WO2018039722A1 - Dynamic access control on blockchain - Google Patents

Dynamic access control on blockchain Download PDF

Info

Publication number
WO2018039722A1
WO2018039722A1 PCT/AU2017/050928 AU2017050928W WO2018039722A1 WO 2018039722 A1 WO2018039722 A1 WO 2018039722A1 AU 2017050928 W AU2017050928 W AU 2017050928W WO 2018039722 A1 WO2018039722 A1 WO 2018039722A1
Authority
WO
WIPO (PCT)
Prior art keywords
capability
sender
blockchain
target
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/AU2017/050928
Other languages
English (en)
French (fr)
Inventor
Mark Staples
Paul RIMBA
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Commonwealth Scientific and Industrial Research Organization CSIRO
Original Assignee
Commonwealth Scientific and Industrial Research Organization CSIRO
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2016903450A external-priority patent/AU2016903450A0/en
Application filed by Commonwealth Scientific and Industrial Research Organization CSIRO filed Critical Commonwealth Scientific and Industrial Research Organization CSIRO
Priority to US16/328,159 priority Critical patent/US11153092B2/en
Priority to JP2019531494A priority patent/JP7019697B2/ja
Priority to CN201780053286.1A priority patent/CN109691015B/zh
Priority to KR1020197004184A priority patent/KR102480035B1/ko
Priority to EP17844684.5A priority patent/EP3479519B1/en
Priority to AU2017320341A priority patent/AU2017320341B2/en
Publication of WO2018039722A1 publication Critical patent/WO2018039722A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy

Definitions

  • Access control is an important feature of security in distributed systems, such as controlled information sharing across different departments in an enterprise and different companies in an industry. Different departments in a company often have different policies, different implementations of access control and legacy systems will frequently create issues with interoperability.
  • a computer implemented method for dynamic access control by creating a capability where a capability is a secure reference to an object, where the capability is stored on a blockchain system comprising:
  • the Confused Deputy Problem happens when a program which has access rights given to it for one purpose applies those access rights for some other purpose that is contrary to the original intent of the access rights, and therefore allows something that it should not allow.
  • a classic example of this problem involves a program that is allowed to write into a directory, which contains a log file and billing information file. The program takes a parameter of a file to which it will write debugging information. A user can then supply the billing information file into the program and thus overwriting the billing information. This may not have been intended during system design, but if the program has the necessary access rights, it may perform this action, perhaps under malicious or erroneous user control.
  • the invention is advantageous as it helps overcome this issue.
  • one or more smart contract instances executing on the blockchain to: (a) receive a request from a sender to create a capability for the object;
  • (d) store the capability for the object for the sender, wherein the capability can be used to dynamically determine access control for the object.
  • one or more smart contract instances executing on the blockchain to:
  • (d) store the capability for the object for the target, wherein the capability can be used to dynamically determine access control for the object.
  • a computer implemented method for dynamic access control by revoking a capability where a capability is a secure reference to an object, where the capability is stored on a blockchain system comprises:
  • one or more smart contract instances executing on the blockchain to:
  • Fig. 2 illustrates a computer-implemented method for creating a capability.
  • Fig. 3 illustrates a computer-implemented method for granting a capability.
  • Fig. 4 illustrates a computer-implemented method for deleting a capability.
  • Fig. 5 illustrates a computer-implemented method for revoking a capability.
  • Fig. 6 illustrates a computer-implemented method for invoking a capability.
  • Fig. 7 illustrates an example sender. Description of Embodiments
  • the present invention generally relates to methods software and system for implementing dynamic access control on a blockchain system.
  • the integrity of smart contracts ensures secure processing of the access control logic and management.
  • Smart contracts form part of the computational infrastructure of many blockchain systems which can be used to perform, as well as store the history of, capability operations.
  • transactions are aggregated into blocks.
  • Each block contains a mathematical function calculation, called a hash, of the previous block.
  • This mathematical function calculation is easy to calculate given a specific transaction but difficult to reverse given a specific hash. This represents a means to determine whether content in the transaction has been modified in any way.
  • This creates a chain where any changes made to a block will change that block's hash, which must be recomputed and stored in the next block. This changes the hash of the next block, which must also be recomputed and so on until the end of the chain.
  • each block is also linked to the previous block (the 'parent' block) by containing a reference the previous block.
  • Each block is guaranteed to come after the previous block chronologically because the previous block's hash would otherwise not be known.
  • Each block is also computationally impractical to modify once it has been in the chain for a while (typically in Bitcoin this is around 60 minutes or 6 blocks on average) because every block after it would also have to be regenerated.
  • Smart contracts in a blockchain system are intended to replicate the legal concept of contracts. That is, where contracts are mutual agreements that impose obligations on the parties to the contract, a smart contract is a way of automatically imposing obligations or conditions on the transaction.
  • Bitcoin and Ethereum (and most other blockchain systems) utilise scripts for the purpose of verifying transactions. It is possible that a smart contract can be implemented as a script and it would operate the same as the way a normal transaction would be verified.
  • the term 'smart contract' is used interchangeably to refer to both the code that is used to execute a smart contract and the actual executing or executed smart contract.
  • the term 'process instance' refers to the execution, and services provided by the smart contract.
  • the term 'script' refers to the smart contract code that can be executed as a process instance.
  • the current disclosure uses the term 'blockchain' to refer to actual blockchain itself (that is, the public shared ledger with blocks added sequentially).
  • the current disclosure also uses the term blockchain in relation to a blockchain system and a blockchain network.
  • the term 'blockchain system' is intended to refer to all the components that make the blockchain operate. This includes the wallet, code, transactions, the blockchain network, as well as the blockchain itself. Examples of blockchain systems used in the disclosure include Bitcoin and Ethereum. Where the term blockchain network is used (for example the Ethereum blockchain network), this is intended to refer to the computers running the blockchain code that are able to communicate with each other via a communications network such as the Internet.
  • This component connects the blockchain process execution to the outside world.
  • the interface makes available an external Application Programmable Interface (API) functions for a sender to call.
  • API Application Programmable Interface
  • a sender is a user process that initiates a capabilities operation.
  • Capability' 158 and 'Invoke Capability' 159 may be process instances on the blockchain. These process instances handle much of the process logic of the creating, granting, deleting and revoking capabilities and may store the process state on the blockchain as well.
  • a sender is the user process that initiates a capabilities operation.
  • a capability is communicable, in the sense that it can be sent or communicated from one party to another party (such as a sender to a target or a user process to any other user process).
  • the capability may be communicated as data much like any other communication. This allows for a user process to determine where the source of the capability came from.
  • a capability is secure in that the system provides protection such that the object reference is not easy to copy or computationally infeasible to forge.
  • the protection is enabled by the use of a blockchain system.
  • the capabilities as protected object references can be created only, in one embodiment, through the use of privileged instructions in a smart contract which may be executed on the blockchain to give effect to the capability on the blockchain system.
  • Fig.4 is an example method for a delete capability operation.
  • the Dynamic Access Control Interface 150 receives 410 a request from a sender to delete a capability for an object.
  • the Dynamic Access Control Interface 150 then calls the delete capability 156 process instance.
  • the delete capability 156 process instance first determines 420 existence and ownership of the capability for the object for the sender. That is, the delete capability process instance ascertains what access rights the sender has for the object, and in particular it determines whether the sender is the owner.
  • the delete capability process instance determines whether the access rights allow for the capability for the object to be deleted. That is, the delete capability process instance determines 430 whether the sender's access rights enable the sender to delete a capability for the object 140.
  • the revoke capability process instance determines 530 whether the access rights for the sender for the object allow for the capability for the object for the target to be revoked. That is, the revoke capability process instance determines whether the sender' access rights enable the sender to revoke a capability for the object 140 for the target. Typically, if the sender is determined to be the owner of the object 140 then the sender would be able to revoke the capability for the object. Subsequently, the storage manager may remove 540 the capability. This is the step that removes the capability from the database.
  • Bob 112 may wish to perform an activity on an object 140.
  • the service resource owner will check that Bob is allowed to perform the activity by calling an invoke capability operation.
  • the sender would be able to invoke the capability for the object.
  • a smart contract has to be deployed before it can be executed.
  • the compiled code of the script and the Application Binary Interface are required.
  • the ABI defines how to interact with the Dynamic Access Control Interface 170.
  • an API defines an interface for source code to be utilised
  • an ABI defines the low-level binary interface between two or more pieces of software on a particular architecture.
  • the ABI defines how the process instance will interact with itself, how the process instance interacts with the Ethereum network 150, and how the process instance 170 interacts with any code libraries.
  • a compiler will typically produce both the compiled code and the ABI. Both the sender 120 and target 140 may have access to the ABI for the

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)
PCT/AU2017/050928 2016-08-30 2017-08-30 Dynamic access control on blockchain Ceased WO2018039722A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US16/328,159 US11153092B2 (en) 2016-08-30 2017-08-30 Dynamic access control on blockchain
JP2019531494A JP7019697B2 (ja) 2016-08-30 2017-08-30 ブロックチェーン上の動的アクセス制御
CN201780053286.1A CN109691015B (zh) 2016-08-30 2017-08-30 一种区块链上的动态访问控制方法及系统
KR1020197004184A KR102480035B1 (ko) 2016-08-30 2017-08-30 블록체인 상의 동적 액세스 제어
EP17844684.5A EP3479519B1 (en) 2016-08-30 2017-08-30 Dynamic access control on blockchain
AU2017320341A AU2017320341B2 (en) 2016-08-30 2017-08-30 Dynamic access control on blockchain

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2016903450A AU2016903450A0 (en) 2016-08-30 Dynamic Access Rights on Blockchain
AU2016903450 2016-08-30

Publications (1)

Publication Number Publication Date
WO2018039722A1 true WO2018039722A1 (en) 2018-03-08

Family

ID=61299529

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2017/050928 Ceased WO2018039722A1 (en) 2016-08-30 2017-08-30 Dynamic access control on blockchain

Country Status (7)

Country Link
US (1) US11153092B2 (enExample)
EP (1) EP3479519B1 (enExample)
JP (1) JP7019697B2 (enExample)
KR (1) KR102480035B1 (enExample)
CN (1) CN109691015B (enExample)
AU (1) AU2017320341B2 (enExample)
WO (1) WO2018039722A1 (enExample)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109190409A (zh) * 2018-09-14 2019-01-11 北京京东金融科技控股有限公司 记录信息传播路径的方法、装置、设备及可读存储介质
CN109828847A (zh) * 2019-01-25 2019-05-31 平安科技(深圳)有限公司 基于区块链的锁处理方法、装置、计算机设备及存储介质
WO2019185343A1 (en) * 2018-03-25 2019-10-03 British Telecommunications Public Limited Company Access control
EP3557496A1 (en) * 2018-04-18 2019-10-23 Chain IP Holdings, Inc. Multiple layer smart-contract
WO2019213100A1 (en) * 2018-04-30 2019-11-07 Liion Industries, Inc. Power infrastructure security system
US20190340013A1 (en) * 2018-05-06 2019-11-07 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods for providing provable access to executable algorithmic logic in a distributed ledger
JP2019200556A (ja) * 2018-05-16 2019-11-21 株式会社日立製作所 利用管理方法、利用管理システム、および、ノード
CN110622149A (zh) * 2018-11-30 2019-12-27 阿里巴巴集团控股有限公司 基于二进制日志复制的区块链数据关系结构方案
CN110807189A (zh) * 2019-11-15 2020-02-18 内蒙古大学 一种区块链访问控制中的权限分割方法
JP2020507140A (ja) * 2018-11-27 2020-03-05 アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited ブロックチェーンネットワーク内のファンクションアズアサービス(FaaS)プラットフォーム
EP3637342A1 (en) * 2018-10-08 2020-04-15 CTF Markets GmbH Method and system for auditable and incentive compatible prevention of front-running
EP3761588A4 (en) * 2018-03-19 2021-01-13 Huawei Technologies Co., Ltd. METHOD AND DEVICE FOR CONTROLLING DATA ACCESS RIGHTS
US10958421B2 (en) 2018-11-20 2021-03-23 International Business Machines Corporation User access control in blockchain
US11201726B2 (en) 2019-05-02 2021-12-14 International Business Machines Corporation Multi-layered image encoding for data block
US11250125B2 (en) 2018-12-03 2022-02-15 Ebay Inc. Highly scalable permissioned block chains
US11605127B2 (en) 2018-05-06 2023-03-14 Strong Force TX Portfolio 2018, LLC Systems and methods for automatic consideration of jurisdiction in loan related actions
US11888966B2 (en) 2018-12-03 2024-01-30 Ebay Inc. Adaptive security for smart contracts using high granularity metrics
US11899783B2 (en) 2018-12-03 2024-02-13 Ebay, Inc. System level function based access control for smart contract execution on a blockchain
JP2024059881A (ja) * 2018-03-06 2024-05-01 アメリコープ インベストメンツ エルエルシー ブロックチェーンに記録された制限された情報のカスタマイズされたビュー
US11982993B2 (en) 2020-02-03 2024-05-14 Strong Force TX Portfolio 2018, LLC AI solution selection for an automated robotic process
US12143395B2 (en) 2020-05-05 2024-11-12 International Business Machines Corporation Low trust privileged access management
US12412120B2 (en) 2018-05-06 2025-09-09 Strong Force TX Portfolio 2018, LLC Systems and methods for controlling rights related to digital knowledge

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10936721B1 (en) * 2018-03-01 2021-03-02 Amdocs Development Limited System, method, and computer program for splitting and distributing a privileged software component into dependent components in order to deliver better security
CN114679282A (zh) * 2016-02-23 2022-06-28 区块链控股有限公司 用区块链实施的用于安全投票和分配的计数系统和方法
GB2562622A (en) 2016-02-23 2018-11-21 Nchain Holdings Ltd Cryptographic method and system for secure extraction of data from a blockchain
WO2017145002A1 (en) 2016-02-23 2017-08-31 nChain Holdings Limited Personal device security using elliptic curve cryptography for secret sharing
WO2017145007A1 (en) 2016-02-23 2017-08-31 nChain Holdings Limited System and method for controlling asset-related actions via a blockchain
CN116957790A (zh) 2016-02-23 2023-10-27 区块链控股有限公司 一种实现区块链上交换的通证化方法及系统
HUE040631T2 (hu) 2016-02-23 2019-03-28 Nchain Holdings Ltd Közös titok meghatározása biztonsági információcseréhez, és hierarchikus, determinisztikus rejtjel kulcsok
BR112018016821A2 (pt) 2016-02-23 2018-12-26 Nchain Holdings Ltd sistema e métodos implementados por computador
GB2561726A (en) 2016-02-23 2018-10-24 Nchain Holdings Ltd Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system
JP6799061B2 (ja) 2016-02-23 2020-12-09 エヌチェーン ホールディングス リミテッドNchain Holdings Limited ウォレット管理システムと併せたブロックチェーンベースのシステムのための暗号鍵のセキュアなマルチパーティ損失耐性のある記憶及び転送
AU2017223127B2 (en) 2016-02-23 2023-01-05 nChain Holdings Limited Universal tokenisation system for blockchain-based cryptocurrencies
CA3227439A1 (en) 2016-02-23 2017-08-31 nChain Holdings Limited Registry and automated management method for blockchain-enforced smart contracts
WO2017145009A1 (en) 2016-02-23 2017-08-31 nChain Holdings Limited A method and system for securing computer software using a distributed hash table and a blockchain
US11308486B2 (en) 2016-02-23 2022-04-19 nChain Holdings Limited Method and system for the secure transfer of entities on a blockchain
WO2017145020A1 (en) 2016-02-23 2017-08-31 nChain Holdings Limited Methods and systems for efficient transfer of entities on a peer-to-peer distributed ledger using the blockchain
AU2017223126B2 (en) 2016-02-23 2022-12-15 nChain Holdings Limited Blockchain-based exchange with tokenisation
JP7188391B2 (ja) * 2017-09-14 2022-12-13 ソニーグループ株式会社 情報処理装置、情報処理方法およびプログラム
JP2021508101A (ja) 2017-10-24 2021-02-25 メディチ・ベンチャーズ,インコーポレーテッド 連合型の個人識別可能情報(pii)サービス
TWI677213B (zh) * 2017-11-23 2019-11-11 財團法人資訊工業策進會 監控裝置、方法及其電腦程式產品
GB2561935B (en) * 2017-11-24 2019-05-22 Zeetta Networks Ltd A system for providing an end-to-end network
CN108492180B (zh) 2018-02-14 2020-11-24 创新先进技术有限公司 资产管理方法及装置、电子设备
WO2019194267A1 (ja) * 2018-04-06 2019-10-10 日本電信電話株式会社 ブロックチェーンシステム、登録端末、承認端末、スマートコントラクト登録方法、および、スマートコントラクト登録プログラム
EP3542494B1 (en) 2018-12-29 2021-02-17 Advanced New Technologies Co., Ltd. System and method for implementing native contract on blockchain
US10733152B2 (en) * 2018-12-29 2020-08-04 Alibaba Group Holding Limited System and method for implementing native contract on blockchain
WO2019120316A2 (en) 2019-03-26 2019-06-27 Alibaba Group Holding Limited System and method for implementing different types of blockchain contracts
JP6641069B1 (ja) 2019-03-29 2020-02-05 住友化学株式会社 発光素子及びその製造方法並びに発光素子用組成物及びその製造方法
CN110598454B (zh) * 2019-09-20 2021-07-06 腾讯科技(深圳)有限公司 区块链中的数据处理方法、装置、存储介质和计算机设备
KR20210059547A (ko) 2019-11-15 2021-05-25 서강대학교산학협력단 스마트 컨트랙트를 기반으로 한 데이터 암호화 가능한 블록체인 네트워크
CN111291420B (zh) * 2020-01-21 2022-11-11 国家市场监督管理总局信息中心 一种基于区块链的分布式离链数据存储方法
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities
CN111327618B (zh) * 2020-02-25 2023-04-18 上海链民信息科技有限公司 一种基于区块链的精准访问控制方法、装置及系统
CN111444524B (zh) * 2020-03-26 2023-11-10 广州智慧城市发展研究院 一种基于联盟链的动态双访问控制机制
CN114024700B (zh) * 2020-07-17 2024-03-26 中国电信股份有限公司 基于区块链的数据文件的访问控制方法、介质及装置
CN114117507B (zh) * 2020-08-28 2024-01-30 中国电信股份有限公司 对象存储系统及其访问控制方法和设备、存储介质
GB202018919D0 (en) * 2020-12-01 2021-01-13 Smarter Contracts Ltd Consent Management
US11271716B1 (en) 2021-01-28 2022-03-08 Emtruth, Inc. Blockchain-based data management of distributed binary objects
JP7779156B2 (ja) * 2022-01-25 2025-12-03 トヨタ自動車株式会社 アクセス制御プログラム、アクセス制御方法およびアクセス制御装置
US12242619B2 (en) 2022-05-16 2025-03-04 Bank Of America Corporation System and method for updating a distributed ledger of a blockchain based on detecting anomalies in blockchain transactions
US20240146523A1 (en) * 2022-10-31 2024-05-02 Unstoppable Domains, Inc. Access control using a blockchain identity and policy based authorization
KR102549385B1 (ko) * 2022-11-03 2023-06-29 주식회사 커먼컴퓨터 데이터 액세스 제어 제공 방법 및 시스템

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150127940A1 (en) * 2013-11-05 2015-05-07 Cellco Partnership D/B/A Verizon Wireless Secure distributed information and password management
US20160028552A1 (en) * 2014-07-25 2016-01-28 Blockchain Technologies Corporation System and method for creating a multi-branched blockchain with configurable protocol rules

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5263157A (en) 1990-02-15 1993-11-16 International Business Machines Corporation Method and system for providing user access control within a distributed data processing system by the exchange of access control profiles
US8639625B1 (en) * 1995-02-13 2014-01-28 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
JP3765191B2 (ja) * 1998-09-21 2006-04-12 富士ゼロックス株式会社 オブジェクトのアクセス管理方法
US7685123B1 (en) 2006-08-30 2010-03-23 Network Appliance, Inc. Method and system for controlling access to dynamically specified resources
US8285990B2 (en) 2007-05-14 2012-10-09 Future Wei Technologies, Inc. Method and system for authentication confirmation using extensible authentication protocol
WO2016189488A2 (en) 2015-05-27 2016-12-01 Vishal Gupta Universal original document validation platform
CN105488431B (zh) * 2015-11-30 2019-12-13 布比(北京)网络技术有限公司 区块链系统权限管理方法和装置
CN105809062B (zh) * 2016-03-01 2019-01-25 布比(北京)网络技术有限公司 一种合约构建、执行方法及装置

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150127940A1 (en) * 2013-11-05 2015-05-07 Cellco Partnership D/B/A Verizon Wireless Secure distributed information and password management
US20160028552A1 (en) * 2014-07-25 2016-01-28 Blockchain Technologies Corporation System and method for creating a multi-branched blockchain with configurable protocol rules

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
1 January 1984, ISBN: 97809323762210, article LEVY, H.M.: "Capability-Based Computer Systems", pages: 1 - 225, XP055155420 *
ANONYMOUS: "Object-capability model", 2 January 2014 (2014-01-02), XP055592431, Retrieved from the Internet <URL:https://web.archive.org/web/2014010210561 0/https://en.wikipedia.org/wiki/Object- capability_model> *
DENNIS, J.B. ET AL.: "Programming Semantics for Multiprogrammed Computations", vol. 9, 3 March 1966 (1966-03-03), Cambridge, Massachusetts, pages 143 - 155, XP058102728, Retrieved from the Internet <URL:https://www. princeton .edu/~rblee/ELE572Papers/Fal104Readings/ProgramSemantics_D ennisvanHorn. pdf> [retrieved on 20170922] *
MILLER, M.S. ET AL.: "Paradigm Regained: Abstraction Mechanisms for Access Control ', SRL Technical Report SRL2003-03, Department of Computer Science", SUBMITTED TO THE EIGHTH ASIAN COMPUTING SCIENCE CONFERENCE (ASIAN'03, 10 December 2003 (2003-12-10), Mumbai India, XP055472575, Retrieved from the Internet <URL:http://srl.cs.jhu.edu/pubs/SRL2003-03 . pdf> [retrieved on 20170922] *
SAYED HADI HASHEMI ET AL.: "World of Empowered IoT Users", 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI, 1 April 2016 (2016-04-01), pages 13 - 24
See also references of EP3479519A4
ZYSKIND, G. ET AL., ENIGMA: DECENTRALIZED COMPUTATION PLATFORM WITH GUARANTEED PRIVACY, 10 June 2015 (2015-06-10), pages 1 - 14, XP055432153, Retrieved from the Internet <URL:https://arxiv.org/abs/1506.03471> [retrieved on 20170323] *
ZYSKIND, G. ET AL.: "Decentralizing Privacy: Using Blockchain to Protect Personal Data", 2015 IEEE CS SECURITY AND PRIVACY WORKSHOPS, 21 May 2015 (2015-05-21), pages 180 - 184, XP055359413 *

Cited By (77)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7731603B2 (ja) 2018-03-06 2025-09-01 アメリコープ インベストメンツ エルエルシー ブロックチェーンに記録された制限された情報のカスタマイズされたビュー
JP2024059881A (ja) * 2018-03-06 2024-05-01 アメリコープ インベストメンツ エルエルシー ブロックチェーンに記録された制限された情報のカスタマイズされたビュー
EP3761588A4 (en) * 2018-03-19 2021-01-13 Huawei Technologies Co., Ltd. METHOD AND DEVICE FOR CONTROLLING DATA ACCESS RIGHTS
US12058253B2 (en) 2018-03-19 2024-08-06 Huawei Technologies Co., Ltd Method and apparatus for controlling data access right to data stored on a blockchain
US11563569B2 (en) 2018-03-19 2023-01-24 Huawei Technologies Co., Ltd. Method and apparatus for controlling data access right to data stored on a blockchain
WO2019185343A1 (en) * 2018-03-25 2019-10-03 British Telecommunications Public Limited Company Access control
EP3557496A1 (en) * 2018-04-18 2019-10-23 Chain IP Holdings, Inc. Multiple layer smart-contract
WO2019213100A1 (en) * 2018-04-30 2019-11-07 Liion Industries, Inc. Power infrastructure security system
US11734619B2 (en) 2018-05-06 2023-08-22 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods for predicting a forward market price utilizing external data sources and resource utilization requirements
US11741402B2 (en) 2018-05-06 2023-08-29 Strong Force TX Portfolio 2018, LLC Systems and methods for forward market purchase of machine resources
US12412120B2 (en) 2018-05-06 2025-09-09 Strong Force TX Portfolio 2018, LLC Systems and methods for controlling rights related to digital knowledge
US12412131B2 (en) 2018-05-06 2025-09-09 Strong Force TX Portfolio 2018, LLC Systems and methods for forward market purchase of machine resources using artificial intelligence
US12412132B2 (en) 2018-05-06 2025-09-09 Strong Force TX Portfolio 2018, LLC Smart contract management of licensing and apportionment using a distributed ledger
US20190340013A1 (en) * 2018-05-06 2019-11-07 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods for providing provable access to executable algorithmic logic in a distributed ledger
US12400154B2 (en) 2018-05-06 2025-08-26 Strong Force TX Portfolio 2018, LLC Systems and methods for forward market purchase of attention resources
US12254427B2 (en) 2018-05-06 2025-03-18 Strong Force TX Portfolio 2018, LLC Systems and methods for forward market purchase of machine resources
US12217197B2 (en) 2018-05-06 2025-02-04 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods for transaction execution with licensing smart wrappers
US11605127B2 (en) 2018-05-06 2023-03-14 Strong Force TX Portfolio 2018, LLC Systems and methods for automatic consideration of jurisdiction in loan related actions
US11605125B2 (en) 2018-05-06 2023-03-14 Strong Force TX Portfolio 2018, LLC System and method of varied terms and conditions of a subsidized loan
US11610261B2 (en) 2018-05-06 2023-03-21 Strong Force TX Portfolio 2018, LLC System that varies the terms and conditions of a subsidized loan
US11625792B2 (en) 2018-05-06 2023-04-11 Strong Force TX Portfolio 2018, LLC System and method for automated blockchain custody service for managing a set of custodial assets
US11645724B2 (en) 2018-05-06 2023-05-09 Strong Force TX Portfolio 2018, LLC Systems and methods for crowdsourcing information on loan collateral
US11657339B2 (en) 2018-05-06 2023-05-23 Strong Force TX Portfolio 2018, LLC Transaction-enabled methods for providing provable access to a distributed ledger with a tokenized instruction set for a semiconductor fabrication process
US11657461B2 (en) 2018-05-06 2023-05-23 Strong Force TX Portfolio 2018, LLC System and method of initiating a collateral action based on a smart lending contract
US11657340B2 (en) 2018-05-06 2023-05-23 Strong Force TX Portfolio 2018, LLC Transaction-enabled methods for providing provable access to a distributed ledger with a tokenized instruction set for a biological production process
US11681958B2 (en) 2018-05-06 2023-06-20 Strong Force TX Portfolio 2018, LLC Forward market renewable energy credit prediction from human behavioral data
US11688023B2 (en) 2018-05-06 2023-06-27 Strong Force TX Portfolio 2018, LLC System and method of event processing with machine learning
US12210984B2 (en) 2018-05-06 2025-01-28 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems to forecast a forward market value and adjust an operation of a task system in response
US12067630B2 (en) 2018-05-06 2024-08-20 Strong Force TX Portfolio 2018, LLC Adaptive intelligence and shared infrastructure lending transaction enablement platform responsive to crowd sourced information
US11710084B2 (en) 2018-05-06 2023-07-25 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods for resource acquisition for a fleet of machines
US11715163B2 (en) 2018-05-06 2023-08-01 Strong Force TX Portfolio 2018, LLC Systems and methods for using social network data to validate a loan guarantee
US11715164B2 (en) 2018-05-06 2023-08-01 Strong Force TX Portfolio 2018, LLC Robotic process automation system for negotiation
US11720978B2 (en) 2018-05-06 2023-08-08 Strong Force TX Portfolio 2018, LLC Systems and methods for crowdsourcing a condition of collateral
US11727506B2 (en) 2018-05-06 2023-08-15 Strong Force TX Portfolio 2018, LLC Systems and methods for automated loan management based on crowdsourced entity information
US11727505B2 (en) 2018-05-06 2023-08-15 Strong Force TX Portfolio 2018, LLC Systems, methods, and apparatus for consolidating a set of loans
US11727320B2 (en) 2018-05-06 2023-08-15 Strong Force TX Portfolio 2018, LLC Transaction-enabled methods for providing provable access to a distributed ledger with a tokenized instruction set
US11727504B2 (en) 2018-05-06 2023-08-15 Strong Force TX Portfolio 2018, LLC System and method for automated blockchain custody service for managing a set of custodial assets with block chain authenticity verification
US11727319B2 (en) 2018-05-06 2023-08-15 Strong Force TX Portfolio 2018, LLC Systems and methods for improving resource utilization for a fleet of machines
US12033092B2 (en) 2018-05-06 2024-07-09 Strong Force TX Portfolio 2018, LLC Systems and methods for arbitrage based machine resource acquisition
US11734774B2 (en) 2018-05-06 2023-08-22 Strong Force TX Portfolio 2018, LLC Systems and methods for crowdsourcing data collection for condition classification of bond entities
US11741401B2 (en) 2018-05-06 2023-08-29 Strong Force TX Portfolio 2018, LLC Systems and methods for enabling machine resource transactions for a fleet of machines
US11928747B2 (en) 2018-05-06 2024-03-12 Strong Force TX Portfolio 2018, LLC System and method of an automated agent to automatically implement loan activities based on loan status
US11829906B2 (en) 2018-05-06 2023-11-28 Strong Force TX Portfolio 2018, LLC System and method for adjusting a facility configuration based on detected conditions
US11741553B2 (en) 2018-05-06 2023-08-29 Strong Force TX Portfolio 2018, LLC Systems and methods for automatic classification of loan refinancing interactions and outcomes
US11741552B2 (en) 2018-05-06 2023-08-29 Strong Force TX Portfolio 2018, LLC Systems and methods for automatic classification of loan collection actions
US11748673B2 (en) 2018-05-06 2023-09-05 Strong Force TX Portfolio 2018, LLC Facility level transaction-enabling systems and methods for provisioning and resource allocation
US11748822B2 (en) 2018-05-06 2023-09-05 Strong Force TX Portfolio 2018, LLC Systems and methods for automatically restructuring debt
US11763214B2 (en) 2018-05-06 2023-09-19 Strong Force TX Portfolio 2018, LLC Systems and methods for machine forward energy and energy credit purchase
US11763213B2 (en) 2018-05-06 2023-09-19 Strong Force TX Portfolio 2018, LLC Systems and methods for forward market price prediction and sale of energy credits
US11769217B2 (en) 2018-05-06 2023-09-26 Strong Force TX Portfolio 2018, LLC Systems, methods and apparatus for automatic entity classification based on social media data
US11776069B2 (en) 2018-05-06 2023-10-03 Strong Force TX Portfolio 2018, LLC Systems and methods using IoT input to validate a loan guarantee
US11790288B2 (en) 2018-05-06 2023-10-17 Strong Force TX Portfolio 2018, LLC Systems and methods for machine forward energy transactions optimization
US11790286B2 (en) 2018-05-06 2023-10-17 Strong Force TX Portfolio 2018, LLC Systems and methods for fleet forward energy and energy credits purchase
US11790287B2 (en) 2018-05-06 2023-10-17 Strong Force TX Portfolio 2018, LLC Systems and methods for machine forward energy and energy storage transactions
US11810027B2 (en) 2018-05-06 2023-11-07 Strong Force TX Portfolio 2018, LLC Systems and methods for enabling machine resource transactions
US11829907B2 (en) 2018-05-06 2023-11-28 Strong Force TX Portfolio 2018, LLC Systems and methods for aggregating transactions and optimization data related to energy and energy credits
US11816604B2 (en) 2018-05-06 2023-11-14 Strong Force TX Portfolio 2018, LLC Systems and methods for forward market price prediction and sale of energy storage capacity
US11823098B2 (en) 2018-05-06 2023-11-21 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods to utilize a transaction location in implementing a transaction request
JP2019200556A (ja) * 2018-05-16 2019-11-21 株式会社日立製作所 利用管理方法、利用管理システム、および、ノード
CN109190409B (zh) * 2018-09-14 2020-09-01 京东数字科技控股有限公司 记录信息传播路径的方法、装置、设备及可读存储介质
CN109190409A (zh) * 2018-09-14 2019-01-11 北京京东金融科技控股有限公司 记录信息传播路径的方法、装置、设备及可读存储介质
EP3637342A1 (en) * 2018-10-08 2020-04-15 CTF Markets GmbH Method and system for auditable and incentive compatible prevention of front-running
US10958421B2 (en) 2018-11-20 2021-03-23 International Business Machines Corporation User access control in blockchain
US10824419B2 (en) 2018-11-27 2020-11-03 Alibaba Group Holding Limited Function-as-a-service (FaaS) platform in blockchain networks
JP2020507140A (ja) * 2018-11-27 2020-03-05 アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited ブロックチェーンネットワーク内のファンクションアズアサービス(FaaS)プラットフォーム
CN110622149A (zh) * 2018-11-30 2019-12-27 阿里巴巴集团控股有限公司 基于二进制日志复制的区块链数据关系结构方案
US11809551B2 (en) 2018-12-03 2023-11-07 Ebay Inc. Highly scalable permissioned block chains
US11250125B2 (en) 2018-12-03 2022-02-15 Ebay Inc. Highly scalable permissioned block chains
US11899783B2 (en) 2018-12-03 2024-02-13 Ebay, Inc. System level function based access control for smart contract execution on a blockchain
US11888966B2 (en) 2018-12-03 2024-01-30 Ebay Inc. Adaptive security for smart contracts using high granularity metrics
CN109828847A (zh) * 2019-01-25 2019-05-31 平安科技(深圳)有限公司 基于区块链的锁处理方法、装置、计算机设备及存储介质
CN109828847B (zh) * 2019-01-25 2023-09-01 平安科技(深圳)有限公司 基于区块链的锁处理方法、装置、计算机设备及存储介质
US11201726B2 (en) 2019-05-02 2021-12-14 International Business Machines Corporation Multi-layered image encoding for data block
CN110807189A (zh) * 2019-11-15 2020-02-18 内蒙古大学 一种区块链访问控制中的权限分割方法
CN110807189B (zh) * 2019-11-15 2023-07-07 内蒙古大学 一种区块链访问控制中的权限分割方法
US11982993B2 (en) 2020-02-03 2024-05-14 Strong Force TX Portfolio 2018, LLC AI solution selection for an automated robotic process
US12143395B2 (en) 2020-05-05 2024-11-12 International Business Machines Corporation Low trust privileged access management

Also Published As

Publication number Publication date
CN109691015B (zh) 2022-02-01
EP3479519A1 (en) 2019-05-08
KR102480035B1 (ko) 2022-12-21
AU2017320341B2 (en) 2022-04-28
US20190199531A1 (en) 2019-06-27
CN109691015A (zh) 2019-04-26
US11153092B2 (en) 2021-10-19
EP3479519B1 (en) 2022-11-02
AU2017320341A1 (en) 2019-02-14
JP7019697B2 (ja) 2022-02-15
JP2019530109A (ja) 2019-10-17
KR20190042567A (ko) 2019-04-24
EP3479519A4 (en) 2020-02-19

Similar Documents

Publication Publication Date Title
AU2017320341B2 (en) Dynamic access control on blockchain
JP7641690B2 (ja) 契約の実行を制御する方法及びシステム
JP7652820B2 (ja) ブロックチェーンにより実現される方法及びシステム
CN111090876B (zh) 调用合约的方法及装置
KR102785070B1 (ko) 낮은 신뢰 권한 액세스 관리
JP6877448B2 (ja) 分散ハッシュテーブル及びブロックチェーンを用いてコンピュータソフトウェアを保証する方法及びシステム
Herbert et al. A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology
CN110580412B (zh) 基于链代码的权限查询配置方法及装置
CN110580413A (zh) 基于链下授权的隐私数据查询方法及装置
CN110580418A (zh) 基于区块链账户的隐私数据查询方法及装置
CN110580414A (zh) 基于区块链账户的隐私数据查询方法及装置
WO2021209052A1 (zh) 基于区块链的数据处理
CN110580417A (zh) 基于智能合约的隐私数据查询方法及装置
Ouaddah et al. Harnessing the power of blockchain technology to solve IoT security & privacy issues.
Hu et al. Blockchain for access control systems
Al-Bassam et al. Airtnt: Fair exchange payment for outsourced secure enclave computations
Baskaran et al. A survey on privacy concerns in blockchain applications and current blockchain solutions to preserve data privacy
CN119096521A (zh) 用于在使用基于密码术的存储应用进行区块链操作时促进安全认证的系统和方法
CN112560077B (zh) 一种访问控制方法、设备及系统
Bistarelli et al. Policy-based Credential Disclosure in SSI by Using ORCON-based Access Control
Mahar et al. TTECCDU: a blockchain-based approach for expressive authorization management
US20250045361A1 (en) Protection of digital assets within the blockchain by approval revocations
Tapas Toward trustless internet of things: a blockchain-based approach
Raj et al. Mitigating conflict resolution in IoT-enabled supply chain through blockchain-based lightweight access control
McKay et al. Cybersecurity Considerations in Blockchain-Based Solutions

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17844684

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2017844684

Country of ref document: EP

Effective date: 20190201

ENP Entry into the national phase

Ref document number: 20197004184

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2017320341

Country of ref document: AU

Date of ref document: 20170830

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2019531494

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE