TWI800769B - 使用驗證需求文件驗證擁有者憑證之方法及網路 - Google Patents

使用驗證需求文件驗證擁有者憑證之方法及網路 Download PDF

Info

Publication number
TWI800769B
TWI800769B TW109141616A TW109141616A TWI800769B TW I800769 B TWI800769 B TW I800769B TW 109141616 A TW109141616 A TW 109141616A TW 109141616 A TW109141616 A TW 109141616A TW I800769 B TWI800769 B TW I800769B
Authority
TW
Taiwan
Prior art keywords
verification
credential
requirement document
document
credential verification
Prior art date
Application number
TW109141616A
Other languages
English (en)
Other versions
TW202217620A (zh
Inventor
家欣 李
安卓 塔利
Original Assignee
美商鏈通科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 美商鏈通科技股份有限公司 filed Critical 美商鏈通科技股份有限公司
Publication of TW202217620A publication Critical patent/TW202217620A/zh
Application granted granted Critical
Publication of TWI800769B publication Critical patent/TWI800769B/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
TW109141616A 2019-10-18 2020-11-26 使用驗證需求文件驗證擁有者憑證之方法及網路 TWI800769B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201962923471P 2019-10-18 2019-10-18
WOPCT/US2020/056388 2020-10-19
PCT/US2020/056388 WO2021077118A1 (en) 2019-10-18 2020-10-19 Verification requirement document for credential verification

Publications (2)

Publication Number Publication Date
TW202217620A TW202217620A (zh) 2022-05-01
TWI800769B true TWI800769B (zh) 2023-05-01

Family

ID=75537540

Family Applications (1)

Application Number Title Priority Date Filing Date
TW109141616A TWI800769B (zh) 2019-10-18 2020-11-26 使用驗證需求文件驗證擁有者憑證之方法及網路

Country Status (6)

Country Link
US (1) US20220294653A1 (zh)
EP (1) EP4046360A4 (zh)
JP (1) JP2022552419A (zh)
CN (1) CN114930772A (zh)
TW (1) TWI800769B (zh)
WO (1) WO2021077118A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12010244B2 (en) * 2020-11-09 2024-06-11 International Business Machines Corporation Blockchain based verifiability of user status
CA3148105A1 (en) * 2021-02-09 2022-08-09 Ash Bassili Network platform for secure document sharing and verification
KR102470713B1 (ko) 2021-04-29 2022-11-25 (주)소프트제국 블록체인 did 기반 증명서 유통 서비스 제공 방법 및 장치

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110289403A1 (en) * 2001-08-14 2011-11-24 Mcdonald Nathan Joel Document validation mapping system and method
CN105264819A (zh) * 2013-03-15 2016-01-20 微软技术许可有限责任公司 最小披露凭证验证和撤销
TW201947482A (zh) * 2018-05-14 2019-12-16 安地卡及巴布達商區塊鏈控股有限公司 用以使用區塊鏈來執行基元式互換之電腦實施系統及方法
TW202029690A (zh) * 2019-01-18 2020-08-01 香港商阿里巴巴集團服務有限公司 基於區塊鏈的業務檔案儲存方法及裝置
TW202036345A (zh) * 2019-03-26 2020-10-01 香港商阿里巴巴集團服務有限公司 使用多重金鑰對簽署的程式執行和資料證明方案

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2527603B (en) * 2014-06-27 2016-08-10 Ibm Backup and invalidation of authentication credentials
US9785764B2 (en) * 2015-02-13 2017-10-10 Yoti Ltd Digital identity
US10142347B2 (en) * 2016-02-10 2018-11-27 Bank Of America Corporation System for centralized control of secure access to process data network
US10880089B2 (en) * 2017-03-15 2020-12-29 NuID, Inc. Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication
EP3503595B1 (en) * 2017-12-19 2020-11-11 Nokia Technologies Oy Provision of location-specific user information
US11700117B2 (en) * 2018-03-27 2023-07-11 Workday, Inc. System for credential storage and verification
EP3776421A4 (en) * 2018-03-27 2021-12-08 Workday, Inc. SYSTEM FOR STORAGE AND VERIFICATION OF ACCESS DATA
CN109446842A (zh) * 2018-10-31 2019-03-08 深圳电通信息技术有限公司 一种基于区块链和分布式账本的版权权益交易方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110289403A1 (en) * 2001-08-14 2011-11-24 Mcdonald Nathan Joel Document validation mapping system and method
CN105264819A (zh) * 2013-03-15 2016-01-20 微软技术许可有限责任公司 最小披露凭证验证和撤销
TW201947482A (zh) * 2018-05-14 2019-12-16 安地卡及巴布達商區塊鏈控股有限公司 用以使用區塊鏈來執行基元式互換之電腦實施系統及方法
TW202029690A (zh) * 2019-01-18 2020-08-01 香港商阿里巴巴集團服務有限公司 基於區塊鏈的業務檔案儲存方法及裝置
TW202036345A (zh) * 2019-03-26 2020-10-01 香港商阿里巴巴集團服務有限公司 使用多重金鑰對簽署的程式執行和資料證明方案

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
網路文獻 Martin Schanzenbach, Thomas Kilian, Julian and Christian Banse ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques Cornell University July 2019 https://arxiv.org/pdf/1907.09579.pdf *

Also Published As

Publication number Publication date
EP4046360A4 (en) 2023-11-01
CN114930772A (zh) 2022-08-19
JP2022552419A (ja) 2022-12-15
EP4046360A1 (en) 2022-08-24
TW202217620A (zh) 2022-05-01
US20220294653A1 (en) 2022-09-15
WO2021077118A1 (en) 2021-04-22

Similar Documents

Publication Publication Date Title
EP3777016A4 (en) DIGITAL credential for PRIMARY FACTOR AUTHENTICATION
EP3785199A4 (en) DECENTRALIZED DATA VERIFICATION
EP4021047A4 (en) AUTHENTICATION FOR RELAY
EP3585658A4 (en) TWO-FACTOR BIOMETRIC AUTHENTICATION FOR AUTO
EP3949258A4 (en) VERIFICATION OF THE IDENTITY OF A VEHICLE
TWI800769B (zh) 使用驗證需求文件驗證擁有者憑證之方法及網路
EP3776421A4 (en) SYSTEM FOR STORAGE AND VERIFICATION OF ACCESS DATA
EP3811247A4 (en) VERIFICATION SYSTEM
EP3871366A4 (en) ACCOUNT VERIFICATION VALIDATION SERVICE
EP3686838A4 (en) VERIFICATION SYSTEM
EP3977418A4 (en) An authentication input device
EP3892023A4 (en) SINGLE SIGN-ON USING SMART CREDENTIAL
EP3874388A4 (en) MULTIFACTOR PASSWORD AUTHENTICATION
EP3909012A4 (en) VERIFICATION OF CONSENT
EP3935595A4 (en) USER VERIFICATION FOR AUTHORIZATION DEVICE
EP3778454A4 (en) PRINTER
EP3855695A4 (en) ACCESS AUTHENTICATION
EP3769465A4 (en) DISTRIBUTED FRAMEWORK FOR BIOMETRIC COMPARISON
EP4054709A4 (en) CLOUD-BASED DOSE VERIFICATION
EP3433784A4 (en) IDENTIFICATION FOR A SERVICE
EP3686839A4 (en) VERIFICATION SYSTEM
EP3822088A4 (en) PRINTER
EP4028912A4 (en) IMPROVED BIOMETRIC AUTHENTICATION
EP3867780A4 (en) AUTHENTICATION SYSTEM
EP4018349A4 (en) AUTHENTICITY VERIFICATION