SG11202002920VA - Managing blockchain-based centralized ledger systems - Google Patents
Managing blockchain-based centralized ledger systemsInfo
- Publication number
- SG11202002920VA SG11202002920VA SG11202002920VA SG11202002920VA SG11202002920VA SG 11202002920V A SG11202002920V A SG 11202002920VA SG 11202002920V A SG11202002920V A SG 11202002920VA SG 11202002920V A SG11202002920V A SG 11202002920VA SG 11202002920V A SG11202002920V A SG 11202002920VA
- Authority
- SG
- Singapore
- Prior art keywords
- centralized ledger
- based centralized
- ledger systems
- managing blockchain
- blockchain
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
- G06F21/725—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits operating on a secure reference time value
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/121—Timestamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- General Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Power Engineering (AREA)
- Technology Law (AREA)
- Mathematical Physics (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Economics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/104068 WO2021042247A1 (en) | 2019-09-02 | 2019-09-02 | Managing blockchain-based centralized ledger systems |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202002920VA true SG11202002920VA (en) | 2021-04-29 |
Family
ID=70427400
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202002920VA SG11202002920VA (en) | 2019-09-02 | 2019-09-02 | Managing blockchain-based centralized ledger systems |
Country Status (6)
Country | Link |
---|---|
US (2) | US10749696B1 (en) |
EP (1) | EP3808030B1 (en) |
CN (2) | CN111108526B (en) |
SG (1) | SG11202002920VA (en) |
TW (1) | TWI736349B (en) |
WO (1) | WO2021042247A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019228559A2 (en) * | 2019-09-02 | 2019-12-05 | Alibaba Group Holding Limited | Managing blockchain-based centralized ledger systems |
EP3834157B1 (en) | 2020-04-22 | 2023-09-13 | Alipay (Hangzhou) Information Technology Co., Ltd. | Managing transaction requests in ledger systems |
WO2020143855A2 (en) | 2020-04-22 | 2020-07-16 | Alipay (Hangzhou) Information Technology Co., Ltd. | Managing transaction requests in ledger systems |
CN111656386B (en) | 2020-04-22 | 2022-05-17 | 支付宝(杭州)信息技术有限公司 | Managing transaction requests in ledger system |
TWI824173B (en) * | 2020-08-26 | 2023-12-01 | 中華電信股份有限公司 | A method of mixing public blockchains with private blockchains and computer readable medium |
CN112669023A (en) * | 2021-02-03 | 2021-04-16 | 三和智控(北京)系统集成有限公司 | Method and device for constructing credit coupon system or digital currency system |
Family Cites Families (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6182139B1 (en) * | 1996-08-05 | 2001-01-30 | Resonate Inc. | Client-side resource-based load-balancing with delayed-resource-binding using TCP state migration to WWW server farm |
US6823456B1 (en) | 1999-08-25 | 2004-11-23 | International Business Machines Corporation | System and method for providing trusted services via trusted server agents |
US20020107811A1 (en) * | 2000-01-07 | 2002-08-08 | Sandeep Jain | Use of time-stamps and digital signatures |
US8843645B2 (en) * | 2010-06-24 | 2014-09-23 | Citrix Systems, Inc. | Systems and methods for detecting incomplete requests, TCP timeouts and application timeouts |
US9294479B1 (en) | 2010-12-01 | 2016-03-22 | Google Inc. | Client-side authentication |
US10382512B2 (en) * | 2013-03-14 | 2019-08-13 | Microsoft Technology Licensing, Llc | Distributed fragment timestamp synchronization |
US10713686B2 (en) * | 2014-03-22 | 2020-07-14 | Retailmenot, Inc. | Peer-to-peer geotargeting content with ad-hoc mesh networks |
US9614682B2 (en) | 2014-04-11 | 2017-04-04 | Guardtime IP Holdings, Ltd. | System and method for sequential data signatures |
US10680833B2 (en) * | 2016-02-26 | 2020-06-09 | Apple Inc. | Obtaining and using time information on a secure element (SE) |
US10305694B2 (en) | 2016-05-27 | 2019-05-28 | Mastercard International Incorporated | Method and system for efficient distribution of configuration data utilizing permissioned blockchain technology |
US11829998B2 (en) | 2016-06-07 | 2023-11-28 | Cornell University | Authenticated data feed for blockchains |
US10108954B2 (en) | 2016-06-24 | 2018-10-23 | PokitDok, Inc. | System and method for cryptographically verified data driven contracts |
US10581847B1 (en) * | 2016-09-27 | 2020-03-03 | Amazon Technologies, Inc. | Blockchain-backed device and user provisioning |
AU2017340266B2 (en) | 2016-10-06 | 2020-06-18 | Mastercard International Incorporated | Method and system for identity and credential protection and verification via blockchain |
US11139957B2 (en) * | 2016-12-08 | 2021-10-05 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for creating a finite blockchain |
WO2018178750A1 (en) | 2017-03-31 | 2018-10-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and systems for enabling a reliable flight recorder system in unmanned traffic management systems |
US10102526B1 (en) | 2017-03-31 | 2018-10-16 | Vijay K. Madisetti | Method and system for blockchain-based combined identity, ownership, integrity and custody management |
US10419209B1 (en) * | 2017-04-26 | 2019-09-17 | Wells Fargo Bank, N.A. | Parallel assurance of blockchain signatures |
US20180374094A1 (en) * | 2017-06-22 | 2018-12-27 | Mastercard International Incorporated | Method and system for indexing consumer enrollment using blockchain |
EP3425845A1 (en) * | 2017-07-05 | 2019-01-09 | Siemens Aktiengesellschaft | Method and device for generating a cryptographic timestamp for a digital document on a majority basis |
CN107612695A (en) * | 2017-07-31 | 2018-01-19 | 深圳市科迈爱康科技有限公司 | Knowledge management method, terminal and server based on block chain |
CN107480990B (en) * | 2017-08-01 | 2021-02-26 | 中国联合网络通信集团有限公司 | Block chain accounting method and device |
US10528551B2 (en) * | 2017-09-29 | 2020-01-07 | Oracle International Corporation | System and method for providing a representational state transfer proxy service for a blockchain cloud service |
US11075744B2 (en) | 2017-11-20 | 2021-07-27 | Acronis International Gmbh | Blockchain-based media content authentication methods and systems |
US11468444B2 (en) * | 2017-12-18 | 2022-10-11 | Mastercard International Incorporated | Method and system for bypassing merchant systems to increase data security in conveyance of credentials |
CN108418795B (en) * | 2018-01-30 | 2019-05-28 | 百度在线网络技术(北京)有限公司 | Data access method, device, system and the computer-readable medium of transregional piece of chain |
US20190238316A1 (en) * | 2018-01-31 | 2019-08-01 | Salesforce.Com, Inc. | Systems, methods, and apparatuses for implementing intelligent consensus, smart consensus, and weighted consensus models for distributed ledger technologies in a cloud based computing environment |
TW201935299A (en) * | 2018-02-12 | 2019-09-01 | 林俊良 | Blockchain system, node server and method for processing strategy model scripts of financial assets |
US10554412B2 (en) * | 2018-03-06 | 2020-02-04 | Robust Analytics, Inc. | Method and network to implement decentralized validation and authentication mechanisms to prevent ADS-B cyber-attacks |
CN108768630B (en) | 2018-05-25 | 2021-02-12 | 全链通有限公司 | Encryption communication method and system for block chain node |
US10887081B2 (en) * | 2018-06-28 | 2021-01-05 | International Business Machines Corporation | Audit trail configuration in a blockchain |
CN108881253B (en) * | 2018-06-29 | 2020-11-06 | 全链通有限公司 | Block chain real name participation method and system |
US10691648B2 (en) * | 2018-07-03 | 2020-06-23 | International Business Machines Corporation | Controlling volatility via blockchain |
CN109086626B (en) * | 2018-08-09 | 2021-07-09 | 全链通有限公司 | Accounting method and system of block chain network |
CN109102287B (en) * | 2018-08-13 | 2021-09-07 | 中国联合网络通信集团有限公司 | Block chain accounting method, device, equipment and storage medium |
US10764070B2 (en) * | 2018-08-30 | 2020-09-01 | International Business Machines Corporation | High precision timestamps in blockchain |
US10833845B2 (en) * | 2018-08-30 | 2020-11-10 | International Business Machines Corporation | Guarantee of ledger immutability |
US10819523B2 (en) * | 2018-08-30 | 2020-10-27 | International Business Machines Corporation | Guarantee of ledger immutability |
US20200082349A1 (en) * | 2018-09-07 | 2020-03-12 | Adp, Llc | Blockchain Timeclock System |
US10608829B1 (en) * | 2018-10-08 | 2020-03-31 | International Business Machines Corporation | Blockchain timestamp agreement |
US20200119906A1 (en) * | 2018-10-15 | 2020-04-16 | Salesforce.Com, Inc. | Systems, methods, and apparatuses for information isolation using a distributed ledger accessible by a cloud based computing environment |
CN109450638B (en) | 2018-10-23 | 2021-11-02 | 国科赛思(北京)科技有限公司 | Block chain-based electronic component data management system and method |
CN109815748B (en) * | 2019-01-24 | 2020-12-18 | 黄冈 | Central data source monitoring method based on block chain |
CN109840771A (en) * | 2019-04-01 | 2019-06-04 | 西安电子科技大学 | A kind of block chain intimacy protection system and its method based on homomorphic cryptography |
CN110601849B (en) | 2019-08-21 | 2021-05-11 | 腾讯科技(深圳)有限公司 | Trusted timestamp adding method and device and storage medium |
-
2019
- 2019-09-02 CN CN201980004526.8A patent/CN111108526B/en active Active
- 2019-09-02 EP EP19858712.3A patent/EP3808030B1/en active Active
- 2019-09-02 SG SG11202002920VA patent/SG11202002920VA/en unknown
- 2019-09-02 CN CN202410352978.8A patent/CN118195611A/en active Pending
- 2019-09-02 WO PCT/CN2019/104068 patent/WO2021042247A1/en unknown
- 2019-12-13 US US16/713,841 patent/US10749696B1/en active Active
-
2020
- 2020-07-06 TW TW109122768A patent/TWI736349B/en active
- 2020-07-09 US US16/925,123 patent/US10904017B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP3808030A4 (en) | 2021-04-21 |
US20200344078A1 (en) | 2020-10-29 |
CN111108526A (en) | 2020-05-05 |
EP3808030B1 (en) | 2022-05-04 |
TW202111627A (en) | 2021-03-16 |
CN118195611A (en) | 2024-06-14 |
WO2021042247A1 (en) | 2021-03-11 |
US10749696B1 (en) | 2020-08-18 |
CN111108526B (en) | 2024-04-12 |
US10904017B2 (en) | 2021-01-26 |
EP3808030A1 (en) | 2021-04-21 |
TWI736349B (en) | 2021-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202002029VA (en) | Managing blockchain-based centralized ledger systems | |
SG11202002911UA (en) | Managing blockchain-based centralized ledger systems | |
SG11202002467TA (en) | Managing blockchain-based centralized ledger systems | |
SG11202002734SA (en) | Managing blockchain-based centralized ledger systems | |
SG11202002920VA (en) | Managing blockchain-based centralized ledger systems | |
GB202106928D0 (en) | Transaction management system | |
SG11202100791UA (en) | Cross-blockchain interaction systems | |
EP3850781A4 (en) | Fact management system | |
EP3903268A4 (en) | Blockchain management system | |
SG11202103499PA (en) | Event management system | |
GB202114696D0 (en) | Managing software programes | |
GB2576160B (en) | Distributed ledger system | |
EP3672236A4 (en) | Worker management system | |
EP3706693A4 (en) | A system for managing incontinence | |
SG11202010205SA (en) | Managing trust points in ledger systems | |
SG11202108335RA (en) | Management system | |
EP3847569A4 (en) | Management system | |
IL289938A (en) | Systems and methods for managing interaction invitations | |
EP3915077A4 (en) | Booking management system | |
GB202016701D0 (en) | Automatic pre-slaughter management system | |
GB201517299D0 (en) | Methods and systems for reserving a transmission opportunity for a collaborative group, and managing the reserved transmission opportunity | |
IL279652A (en) | Valuables management system | |
GB201900480D0 (en) | Network management | |
IL289480A (en) | Home stock management system | |
SG10202103716PA (en) | Managing blockchain-based centralized ledger systems |