SG11202005570XA - Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords - Google Patents
Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwordsInfo
- Publication number
- SG11202005570XA SG11202005570XA SG11202005570XA SG11202005570XA SG11202005570XA SG 11202005570X A SG11202005570X A SG 11202005570XA SG 11202005570X A SG11202005570X A SG 11202005570XA SG 11202005570X A SG11202005570X A SG 11202005570XA SG 11202005570X A SG11202005570X A SG 11202005570XA
- Authority
- SG
- Singapore
- Prior art keywords
- authorising
- computer
- methods
- low
- blockchain transactions
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/26—Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Mathematical Optimization (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Pure & Applied Mathematics (AREA)
- Power Engineering (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB201721049 | 2017-12-15 | ||
PCT/IB2018/059921 WO2019116249A1 (en) | 2017-12-15 | 2018-12-12 | Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202005570XA true SG11202005570XA (en) | 2020-07-29 |
Family
ID=65013745
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202005570XA SG11202005570XA (en) | 2017-12-15 | 2018-12-12 | Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords |
Country Status (8)
Country | Link |
---|---|
US (2) | US11429956B2 (ja) |
EP (2) | EP3725029B1 (ja) |
JP (2) | JP7289298B2 (ja) |
KR (1) | KR20200099149A (ja) |
CN (1) | CN111480315B (ja) |
SG (1) | SG11202005570XA (ja) |
WO (1) | WO2019116249A1 (ja) |
ZA (1) | ZA202004320B (ja) |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11238450B2 (en) * | 2016-12-21 | 2022-02-01 | Nchain Licensing Ag | Computer-implemented systems and methods to enable complex functionality on a blockchain while preserving security-based restrictions on script size and opcode limits |
GB201701589D0 (en) | 2017-01-31 | 2017-03-15 | Nchain Holdings Ltd | Computer-implemented system and method |
EP3725029B1 (en) * | 2017-12-15 | 2023-07-12 | nChain Licensing AG | Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords |
US11188897B2 (en) * | 2018-02-13 | 2021-11-30 | Bank Of America Corporation | Multi-tiered digital wallet security |
US11995648B2 (en) * | 2018-03-23 | 2024-05-28 | Nchain Licensing Ag | Computer-implemented system and method for enabling zero-knowledge proof |
SG11202010346TA (en) | 2018-05-14 | 2020-11-27 | Nchain Holdings Ltd | Computer-implemented systems and methods for using a blockchain to perform an atomic swap |
EP3671599A1 (de) * | 2018-12-21 | 2020-06-24 | Siemens Aktiengesellschaft | Verfahren zum betreiben eines verteilten datenbanksystems, verteiltes datenbanksystem und industrieautomatisierungssystem |
GB2585010B (en) * | 2019-06-24 | 2022-07-13 | Blockstar Developments Ltd | Cryptocurrency key management |
CN112418862A (zh) * | 2019-06-26 | 2021-02-26 | 创新先进技术有限公司 | 采用环签名的机密区块链交易的实现方法及装置 |
US11238447B2 (en) | 2019-06-26 | 2022-02-01 | Advanced New Technologies Co., Ltd. | Blockchain transactions with ring signatures |
US10790990B2 (en) | 2019-06-26 | 2020-09-29 | Alibaba Group Holding Limited | Ring signature-based anonymous transaction |
CN112488703A (zh) * | 2019-06-26 | 2021-03-12 | 创新先进技术有限公司 | 基于环签名的匿名交易方法及装置 |
CN110544167B (zh) * | 2019-07-25 | 2022-03-01 | 晋商博创(北京)科技有限公司 | 基于cpk的联盟链的数据处理方法、服务器及存储介质 |
CN110519059B (zh) * | 2019-09-29 | 2023-05-05 | 四川师范大学 | 一种基于双线性映射的区块链双密钥隐匿地址处理方法 |
CN111160905B (zh) * | 2019-12-17 | 2023-07-18 | 浙江大学 | 一种区块链节点用户请求处理保护方法及装置 |
CN111371558B (zh) * | 2020-02-26 | 2024-01-16 | 百度在线网络技术(北京)有限公司 | 区块链数据处理方法、装置、电子设备及介质 |
US11424911B2 (en) * | 2020-03-03 | 2022-08-23 | International Business Machines Corporation | Storage and communication environment for cryptographic tags |
CN111309711A (zh) * | 2020-03-13 | 2020-06-19 | 财付通支付科技有限公司 | 跨区块链的数据迁移方法、装置、设备及存储介质 |
US11087016B1 (en) * | 2020-08-20 | 2021-08-10 | Spideroak, Inc. | Implementation of a file system on a block chain |
CN112241553B (zh) * | 2020-10-27 | 2022-11-04 | 上海万向区块链股份公司 | 一种基于多账本架构的区块链隐私保护方法及系统 |
CN112636929B (zh) * | 2020-12-29 | 2023-01-17 | 北京百度网讯科技有限公司 | 群组业务实现方法、装置、设备和存储介质 |
CN113393225B (zh) * | 2021-06-30 | 2022-10-28 | 杭州链网科技有限公司 | 数字货币加密支付方法及系统 |
CN113538140A (zh) * | 2021-07-05 | 2021-10-22 | 杭州宇链科技有限公司 | 一种基于可信执行环境与门限签名的数据交易方法 |
US11538027B1 (en) * | 2021-07-07 | 2022-12-27 | Ava Labs, Inc. | Secure and trustworthy bridge for transferring assets across different networks with an updating pool of wardens |
US11677552B2 (en) * | 2021-09-09 | 2023-06-13 | Coinbase Il Rd Ltd. | Method for preventing misuse of a cryptographic key |
WO2023238172A1 (ja) * | 2022-06-06 | 2023-12-14 | 日本電信電話株式会社 | 鍵発行システム、鍵発行方法、およびプログラム |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101483523A (zh) | 2002-04-15 | 2009-07-15 | 株式会社Ntt都科摩 | 利用双线性映射的签名方案 |
US9240884B2 (en) * | 2003-10-28 | 2016-01-19 | Certicom Corp. | Method and apparatus for verifiable generation of public keys |
US20060153364A1 (en) | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Asymmetric key cryptosystem based on shared knowledge |
KR100718687B1 (ko) * | 2005-12-23 | 2007-05-15 | 학교법인 대전기독학원 한남대학교 | 겹선형 쌍 함수를 이용한 아이디 기반의 문턱 서명 방법 |
US9489522B1 (en) * | 2013-03-13 | 2016-11-08 | Hrl Laboratories, Llc | Method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ECDSA) based digital signatures with proactive security |
GB201309702D0 (en) * | 2013-05-30 | 2013-07-17 | Certivox Ltd | Security |
WO2015160839A1 (en) * | 2014-04-17 | 2015-10-22 | Hrl Laboratories, Llc | A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security |
EP3134849A4 (en) * | 2014-04-23 | 2017-11-22 | Signpass Ltd. | Methods and systems for signature analysis and authentication |
EP2975570A1 (de) | 2014-07-17 | 2016-01-20 | draglet GmbH | Verfahren und eine Vorrichtung zur Absicherung von Zugriffen auf Wallets in denen Kryptowährungen abgelegt sind |
WO2016049406A1 (en) * | 2014-09-26 | 2016-03-31 | Technicolor Usa, Inc. | Method and apparatus for secure non-interactive threshold signatures |
US9830480B2 (en) * | 2015-05-27 | 2017-11-28 | Google Llc | Policies for secrets in trusted execution environments |
WO2017001972A1 (en) | 2015-06-30 | 2017-01-05 | Raghav Bhaskar | User friendly two factor authentication |
US9948467B2 (en) * | 2015-12-21 | 2018-04-17 | Mastercard International Incorporated | Method and system for blockchain variant using digital signatures |
US9565020B1 (en) | 2016-02-02 | 2017-02-07 | International Business Machines Corporation | System and method for generating a server-assisted strong password from a weak secret |
AU2017225932C1 (en) | 2016-02-29 | 2021-06-24 | Securekey Technologies Inc. | Systems and methods for distributed identity verification |
US9800411B1 (en) * | 2016-05-05 | 2017-10-24 | ISARA Corporation | Using a secret generator in an elliptic curve cryptography (ECC) digital signature scheme |
US11361316B2 (en) | 2016-06-06 | 2022-06-14 | Refinitiv Us Organization Llc | Systems and methods for providing a personal distributed ledger |
US10681038B1 (en) * | 2016-10-26 | 2020-06-09 | Marvell Asia Pte, Ltd. | Systems and methods for efficient password based public key authentication |
CN106357401B (zh) * | 2016-11-11 | 2019-09-10 | 武汉理工大学 | 一种私钥存储及使用方法 |
CN110574059A (zh) * | 2017-04-11 | 2019-12-13 | 区块链控股有限公司 | 关于区块链的快速分布式共识 |
GB201707168D0 (en) * | 2017-05-05 | 2017-06-21 | Nchain Holdings Ltd | Computer-implemented system and method |
WO2018229632A1 (en) * | 2017-06-14 | 2018-12-20 | nChain Holdings Limited | Systems and methods for addressing security-related vulnerabilities arising in relation to off-blockchain channels in the event of failures in a network |
CN107395367B (zh) * | 2017-08-08 | 2020-08-04 | 三峡大学 | 一种基于量子密钥的群签名系统 |
CN113765657B (zh) | 2017-08-28 | 2023-10-24 | 创新先进技术有限公司 | 一种密钥数据处理方法、装置及服务器 |
CN107483205B (zh) * | 2017-09-28 | 2019-08-20 | 武汉理工大学 | 一种基于加密的私钥秘密的数字签名生成方法及系统 |
CN107623569A (zh) | 2017-09-30 | 2018-01-23 | 矩阵元技术(深圳)有限公司 | 基于秘密共享技术的区块链密钥托管和恢复方法、装置 |
EP3725029B1 (en) * | 2017-12-15 | 2023-07-12 | nChain Licensing AG | Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords |
-
2018
- 2018-12-12 EP EP18833524.4A patent/EP3725029B1/en active Active
- 2018-12-12 WO PCT/IB2018/059921 patent/WO2019116249A1/en unknown
- 2018-12-12 KR KR1020207018322A patent/KR20200099149A/ko not_active Application Discontinuation
- 2018-12-12 CN CN201880081063.0A patent/CN111480315B/zh active Active
- 2018-12-12 US US16/954,173 patent/US11429956B2/en active Active
- 2018-12-12 SG SG11202005570XA patent/SG11202005570XA/en unknown
- 2018-12-12 EP EP23163414.8A patent/EP4235479A1/en active Pending
- 2018-12-12 JP JP2020531067A patent/JP7289298B2/ja active Active
-
2020
- 2020-07-14 ZA ZA2020/04320A patent/ZA202004320B/en unknown
-
2022
- 2022-08-29 US US17/898,260 patent/US20230131970A1/en active Pending
-
2023
- 2023-05-30 JP JP2023088572A patent/JP2023109981A/ja active Pending
Also Published As
Publication number | Publication date |
---|---|
JP2021507564A (ja) | 2021-02-22 |
EP4235479A1 (en) | 2023-08-30 |
US20210158342A1 (en) | 2021-05-27 |
ZA202004320B (en) | 2024-08-28 |
WO2019116249A1 (en) | 2019-06-20 |
US20230131970A1 (en) | 2023-04-27 |
EP3725029B1 (en) | 2023-07-12 |
CN111480315B (zh) | 2024-07-16 |
CN111480315A (zh) | 2020-07-31 |
KR20200099149A (ko) | 2020-08-21 |
JP7289298B2 (ja) | 2023-06-09 |
EP3725029A1 (en) | 2020-10-21 |
US11429956B2 (en) | 2022-08-30 |
JP2023109981A (ja) | 2023-08-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202005570XA (en) | Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords | |
IL289298A (en) | Decentralized transaction transfer and verification system | |
GB201806521D0 (en) | Computer-implemented methods and systems for validating tokens for blockchain-based cryptocurrencies | |
GB2550277B (en) | Computing devices having swiping interfaces and methods of operating the same | |
GB201715423D0 (en) | Computer-implemented system and method | |
GB201707168D0 (en) | Computer-implemented system and method | |
GB201707788D0 (en) | Computer-implemented system and method | |
GB201803815D0 (en) | Computer-implemented methods and systems | |
GB201613144D0 (en) | Computer-implemented method and system | |
EP3454762A4 (en) | METHODS AND SYSTEMS FOR LOCATING AND TREATING THROUGH COLD THERAPY | |
GB201721021D0 (en) | Computer-implemented methods and systems | |
GB201709518D0 (en) | Computer-implemented system and method | |
HK1231610A1 (zh) | 用於無卡式交易處理的系統和方法 | |
GB201703562D0 (en) | Computer-implemented system and method | |
GB201613174D0 (en) | Computer-implemented system and method | |
IL258453A (en) | Systems and methods to enable secure electronic transactions | |
GB201802063D0 (en) | Computer-implemented methods and systems | |
EP3284028A4 (en) | Dynamic transaction card with emv interface and method of manufacturing | |
GB201806448D0 (en) | Computer-implemented methods and systems | |
SG10201605433SA (en) | Computerized methods and computer systems for matching customers with merchants | |
EP3288963A4 (en) | Pink1 c-terminal domain polypeptide and methods using the same in cancer treatment | |
GB201714660D0 (en) | Computer-implemented methods and systems | |
GB201713064D0 (en) | Computer-implemented methods and systems | |
GB201806930D0 (en) | Computer-implemented systems and methods | |
GB201618230D0 (en) | Computer-implemented methods and systems |