings Ltd | Knowledge proof |
US10790990B2 (en) * | 2019-06-26 | 2020-09-29 | Alibaba Group Holding Limited | Ring signature-based anonymous transaction |
CN110457936B (zh) * | 2019-07-01 | 2020-08-14 | 阿里巴巴集团控股有限公司 | 数据交互方法、装置和电子设备 |
CN112543103A (zh) * | 2019-09-23 | 2021-03-23 | 百度在线网络技术(北京)有限公司 | 账户地址的生成方法和校验方法、装置、设备和介质 |
CN111064557A (zh) * | 2019-12-25 | 2020-04-24 | 杭州安司源科技有限公司 | 一种分布式托管的数字货币门限签名密钥分发方法 |
CN113129001B (zh) * | 2019-12-31 | 2023-02-17 | 上海证锘信息科技有限公司 | 面向区块链跨链和资产托管的抗量子攻击门限签名方法 |
GB2597123B (en) * | 2020-05-14 | 2023-08-30 | Hung Hung Chiu | A method for creating a hierarchical threshold signature digital asset wallet |
CN113746623B (zh) * | 2020-05-28 | 2023-03-24 | 华为技术有限公司 | 一种门限密钥验证方法及相关设备 |
US11621834B2 (en) * | 2020-06-15 | 2023-04-04 | Acronis International Gmbh | Systems and methods for preserving data integrity when integrating secure multiparty computation and blockchain technology |
GB2597539A (en) * | 2020-07-28 | 2022-02-02 | Nchain Holdings Ltd | Generating shared private keys |
EP3955110A1 (en) | 2020-08-12 | 2022-02-16 | UVUE Limited | Distributed computing system and method of operation thereof |
GB2598112A (en) * | 2020-08-18 | 2022-02-23 | Nchain Holdings Ltd | Threshold signatures |
GB2600684A (en) * | 2020-10-28 | 2022-05-11 | Nchain Holdings Ltd | Identifying denial-of-service attacks |
CN112635010B (zh) * | 2020-12-28 | 2023-07-07 | 扬州大学 | 基于双区块链的边缘计算下数据存储与共享方法 |
CN112906038B (zh) * | 2021-03-26 | 2023-04-07 | 成都卫士通信息产业股份有限公司 | 基于sm9密钥的门限化处理方法、装置、设备及存储介质 |
CN113438070B (zh) * | 2021-05-25 | 2023-07-21 | 中国科学院计算技术研究所 | 基于capss的区块链密钥恢复方法及系统 |
CN113569261B (zh) * | 2021-07-30 | 2024-05-14 | 华北电力科学研究院有限责任公司 | 一种电网数据的处理方法、装置、电子设备和存储介质 |
GB2612310A (en) * | 2021-10-26 | 2023-05-03 | Nchain Licensing Ag | Generating shared keys |
GB2612309A (en) * | 2021-10-26 | 2023-05-03 | Nchain Licensing Ag | Threshold signature scheme |
US20240048382A1 (en) * | 2022-08-03 | 2024-02-08 | 1080 Network, Llc | Systems, methods, and computing platforms for executing credential-less network-based communication exchanges |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5764767A (en) | 1996-08-21 | 1998-06-09 | Technion Research And Development Foundation Ltd. | System for reconstruction of a secret shared by a plurality of participants |
US6363481B1 (en) | 1998-08-03 | 2002-03-26 | Nortel Networks Limited | Method and apparatus for secure data storage using distributed databases |
JP3560860B2 (ja) | 1999-07-23 | 2004-09-02 | 株式会社東芝 | 秘密分散システム、装置及び記憶媒体 |
JP4292835B2 (ja) | 2003-03-13 | 2009-07-08 | 沖電気工業株式会社 | 秘密再構成方法、分散秘密再構成装置、及び秘密再構成システム |
CN101425902A (zh) * | 2008-11-12 | 2009-05-06 | 电子科技大学 | 一个具有前向安全的门限数字签名方法与系统 |
US20110213975A1 (en) | 2010-03-01 | 2011-09-01 | Alessandro Sorniotti | Secret interest groups in online social networks |
US8874991B2 (en) | 2011-04-01 | 2014-10-28 | Cleversafe, Inc. | Appending data to existing data stored in a dispersed storage network |
KR101574871B1 (ko) | 2012-07-06 | 2015-12-04 | 엔이씨 유럽 리미티드 | 키 값 스토리지에 또는 그로부터 데이터를 저장하고 읽기 위한 방법 및 시스템 |
TW201424322A (zh) * | 2012-12-04 | 2014-06-16 | Cheng-Chung Lee | 驗證由簽章識別符所表示之數位簽章之裝置、系統及方法 |
US9450938B1 (en) | 2013-03-13 | 2016-09-20 | Hrl Laboratories, Llc | Information secure proactive multiparty computation (PMPC) protocol with linear bandwidth complexity |
US9489522B1 (en) * | 2013-03-13 | 2016-11-08 | Hrl Laboratories, Llc | Method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ECDSA) based digital signatures with proactive security |
US9350550B2 (en) * | 2013-09-10 | 2016-05-24 | M2M And Iot Technologies, Llc | Power management and security for wireless modules in “machine-to-machine” communications |
WO2015160839A1 (en) | 2014-04-17 | 2015-10-22 | Hrl Laboratories, Llc | A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security |
US10432409B2 (en) | 2014-05-05 | 2019-10-01 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
WO2016015141A1 (en) * | 2014-07-28 | 2016-02-04 | Infosec Global Inc. | System and method for cryptographic suite management |
US9813234B2 (en) | 2015-05-11 | 2017-11-07 | The United States of America, as represented by the Secretery of the Air Force | Transferable multiparty computation |
US9735958B2 (en) | 2015-05-19 | 2017-08-15 | Coinbase, Inc. | Key ceremony of a security system forming part of a host computer for cryptographic transactions |
BR112018016245A2 (pt) | 2016-02-23 | 2018-12-18 | Nchain Holdings Ltd | método, dispositivo e sistema para determinação de um segredo comum para o intercâmbio seguro de informações e chaves criptoógráficas, sistema para comunicação e programa de computador |
GB2561729A (en) * | 2016-02-23 | 2018-10-24 | Nchain Holdings Ltd | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
US10046228B2 (en) * | 2016-05-02 | 2018-08-14 | Bao Tran | Smart device |
US20170345011A1 (en) * | 2016-05-26 | 2017-11-30 | Hitfin, Inc. | System and method executed on a blockchain network |
WO2019072275A2 (en) * | 2018-11-27 | 2019-04-18 | Alibaba Group Holding Limited | SYSTEM AND METHOD FOR INFORMATION PROTECTION |
US10700850B2 (en) * | 2018-11-27 | 2020-06-30 | Alibaba Group Holding Limited | System and method for information protection |
-
2018
- 2018-08-13 KR KR1020207005181A patent/KR102627049B1/ko active IP Right Grant
- 2018-08-13 JP JP2020506804A patent/JP7202358B2/ja active Active
- 2018-08-13 EP EP18765195.5A patent/EP3669491B1/en active Active
- 2018-08-13 EP EP24150264.0A patent/EP4325770A3/en active Pending
- 2018-08-13 KR KR1020247001616A patent/KR20240011260A/ko active Application Filing
- 2018-08-13 SG SG11202000808WA patent/SG11202000808WA/en unknown
- 2018-08-13 WO PCT/IB2018/056094 patent/WO2019034986A1/en unknown
- 2018-08-13 US US16/639,099 patent/US11381389B2/en active Active
- 2018-08-14 TW TW107128337A patent/TWI822693B/zh active
- 2018-08-14 TW TW112136001A patent/TW202403575A/zh unknown
-
2022
- 2022-06-23 US US17/847,976 patent/US20230013158A1/en active Pending
- 2022-12-23 JP JP2022206111A patent/JP2023024683A/ja active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116865957A (zh) * | 2023-07-04 | 2023-10-10 | 北京邮电大学 | 一种量子安全多方计算系统 |
CN116760547A (zh) * | 2023-08-21 | 2023-09-15 | 湖南湘江树图信息科技创新中心有限公司 | 分布式私钥管理方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
JP2023024683A (ja) | 2023-02-16 |
TW202403575A (zh) | 2024-01-16 |
KR102627049B1 (ko) | 2024-01-19 |
JP2020532168A (ja) | 2020-11-05 |
EP3669491B1 (en) | 2024-02-07 |
CN110999207A (zh) | 2020-04-10 |
US11381389B2 (en) | 2022-07-05 |
EP3669491A1 (en) | 2020-06-24 |
EP4325770A2 (en) | 2024-02-21 |
TWI822693B (zh) | 2023-11-21 |
KR20200035280A (ko) | 2020-04-02 |
WO2019034986A1 (en) | 2019-02-21 |
US20200213099A1 (en) | 2020-07-02 |
US20230013158A1 (en) | 2023-01-19 |
KR20240011260A (ko) | 2024-01-25 |
TW201921888A (zh) | 2019-06-01 |
EP4325770A3 (en) | 2024-04-24 |
JP7202358B2 (ja) | 2023-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202000808WA (en) | Computer-implemented method of generating a threshold vault | |
PL3490395T3 (pl) | Sposób wytwarzania aerozolu | |
PL3448674T3 (pl) | Element fornirowany i sposób wytwarzania takiego elementu fornirowanego | |
GB2522494B (en) | Perforating gun assembly and method of forming wellbore perfortions | |
GB201703847D0 (en) | Curable composition and resing for treatment of a subterranean formation | |
EP3426748A4 (en) | METHOD FOR INCREASING THE DENSITY OF A BOROID TREATMENT OIL | |
GB2548555B (en) | A method of redatuming geophysical data | |
GB2542317B (en) | Reverse cementation of liner string for formation stimulation | |
GB2575408B (en) | A banknote and a method of producing a banknote | |
GB2562198B (en) | Method of forming a security document | |
GB201718895D0 (en) | A method of generating training data | |
GB201522544D0 (en) | Method of forming a closure | |
PL3242801T3 (pl) | Sposób wytwarzania elementu zabezpieczającego oraz element zabezpieczający | |
HK1257292A1 (zh) | 產生地理參照平面圖的方法 | |
TWI563099B (en) | A plated steel and a method of producing thereof | |
EP3497875C0 (en) | METHOD FOR GENERATING A SECURE RECORDING OF A CONVERSATION | |
PL3177781T3 (pl) | Belka i sposób produkcji takiej belki | |
GB201521886D0 (en) | A method of treating a well | |
IL246869A0 (en) | Preassembly and method for inserting intracardiac devices | |
GB201501940D0 (en) | A method of forming a closure | |
GB2530805B (en) | A method of colouring titanium or titanium alloy | |
GB201805448D0 (en) | Computer-implemented method | |
ZA201803802B (en) | Method of forming a closure member | |
GB201721461D0 (en) | Computer-implemented methods of evaluating | |
GB201615934D0 (en) | A method of combining data |