SG11202108698PA - Methods and systems for token-based anchoring of a physical object in a distributed ledger environment - Google Patents

Methods and systems for token-based anchoring of a physical object in a distributed ledger environment

Info

Publication number
SG11202108698PA
SG11202108698PA SG11202108698PA SG11202108698PA SG11202108698PA SG 11202108698P A SG11202108698P A SG 11202108698PA SG 11202108698P A SG11202108698P A SG 11202108698PA SG 11202108698P A SG11202108698P A SG 11202108698PA SG 11202108698P A SG11202108698P A SG 11202108698PA
Authority
SG
Singapore
Prior art keywords
token
systems
methods
distributed ledger
physical object
Prior art date
Application number
SG11202108698PA
Inventor
Thomas Endress
Daniel Szabo
Frederic Berkermann
Diaz Natali Melgarejo
Carl Christian Brazel
Michael Platzoeder
Original Assignee
Merck Patent Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Merck Patent Gmbh filed Critical Merck Patent Gmbh
Publication of SG11202108698PA publication Critical patent/SG11202108698PA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0833Tracking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/02Agriculture; Fishing; Mining
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
SG11202108698PA 2019-02-13 2020-02-11 Methods and systems for token-based anchoring of a physical object in a distributed ledger environment SG11202108698PA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP19157030 2019-02-13
PCT/EP2020/053374 WO2020165111A1 (en) 2019-02-13 2020-02-11 Methods and systems for token-based anchoring of a physical object in a distributed ledger environment

Publications (1)

Publication Number Publication Date
SG11202108698PA true SG11202108698PA (en) 2021-09-29

Family

ID=65493814

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202108698PA SG11202108698PA (en) 2019-02-13 2020-02-11 Methods and systems for token-based anchoring of a physical object in a distributed ledger environment

Country Status (12)

Country Link
US (1) US11283610B2 (en)
EP (1) EP3534288A3 (en)
JP (1) JP2022521488A (en)
KR (1) KR20210125538A (en)
CN (1) CN113412602A (en)
AU (1) AU2020221497A1 (en)
CA (1) CA3129906A1 (en)
IL (1) IL285471A (en)
MX (1) MX2021009703A (en)
SG (1) SG11202108698PA (en)
TW (1) TWI819191B (en)
WO (1) WO2020165111A1 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11070379B2 (en) * 2019-04-18 2021-07-20 Advanced New Technologies Co., Ltd. Signature verification for a blockchain ledger
US10585882B1 (en) 2019-09-23 2020-03-10 Trace, LLC Systems and methods for writing updates to and/or reading previously stored updates of assets implemented as smart contracts on a decentralized database
WO2021063030A1 (en) * 2019-09-30 2021-04-08 东南大学 Blockchain-enhanced open internet of things access architecture
FR3101991B1 (en) * 2019-10-09 2022-08-05 Casanova Pierre Francois Object Authentication and Assurance System and Method
CN110809035B (en) * 2019-10-25 2021-12-03 广州查正源电子科技有限公司 Decentralized anti-counterfeiting data generation and management method and system
CN115244893A (en) * 2020-01-23 2022-10-25 学校法人东京理科大学 Registration device, authentication device, identification device, and individual identification system
US10956591B1 (en) * 2020-01-27 2021-03-23 Capital One Services, Llc High performance tokenization platform for sensitive data
US11856109B2 (en) 2020-02-06 2023-12-26 International Business Machines Corporation Entity certification management
US11683185B2 (en) * 2020-02-06 2023-06-20 International Business Machines Corporation Entity certification management
US11527566B2 (en) 2020-07-23 2022-12-13 International Business Machines Corporation Interpreting optical signals from tailored arrays of metasurfaces
DE102022100411A1 (en) 2022-01-10 2023-07-13 Eto Gruppe Technologies Gmbh Verification method and verification computer system with an NFT creation device and a verification device
FR3133244A1 (en) * 2022-03-01 2023-09-08 Inkan.Link Multi-Factor Data Certification

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI20011312A (en) * 2001-06-20 2002-12-21 Nokia Corp Improved method and arrangement for electronic payment processing
US8989387B2 (en) * 2006-03-31 2015-03-24 International Business Machines Corporation Using identifier tags and authenticity certificates for detecting counterfeited or stolen brand objects
US8528069B2 (en) * 2010-09-30 2013-09-03 Microsoft Corporation Trustworthy device claims for enterprise applications
WO2012122994A1 (en) * 2011-03-11 2012-09-20 Kreft Heinz Off-line transfer of electronic tokens between peer-devices
US20150278487A1 (en) * 2014-03-28 2015-10-01 Enceladus IP Holdings, LLP Security scheme for authenticating digital entities and aggregate object origins
GB201511964D0 (en) * 2015-07-08 2015-08-19 Barclays Bank Plc Secure digital data operations
DK3340213T3 (en) * 2016-12-21 2020-06-08 Merck Patent Gmbh PUF-BASED COMPOSITION SAFETY LABELING TO COMBAT FORM
ES2764128T3 (en) 2016-12-21 2020-06-02 Merck Patent Gmbh Reading device to read a composite mark that includes a non-clonal physical function to fight counterfeiting
SG11201912993PA (en) 2017-06-27 2020-01-30 Jpmorgan Chase Bank Na System and method for using a distributed ledger gateway
CN111492634A (en) * 2017-07-31 2020-08-04 编年史公司 Secure and confidential custody transaction systems, methods, and apparatus using zero-knowledge protocols
US11115217B2 (en) * 2018-11-21 2021-09-07 Avaya Inc. Systems and methods for detecting device location and usage

Also Published As

Publication number Publication date
TW202040458A (en) 2020-11-01
EP3534288A3 (en) 2020-08-12
WO2020165111A1 (en) 2020-08-20
TWI819191B (en) 2023-10-21
CN113412602A (en) 2021-09-17
KR20210125538A (en) 2021-10-18
AU2020221497A1 (en) 2021-10-07
US20200259653A1 (en) 2020-08-13
CA3129906A1 (en) 2020-08-20
EP3534288A2 (en) 2019-09-04
US11283610B2 (en) 2022-03-22
MX2021009703A (en) 2021-09-14
IL285471A (en) 2021-09-30
JP2022521488A (en) 2022-04-08

Similar Documents

Publication Publication Date Title
IL285471A (en) Methods and systems for token-based anchoring of a physical object in a distributed ledger environment
IL288446A (en) Tissue anchor handling systems and methods
SG11202004685RA (en) Consensus system and method
HK1252724A1 (en) Implant placement and removal systems
SG11202004153UA (en) Distributed computing system and method
HK1258346A1 (en) Medical implant and anchoring system for a medical implant
GB2582057B (en) Growing systems and methods
IL274980A (en) Multiple anchor delivery system and method
GB201807943D0 (en) Modular storage systems and methods
GB202007641D0 (en) Growing systems and methods
SG11202002678RA (en) A tracking system and method
GB202016092D0 (en) Systems and methods for features engineering
EP4085317A4 (en) Long-idle state system and method
EP3599841A4 (en) Systems and methods for identifying individual animals in a group of animals
SG11202002501VA (en) System and method for simultaneously managing a plurality of designation peripherals
IL257788B (en) Systems and methods for deploying a cardiac anchor
GB201610926D0 (en) Prosthetic system and method
EP3618581A4 (en) Event staging system and event staging program
EP3313329A4 (en) Endoluminal prosthesis systems and methods
GB201909969D0 (en) Systems and methods for activating functionality
GB2572136B (en) Backup systems and methods
SG11202002076QA (en) A sputtering system and method
GB201702878D0 (en) System for launching and anchoring a line
GB201914340D0 (en) Visualisation system and methods
GB201917369D0 (en) Dynamic visualisation methods and systems