SG11202005342UA - Blockchain-implemented security systems and methods for blinded outcome selection - Google Patents
Blockchain-implemented security systems and methods for blinded outcome selectionInfo
- Publication number
- SG11202005342UA SG11202005342UA SG11202005342UA SG11202005342UA SG11202005342UA SG 11202005342U A SG11202005342U A SG 11202005342UA SG 11202005342U A SG11202005342U A SG 11202005342UA SG 11202005342U A SG11202005342U A SG 11202005342UA SG 11202005342U A SG11202005342U A SG 11202005342UA
- Authority
- SG
- Singapore
- Prior art keywords
- blinded
- blockchain
- methods
- security systems
- implemented security
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1720389.4A GB201720389D0 (en) | 2017-12-07 | 2017-12-07 | Computer-implemented system and method |
PCT/IB2018/059555 WO2019111125A1 (en) | 2017-12-07 | 2018-12-03 | Blockchain-implemented security systems and methods for blinded outcome selection |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202005342UA true SG11202005342UA (en) | 2020-07-29 |
Family
ID=61007262
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202005342UA SG11202005342UA (en) | 2017-12-07 | 2018-12-03 | Blockchain-implemented security systems and methods for blinded outcome selection |
Country Status (8)
Country | Link |
---|---|
US (2) | US11728969B2 (ja) |
EP (2) | EP4195588A1 (ja) |
JP (3) | JP7231630B2 (ja) |
KR (1) | KR20200096241A (ja) |
CN (1) | CN111466098B (ja) |
GB (1) | GB201720389D0 (ja) |
SG (1) | SG11202005342UA (ja) |
WO (1) | WO2019111125A1 (ja) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11989208B2 (en) * | 2018-08-06 | 2024-05-21 | Inveniam Capital Partners, Inc. | Transactional sharding of blockchain transactions |
US11356276B2 (en) * | 2018-08-28 | 2022-06-07 | R&D 3 Llc | Digital data management |
CN110197433B (zh) * | 2018-10-25 | 2021-07-27 | 腾讯科技(深圳)有限公司 | 数值转移方法、装置及系统 |
US10790990B2 (en) | 2019-06-26 | 2020-09-29 | Alibaba Group Holding Limited | Ring signature-based anonymous transaction |
KR102654541B1 (ko) * | 2022-02-15 | 2024-04-05 | 한국전력공사 | 블록체인 네트워크의 트랜잭션 합의 방법 및 블록체인 노드 |
US11538028B1 (en) * | 2022-06-22 | 2022-12-27 | Alexei Dulub | Implementing non-fungible tokens using bitcoin |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100329448A1 (en) * | 2009-06-30 | 2010-12-30 | Rane Shantanu D | Method for Secure Evaluation of a Function Applied to Encrypted Signals |
US10423961B1 (en) * | 2014-02-19 | 2019-09-24 | Hrl Laboratories, Llc | System and method for operating a proactive digital currency ledger |
FR3018378A1 (fr) * | 2014-03-12 | 2015-09-11 | Enrico Maim | Systeme et procede transactionnels a architecture repartie fondees sur des transactions de transferts d'unites de compte entre adresses |
AU2015308608B2 (en) * | 2014-08-29 | 2019-07-04 | Visa International Service Association | Methods for secure cryptogram generation |
US20160300223A1 (en) * | 2015-04-08 | 2016-10-13 | Portable Data Corporation | Protected data transfer across disparate networks |
WO2017065209A1 (ja) * | 2015-10-16 | 2017-04-20 | 国立大学法人東北大学 | 情報処理システム、情報処理装置、情報処理方法、及び、プログラム |
AU2017223129A1 (en) * | 2016-02-23 | 2018-07-12 | nChain Holdings Limited | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
US20170244687A1 (en) * | 2016-02-24 | 2017-08-24 | Whitewood Encryption Systems, Inc. | Techniques for confidential delivery of random data over a network |
US11176584B2 (en) * | 2016-08-03 | 2021-11-16 | Raise Marketplace, Llc | Cross-brand redemption in an exchange item marketplace network |
CN106055993A (zh) * | 2016-08-13 | 2016-10-26 | 深圳市樊溪电子有限公司 | 一种用于区块链的加密存储系统及其使用方法 |
CN106788985A (zh) | 2016-11-25 | 2017-05-31 | 中国电子科技集团公司第三十研究所 | 一种第三方可监管的隐身地址实现方法 |
CN106790253A (zh) * | 2017-01-25 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | 基于区块链的认证方法和装置 |
CN107395349A (zh) * | 2017-08-16 | 2017-11-24 | 深圳国微技术有限公司 | 一种基于自认证公钥体制的区块链网络密钥分发方法 |
-
2017
- 2017-12-07 GB GBGB1720389.4A patent/GB201720389D0/en not_active Ceased
-
2018
- 2018-12-03 EP EP22209926.9A patent/EP4195588A1/en active Pending
- 2018-12-03 JP JP2020529414A patent/JP7231630B2/ja active Active
- 2018-12-03 KR KR1020207017368A patent/KR20200096241A/ko not_active Application Discontinuation
- 2018-12-03 WO PCT/IB2018/059555 patent/WO2019111125A1/en unknown
- 2018-12-03 US US16/770,387 patent/US11728969B2/en active Active
- 2018-12-03 CN CN201880079350.8A patent/CN111466098B/zh active Active
- 2018-12-03 SG SG11202005342UA patent/SG11202005342UA/en unknown
- 2018-12-03 EP EP18829482.1A patent/EP3721582B1/en active Active
-
2023
- 2023-02-16 JP JP2023022121A patent/JP7449423B2/ja active Active
- 2023-06-21 US US18/212,667 patent/US20230412358A1/en active Pending
-
2024
- 2024-03-01 JP JP2024031016A patent/JP2024059932A/ja active Pending
Also Published As
Publication number | Publication date |
---|---|
US20200389292A1 (en) | 2020-12-10 |
GB201720389D0 (en) | 2018-01-24 |
EP4195588A1 (en) | 2023-06-14 |
KR20200096241A (ko) | 2020-08-11 |
EP3721582A1 (en) | 2020-10-14 |
JP7231630B2 (ja) | 2023-03-01 |
WO2019111125A1 (en) | 2019-06-13 |
JP2024059932A (ja) | 2024-05-01 |
US11728969B2 (en) | 2023-08-15 |
JP7449423B2 (ja) | 2024-03-13 |
JP2021506151A (ja) | 2021-02-18 |
CN111466098A (zh) | 2020-07-28 |
US20230412358A1 (en) | 2023-12-21 |
CN111466098B (zh) | 2024-04-02 |
JP2023056011A (ja) | 2023-04-18 |
EP3721582B1 (en) | 2023-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IL283779A (en) | Systems and methods for preventing, alleviating and/or treating dementia | |
GB202110037D0 (en) | Security systems and methods | |
GB202002269D0 (en) | Methods and systems for ion manipulation | |
SG10201607277VA (en) | Method and system for access control | |
EP3500992A4 (en) | SYSTEMS AND METHODS FOR ADVANCED AUTHORIZATION RESPONSE | |
SG11202005342UA (en) | Blockchain-implemented security systems and methods for blinded outcome selection | |
GB2549371B (en) | Access authentication method and system | |
HK1258246A1 (zh) | 認證方法和系統 | |
ZA202007214B (en) | Systems and methods for encoder-guided adaptive-quality rendering | |
SG11201407621RA (en) | Security control system for granting access and security control method thereof | |
GB201712951D0 (en) | Systems and methods for selecting datasets | |
EP3391200A4 (en) | SYSTEMS, DEVICES AND PROCESSES FOR STEP-BY-STEP ACCESS | |
GB201813390D0 (en) | Systems and methods for muulti-factor authentication | |
GB2549270B (en) | Control systems and methods | |
GB201621176D0 (en) | Authentication systems and methods | |
GB201612706D0 (en) | Control systems and methods | |
IL261535B (en) | Controlled access system and method for this | |
IL257134B (en) | Systems and methods for multi-layer security of a communication network | |
GB2567564B (en) | Control systems and methods | |
EP3374236A4 (en) | SYSTEMS AND METHODS FOR CONTROLLING AIRBAGS | |
ZA201807673B (en) | Security system and method | |
GB201608976D0 (en) | Task control system and method | |
AU2016900263A0 (en) | Indirect security system and method | |
GB201509031D0 (en) | Authentication methods and systems | |
GB201509030D0 (en) | Authentication methods and systems |