SG11202007880PA - Computer implemented method and system for transferring control of a digital asset - Google Patents

Computer implemented method and system for transferring control of a digital asset

Info

Publication number
SG11202007880PA
SG11202007880PA SG11202007880PA SG11202007880PA SG11202007880PA SG 11202007880P A SG11202007880P A SG 11202007880PA SG 11202007880P A SG11202007880P A SG 11202007880PA SG 11202007880P A SG11202007880P A SG 11202007880PA SG 11202007880P A SG11202007880P A SG 11202007880PA
Authority
SG
Singapore
Prior art keywords
implemented method
computer implemented
digital asset
transferring control
transferring
Prior art date
Application number
SG11202007880PA
Inventor
Craig Steven Wright
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GBGB1803396.9A external-priority patent/GB201803396D0/en
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of SG11202007880PA publication Critical patent/SG11202007880PA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • G06Q2220/10Usage protection of distributed data files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2230/00Voting or election arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/463Electronic voting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
SG11202007880PA 2018-03-02 2019-02-19 Computer implemented method and system for transferring control of a digital asset SG11202007880PA (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
IB2018051338 2018-03-02
GBGB1803396.9A GB201803396D0 (en) 2018-03-02 2018-03-02 Computer implemented method and system
PCT/IB2019/051326 WO2019166915A1 (en) 2018-03-02 2019-02-19 Computer implemented method and system for transferring control of a digital asset

Publications (1)

Publication Number Publication Date
SG11202007880PA true SG11202007880PA (en) 2020-09-29

Family

ID=64560280

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202007880PA SG11202007880PA (en) 2018-03-02 2019-02-19 Computer implemented method and system for transferring control of a digital asset

Country Status (9)

Country Link
US (3) US11791992B2 (en)
EP (2) EP3759863A1 (en)
JP (4) JP7385580B2 (en)
KR (1) KR20200125980A (en)
CN (2) CN111788791A (en)
GB (1) GB201817506D0 (en)
SG (1) SG11202007880PA (en)
TW (1) TWI821248B (en)
WO (2) WO2019166915A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4062350A4 (en) * 2019-11-22 2024-03-06 Conio Inc Method and apparatus for a blockchain-agnostic safe multi-signature digital asset management
CN111600721B (en) * 2020-05-26 2023-06-16 牛津(海南)区块链研究院有限公司 Asset management system, method and device based on multi-person voting mechanism
CN112511314B (en) * 2020-11-26 2022-03-22 中国电子科技集团公司第五十四研究所 Recoverable message blind signature generation method based on identity
CN113037461B (en) * 2021-03-04 2022-06-07 西安电子科技大学 Multi-candidate anonymous electronic voting method based on homomorphic encryption
TWI776416B (en) * 2021-03-08 2022-09-01 英屬開曼群島商現代財富控股有限公司 Threshold signature scheme system for hierarchical deterministic wallet and method thereof
TWI759138B (en) * 2021-03-15 2022-03-21 英屬開曼群島商現代財富控股有限公司 Threshold signature scheme system based on inputting password and method thereof
CN115239333A (en) * 2021-04-23 2022-10-25 清华大学 Data processing method, device and storage medium
CN113726517A (en) * 2021-08-10 2021-11-30 北京信安世纪科技股份有限公司 Information sharing method and device
CN113704831B (en) * 2021-08-11 2023-11-03 北京天威诚信电子商务服务有限公司 Digital signature multiparty generation method and system without simultaneous online of participants

Family Cites Families (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6957331B2 (en) * 2000-01-14 2005-10-18 International Business Machines Corporation Method of achieving multiple processor agreement in asynchronous networks
US7359507B2 (en) 2000-03-10 2008-04-15 Rsa Security Inc. Server-assisted regeneration of a strong secret from a weak secret
JP2002217891A (en) * 2001-01-22 2002-08-02 Toshiba Corp Program and system for secrecy dispersion management
JP2005311623A (en) * 2004-04-20 2005-11-04 Matsushita Electric Ind Co Ltd System and method for electronic voting
JP2007058771A (en) * 2005-08-26 2007-03-08 Nec Corp Storage system, storage subsystem, and cache/duplication storing method
US7743253B2 (en) 2005-11-04 2010-06-22 Microsoft Corporation Digital signature for network coding
US20080052539A1 (en) * 2006-07-29 2008-02-28 Macmillan David M Inline storage protection and key devices
FR2930357A1 (en) * 2008-04-17 2009-10-23 Alcatel Lucent Sas ELECTRONIC VOTING METHOD, DECODER FOR CARRYING OUT SAID METHOD, AND NETWORK COMPRISING A VOTE SERVER FOR IMPLEMENTING THE METHOD.
US8189789B2 (en) * 2008-11-03 2012-05-29 Telcordia Technologies, Inc. Intrusion-tolerant group management for mobile ad-hoc networks
US8713329B2 (en) * 2009-02-26 2014-04-29 Red Hat, Inc. Authenticated secret sharing
US20110087745A1 (en) * 2009-10-14 2011-04-14 International Business Machines Corporation Group voting access control for multi-party forums
US8745415B2 (en) * 2012-09-26 2014-06-03 Pure Storage, Inc. Multi-drive cooperation to generate an encryption key
US9489522B1 (en) * 2013-03-13 2016-11-08 Hrl Laboratories, Llc Method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ECDSA) based digital signatures with proactive security
EP3132560A4 (en) 2014-04-17 2017-12-20 Hrl Laboratories, Llc A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security
GB2530726B (en) * 2014-09-25 2016-11-02 Ibm Distributed single sign-on
US10467389B2 (en) * 2015-01-15 2019-11-05 Secretskydbltd Secret shared random access machine
US9413735B1 (en) 2015-01-20 2016-08-09 Ca, Inc. Managing distribution and retrieval of security key fragments among proxy storage devices
US9641341B2 (en) * 2015-03-31 2017-05-02 Duo Security, Inc. Method for distributed trust authentication
US9735958B2 (en) 2015-05-19 2017-08-15 Coinbase, Inc. Key ceremony of a security system forming part of a host computer for cryptographic transactions
US9673975B1 (en) * 2015-06-26 2017-06-06 EMC IP Holding Company LLC Cryptographic key splitting for offline and online data protection
CA2991211C (en) * 2015-07-02 2024-02-20 Nasdaq, Inc. Systems and methods of secure provenance for distributed transaction databases
US20170213210A1 (en) 2016-01-22 2017-07-27 International Business Machines Corporation Asset transfers using a multi-tenant transaction database
PT3268914T (en) 2016-02-23 2018-10-11 Nchain Holdings Ltd Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
CN115641131A (en) 2016-02-23 2023-01-24 区块链控股有限公司 Method and system for secure transfer of entities over a blockchain
SG10202112185TA (en) 2016-02-23 2021-12-30 Nchain Holdings Ltd Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
US10237259B2 (en) 2016-02-29 2019-03-19 Securekey Technologies Inc. Systems and methods for distributed identity verification
US11057198B2 (en) 2016-03-04 2021-07-06 Assured Enterprises, Inc. Utilization of a proxy technique in escrow encryption key usage
CN105812369B (en) * 2016-03-15 2019-09-10 广东石油化工学院 A kind of traceable anonymous authentication method based on elliptic curve
GB201611948D0 (en) 2016-07-08 2016-08-24 Kalypton Int Ltd Distributed transcation processing and authentication system
CN107666388B (en) * 2016-07-28 2019-11-01 郑珂威 Block chain information encryption method based on complete homomorphic cryptography method
GB2538022B (en) 2016-08-20 2018-07-11 PQ Solutions Ltd Multiple secrets in quorum based data processing
CN106373251A (en) * 2016-08-30 2017-02-01 中科院成都信息技术股份有限公司 Electronic vote counting method based on secret sharing
CN106503994B (en) * 2016-11-02 2020-07-28 西安电子科技大学 Block chain private data access control method based on attribute encryption
CN106548345B (en) 2016-12-07 2020-08-21 北京信任度科技有限公司 Method and system for realizing block chain private key protection based on key partitioning
CN106533675A (en) 2016-12-19 2017-03-22 北京洋浦伟业科技发展有限公司 Digital signature method and system
CN106982205B (en) 2017-03-01 2020-05-19 中钞信用卡产业发展有限公司杭州区块链技术研究院 Block chain-based digital asset processing method and device
EP3379767B1 (en) * 2017-03-24 2021-01-13 Hewlett-Packard Development Company, L.P. Distributed authentication
WO2018231832A1 (en) * 2017-06-12 2018-12-20 PokitDok, Inc. System and method for autonomous dynamic person management
US10511436B1 (en) * 2017-07-31 2019-12-17 EMC IP Holding Company LLC Protecting key material using white-box cryptography and split key techniques
US10818121B2 (en) * 2017-09-15 2020-10-27 Panasonic Intellectual Property Corporation Of America Electronic voting system and control method
US11563567B2 (en) * 2017-09-27 2023-01-24 Visa International Service Association Secure shared key establishment for peer to peer communications
CN113496406A (en) * 2020-03-19 2021-10-12 东北大学秦皇岛分校 Strong-anonymity electronic voting protocol based on block chain

Also Published As

Publication number Publication date
US20210042829A1 (en) 2021-02-11
JP2021515271A (en) 2021-06-17
TW201946412A (en) 2019-12-01
CN111819815A (en) 2020-10-23
JP7328237B2 (en) 2023-08-16
EP3759863A1 (en) 2021-01-06
JP7385580B2 (en) 2023-11-22
JP2021515270A (en) 2021-06-17
CN111788791A (en) 2020-10-16
US11791992B2 (en) 2023-10-17
GB201817506D0 (en) 2018-12-12
US20210049690A1 (en) 2021-02-18
EP3759864A1 (en) 2021-01-06
WO2019166916A1 (en) 2019-09-06
TWI821248B (en) 2023-11-11
JP2023133560A (en) 2023-09-22
US20240064008A1 (en) 2024-02-22
KR20200125980A (en) 2020-11-05
JP2024010226A (en) 2024-01-23
WO2019166915A1 (en) 2019-09-06

Similar Documents

Publication Publication Date Title
SG11202007880PA (en) Computer implemented method and system for transferring control of a digital asset
ZA202006065B (en) Computer implemented method and system for transferring access to a digital asset
SG11202003794UA (en) System and method for digital asset transfer
EP3586477A4 (en) Method of and system for providing limited distribution of a digital media file
IL261679A (en) System and method for management of digital id
SG11202104620SA (en) Computer implemented system and method for storing data on a blockchain
SG11202006576UA (en) System and method for digital asset management
PT3440823T (en) Method and system for managing personal information within independent computer systems and digital networks
SG11202005610VA (en) System and method for controlling restrictions on digital asset
SG11202008633TA (en) Method and system for data security within independent computer systems and digital networks
IL287691A (en) A computer system and method of operating same for handling anonymous data
EP3599521C0 (en) System and method of communicating data over high availability industrial control systems
GB201811263D0 (en) A method and system for managing digital using a blockchain
SG11202102277TA (en) Computer-implemented system and method for transferring access to digital resource
ZA202005041B (en) Computer implemented method and system for obtaining digitally signed data
GB2567146B (en) Method and system for secure storage of digital data
PL3602457T3 (en) System and method for blockchain-based data management
SG11202006774UA (en) System and method for digital asset valuation
SG11202103412PA (en) Computer implemented system and method for distributing shares of digitally signed data
GB202103948D0 (en) System and method for providing a computer-generated environment
GB201816750D0 (en) A method and system for transferring a digital asset
EP3877879C0 (en) Methods and systems of securely transferring data
IL267062B (en) Data backup system and method
GB2580124B (en) System and method for data transfer
PL3880593T3 (en) Method and facility for transferring reels