WO2020021228A1 - Système et procédé de gestion de chaînes de contrôle - Google Patents

Système et procédé de gestion de chaînes de contrôle Download PDF

Info

Publication number
WO2020021228A1
WO2020021228A1 PCT/GB2019/051922 GB2019051922W WO2020021228A1 WO 2020021228 A1 WO2020021228 A1 WO 2020021228A1 GB 2019051922 W GB2019051922 W GB 2019051922W WO 2020021228 A1 WO2020021228 A1 WO 2020021228A1
Authority
WO
WIPO (PCT)
Prior art keywords
archive
custody
document
validation
chain
Prior art date
Application number
PCT/GB2019/051922
Other languages
English (en)
Inventor
Philip LEONE
Original Assignee
Leone Philip
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leone Philip filed Critical Leone Philip
Publication of WO2020021228A1 publication Critical patent/WO2020021228A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Definitions

  • the present invention concerns systems and methods for the management of chains of custody.
  • the present invention is addressed to problems relating to documents, be they physical documents or virtual (digital) documents.
  • a human signature is one example of such a marking.
  • the signature is widely accepted as being characteristic of the individual, so that a "wet ink" signature which appears to match that of the individual is often used as prima facie evidence that the individual signed the document and so accepted, agreed to, or in some manner endorsed its content.
  • Official certificates are often presented in a form that is unusual, ornate, or for some other reason hard to imitate, to resist forgery.
  • One historical example is the seal applied to letters patent in past centuries.
  • Modern day anti-forgery measures include special papers, lockable print trays, CCTV surveillance of print works, special inks (e.g. those visible only to detectors operating outside the visible spectrum, or those that fluoresce only under certain types of illumination such as UV illumination), holograms, foils, metallic threads, specialist printing technologies (e.g. intaglio, micro-printing, rainbow printing) and others.
  • special inks e.g. those visible only to detectors operating outside the visible spectrum, or those that fluoresce only under certain types of illumination such as UV illumination
  • holograms e.g. those visible only to detectors operating outside the visible spectrum, or those that fluoresce only under certain types of illumination such as UV illumination
  • holograms e.g. those visible only to detectors operating outside the visible spectrum, or those that fluoresce only under certain types of illumination such as UV illumination
  • holograms e.g. those visible only to detectors operating outside the visible spectrum, or those that fluoresce only under certain types of illumination such as UV
  • a modern day passport provides a good example, incorporating a number of anti-counterfeiting features.
  • Such measures are however only effective to the extent that they are suitably examined or tested at the document's point of use, which can require specialist equipment and operators. They are also effective only to the extent that they cannot be reproduced by forgers.
  • Paper itself suffers certain relevant shortcomings. It is easily torn and water-damaged. Images applied to it can sometimes be erased.
  • the trust placed in it often derives from the trust placed in the body that supplies the data (e.g. the Patent Office, in the above example) and from the belief that one is viewing data supplied by that trusted body (because the URL is familiar, the site has the expected appearance, the user has visited the site before, and so on).
  • Trust in this context is being placed in the body issuing the data and is essentially pre-supposed, rather than being established by the digital interaction.
  • Trust is an especially key consideration for businesses. It is the key that unlocks and drives rapid, efficient, high-volume commerce. Historically, much of commerce was essentially local and trust was reinforced through personal relationships. This is clearly not true of the modern world in which business at large, and trading relationships in particular, are increasingly global. The secure document sector has largely failed to keep pace with the digital world of high-speed, international transactions.
  • third parties In a significant transaction third parties often assist the transacting parties to obviate problems arising from a lack of trust, either by providing profiles intended to demonstrate the trustworthiness of the counterparties or by accepting an element of the risk involved in the transaction, e.g. payment risk, on behalf of the buyer or seller.
  • Transactions involve transmission - of data and often of payments - between the transacting parties and their advisers or intermediaries such as bankers, lawyers, tax advisers, valuation experts, forensic experts and others who may be called upon to attest to the bona fides of a party to the transaction and/or of the goods or services to be delivered.
  • Data about a transaction is routinely recorded both in digital form and in physical documents.
  • the veracity of data in the logical and the physical domains need to be confirmed. This often includes comparison of data in the two domains to ensure their consistency.
  • Some aspects of the present invention are applicable to problems that extend beyond the field of documents and document validation and that relate in a general sense to the maintenance of a "chain of custody".
  • This phrase is sometimes used in a narrow sense to refer to the recordal of handling and disposition of evidence for presentation in a court. In the present instance, however, it is used in a broader sense to refer to a record of the provenance of an asset, which may for example include data relating to the origin of the asset, its date of creation, its creator, its current or past holders and/or owners, its usage, maintenance or repair history and so on.
  • Challenges for those involved in transactions relating to an asset include the following: a) How can one verify the provenance and chain of title or custody of the physical artefact (which may or may not be a document) which is used by all parties to manage the transaction?
  • a chain of custody comprises one or more activities
  • the method comprising: generation of an archive key; recording the archive key on an artefact; creating in an archive comprising a distributed digital ledger a record of the chain of custody referenceable by use of the archive key; and implementing a validation gateway accessible to end users through a wide area network, the validation gateway being configured to implement a process of validation in which: an end user authenticates to the validation gateway; the archive key is read from the artefact and transmitted to the validation gateway;
  • Figure 1 is a diagrammatic representation of the main elements of a system embodying the present invention
  • Figure 2 is a representation of a document according to an aspect of the present invention
  • Figure 3 is a represents diagrammatically the generation of a document in accordance with the present invention.
  • Figure 4 represents diagrammatically a process of validation of the document.
  • artefacts are intelligent gateways for artefact holders to access chains of custody in an archive.
  • authorised person(s) typically including the artefact holder, are able to undertake validation of the artefact and to access information about it.
  • This information may, by way of example and not limitation, include the artefact holder's identity, and data relating to the activity which the artefact relates to.
  • Artefact is a tangible physical entity. Artefacts may, by way of example and not limitation, comprise documents on any substrate, including paper documents and documents having a polymer substrate, cards of any suitable type and format, including identity and membership cards, physical tokens and tags, and suitable physical goods. In some embodiments of the invention, artefacts have the ability to hold secure data. They may have onboard memory.
  • Artefacts record metadata relevant to the chain of custody that is typically encrypted and is carried on the artefact.
  • This metadata may be carried by the artefact in the form of a printed code or it may be carried in a suitable digital device, which may for example comprise integrated circuits or other electronic and/or digital means to store the metadata.
  • the metadata comprises an archive key to enable access to the chain of custody in the archive.
  • the archive key may, by way of example and not limitation, comprise one or more of a unique identifier, or other information for referencing the chain of custody record in the archive, a URL or other form of network address, a password or other data for enabling access to the chain of custody in the archive.
  • Activities may carry secure keys, digital signatures, uniform resource locators and other industry-accepted means to communicate securely over public and private data networks with the other elements of the present system.
  • Activities An activity is any process to be recorded or managed by use of the present system. Activities may in principle be initiated and conducted by individuals or by any suitable organisation, be it a company or other enterprise, a not for profit organisation, a government, regulatory body etc. Non-limiting examples of activities include: making of contracts or agreements of other types, commercial transactions, sales, purchases, asset transfers, entitlements, privileges, certifications, notarisations, assays, experiments and so on. Activities may, without limitation, relate to: securing of rights, confirmation of contractual obligations, assertion of ownership, demonstration of compliance, securement of supply chains, confirmation of financial arrangements, proof of title, management of relationships and so on. Assets
  • Assets may be tangible items of property, or may be intangible items of property, or may be intangible rights of another type, such as a contractual right, a privilege, a right of access, etc.
  • tangible assets include: houses, cars, boats, gems, livestock, chronographs, white goods, plant and machinery, etc.
  • Intangible assets include, without limitation: voting rights, licenses to undertake activities, legal claims, liens against other assets, powers of attorney, banking privileges, access to healthcare, access to housing, qualifications, professional privileges, memberships of organisations and so on.
  • Chain of custody is (a) a set of activities, typically a set of activities in relation to at least one asset or (b) a record of a set of activities, typically a set of activities in relation to at least one asset.
  • a chain of custody may for example comprise a chain of title in respect of an asset.
  • FIG. 1 provides a high level representation of the main functional elements of a system embodying the present invention.
  • Core system architecture 10 is in the present embodiment implemented in the cloud. The relevant functions are carried out in servers of any suitable form networked through a suitable digital network, which in the present embodiment is a wide area network ("WAN") and more specifically is the internet.
  • WAN wide area network
  • the core system architecture 10 is maintained and controlled by a trusted system administrator. Its functions include the following: recordal, storage and access control in respect of the chain of custody, management of access to other archived data, management of workflows in relation to system processes including, in this non limiting example, document production and document validation.
  • Production applications 12 include in some embodiments the creation of the artefact (in particular, but without limitation, the creation of an artefact in the form of a physical document), and also the creation of the associated chain of custody.
  • Validation applications 14 provide access to the chain of custody and in suitable cases to other archived data by approved persons. This is normally subject to a suitable process of user authentication. Validation applications enable validation of the chain of custody.
  • Users of the system may be of two or more different classes. Some users (“primary users”) are be able to make use of production applications (and typically also of validation applications). Other users (“end users”) are provided with access only to validation applications.
  • the system serves to regulate read and write access to an archive 16. While the word "archive” is used in the singular herein, the present invention is not limited to embodiments in which data is stored in a single repository.
  • the archive 16 in question may be implemented in any suitable form. It may be implemented in the cloud. It may wholly or partly be outside of the control of the system administrator. For example, some of the archived data may be held only by the primary users.
  • the archive 16 includes a secure distributed digital ledger 18 for storage of the chain of custody. In current embodiments of the invention this is implemented using blockchain. As is well known to the skilled person, a blockchain comprises a list of records, referred to as blocks, which are linked. Typically each block contains a hash of the previous block in the chain. Data in any given block cannot be altered retroactively without invalidating the chain.
  • the secure distributed ledger 18 provides a record of the chain of custody which is capable of being validated, and in which trust can be placed.
  • the archive (or archives) 16 used in implementing the invention may however comprise other records in other formats and in other physical or virtual data servers.
  • the artefact is a document
  • a digital version of the document will typically be archived in archive store 19.
  • Encryption is used to secure the archived data where appropriate.
  • Digital documents are for example stored in encrypted form.
  • Secure means such as public-key cryptography are employed in transmission of archive data to users. Specific embodiments relating to documents
  • An aspect of the present embodiment is a physical document format and a process of physical document production which provide a physical document especially well-suited to use in the present system.
  • FIG. 2 provides an example of a physical document 20 according to this aspect of the present invention.
  • the physical document 20 does not make use of a paper substrate, in the present embodiment. Instead it uses a substrate comprising polymer material. Specifically it uses a substrate 22 comprising polyethylene terephthalate ("PET"). Suitable PET-based print substrates are commercially available in a range of thicknesses and weights.
  • the substrate of the present embodiment has a triple layered structure (although each of the layers comprises PET) with upper and lower face faces being pigmented and top-coated to for receipt of print and sandwiching a middle layer. Markings applied to the upper and lower faces by printing processes can fuse in to the substrate in a manner that renders them indelible.
  • the physical document 20 carries printed information 24, which can comprise text, graphics or any other printable markings and which in this example includes human readable natural language information, on one or both of its faces.
  • the printed information 24 comprises information relating to the asset and to the activity. For example, in the case of a contract of sale, it will identify the property being sold (the asset) and the terms and conditions of the sale (the sale being the activity).
  • the physical document 20 carries additional visible markings applied by a process other than printing.
  • these comprise laser-etched markings 26.
  • Suitable laser etching devices are commercially available.
  • the laser is scanned over the marking area to selectively ablate at least the relevant upper or lower layer of the substrate.
  • the marking 26 thus has a characteristic appearance and also a certain (albeit small) depth in the direction perpendicular to the plane of the substrate.
  • the laser-etched marking 26 may correspond to a part of the printed imagery 24, so that it can be verified that one matches the other.
  • the physical document 20 carries document metadata comprising the archive key.
  • the document archive key comprises a unique identifier ("UID").
  • the document metadata, and in particular the archive key may be represented in any or all of: the printed information 24, the laser-etched marking 26, an electronic storage device 28, and computer-readable, non natural-language markings 30, 32.
  • the physical document 20 represented in Figure 2 incorporates an electronic metadata storage device 28 which stores the document metadata and which is readable by means of a separate device to obtain the document metadata.
  • the electronic metadata storage device 28 has a contactless interface for data exchange, and more specifically a radio frequency ("RF") interface.
  • RF radio frequency
  • it is a passive device, in the sense that it is configured to be powered by the interrogating RF field and so requires no on-board energy store. It comprises a memory in which the document metadata is to be stored, and sufficient processing capacity to output the document metadata to the interrogating device through the interface. Suitable devices are widely available at low cost, and may for example be self-adhesive or may be incorporated in the substrate 22.
  • the computer-readable, non natural-language markings in the present embodiment comprise a bar code 30 and a QR (RTM) type code 32.
  • FIG. 3 represents the steps involved, which typically start with a computer file representing content of the document.
  • the format of the document may be regulated by means of a document profile 33.
  • a print fulfilment service will typically carry out the preparation of the physical document.
  • the primary user who initiates the process of document generation will supply data for incorporation in the document to the print fulfilment service.
  • a UID is generated (step 40) for each document in the system and is included in the aforementioned document metadata carried by the document.
  • the UID may be generated by use of data from or about the document. For example the aforementioned file representing the document may be hashed to create the UID, so that a subsequent check can be made that the UID corresponds to the document. But the function of the UID is to identify the document and any suitable identifier may be used.
  • the UID may be generated by the core system under the control of the system administrator or it may be generated by the print fulfilment service. In either case the UID is stored in the archive 16, enabling it subsequently to be used to enable access to the chain of custody maintained in the archive 16.
  • the physical document 20 is printed. Any suitable printing technology may be used. Document metadata including in this example details of the printing and subsequent steps are recorded in the archive 16. The document metadata may be wholly or partly recorded in the secure distributed digital ledger 18 for later reference in relation to validation of the chain of custody.
  • step 44 laser etching is applied to the physical document 20 to form the laser-etched marking 26.
  • the physical document is scanned to create a corresponding digital document 47. Scanning may in principle be carried out by the primary user, by the print fulfilment service or by another party. For example, in the case of a document to be signed, the print fulfilment service will typically have the physical document 20 delivered to the primary user, who will have it signed. The primary user may then scan the physical document 20 and save the digital document in encrypted form in the archive 16. Transmission of the digital document 47 may be carried out using a secure process, e.g. by means of a public key infrastructure.
  • the scanning step may be omitted, the digital document being constructed from the same data used to create the printed document 20.
  • Some or all of the document metadata, including the archive key, is embedded in the physical document 20 (step 48).
  • This step (which may partially or whole be carried out during other steps in the process) may comprise recording the document metadata in the non natural- language markings 30, 32 and/or recording the document metadata in the metadata storage device 28.
  • the system comprises a validation gateway 50 through which end users are able to validate the chain of custody.
  • the gateway may comprise a downloadable application to be run on the end user's computing device, and/or it may be implemented through a website accessed through a browser on the end user's device.
  • the gateway can be accessed using any suitable networked digital device. Examples include smartphones 52, tablets, desk tops/PCs 54 harsh readers 56 (e.g. dedicated NFC readers) and so on.
  • smartphones 52 smartphones 52, tablets, desk tops/PCs 54
  • readers 56 e.g. dedicated NFC readers
  • Validation will often be done by use of the artefact.
  • the artefact in question might be a will, and the end user might be the executor.
  • the executor needs to validate the will, ensuring that (a) it is genuine, in the sense of being the will made by the deceased person and (b) that it is the latest version of the will, not having been replaced by a later will recorded on the system. Both checks can be made by reference to the archived chain of custody, once access to it has been obtained.
  • the process typically begins with authentication of the end user to gain access to the validation gateway. In this scenario the end user will often already have been required to register with the system through the validation gateway, and will have provided data required for authentication.
  • Any suitable means of authentication may be used, including without limitation (a) methods based on biometric data, e.g. using fingerprint scanning, facial recognition or other methods, (b) multi-factor authentication, (c) authentication based on exchange of a single use code, such as a code sent in an SMS message.
  • the archive key which in the present embodiment is the UID.
  • the archive key is read from the artefact (in this example the physical document 20) which may involve: interogation of the electronic metadata storage device 28, e.g. through an RF link; reading of the non natural-language markings 30, 32, which is typically an optical process and may for example be carried out using the camera of a smartphone.
  • the UID is transmitted through the WAN 60 to the core system architecture 10 through which access is granted to the data relating to the document 20 in the archive 16.
  • This access will typically include access to the chain of title stored in the secure distributed digital ledger 18. It may additionally include access to other related data which may comprise the digital document 47.
  • a chain of custody often develops over time, as activities take place.
  • the chain of custody comprises a chain of title to an asset
  • the asset may be sold.
  • the sale needs to be recorded in the chain of custody.
  • the system provides for recordal of such events by users.
  • the core system 10 may implement work flows for regulation of such recordal.
  • recordal takes place at the request of a user.
  • the process may include taking consent from another user.
  • an end user who purchases an asset may apply to record the purchase.
  • the core system 10 may be configured to apply to the current owner of record (identified in the secure distributed digital ledger) for consent to the recordal, and to record the activity (sale) in the chain of custody subject to provision of consent.
  • the processes involved in maintenance of the chain of custody may differ greatly from one commercial or practical context to another.
  • the system may offer multiple validation gateways 50 which are configured for use in different fields and which implement workflows suited to their respective fields. Gateways may be provided for and by specific users. Examples will be provided but these must be understood to be non-limiting.
  • a dedicated gateway may be run by or for an official body which grants certificates, such as a university (or group of universities) or a government department.
  • the asset is the facts averred to in the certificate.
  • the artefact is the certificate itself.
  • the activity is typically the issuance of the certificate - what the end user needs to be able to validate is the fact that the certificate was issued by the relevant body.
  • the chain of custody provides the data needed to validate the certificate and typically also other data about it - the identity of the grantee of the certificate, for example, and the main facts that are certified.
  • the system may provide means for confirmation that the person presenting the certificate is the same person named in the certificate, e.g. by virtue of the authentication process and/or through provision of other data (which may for example be biometric data relating to the named person) enabling the person to be identified.
  • Other dedicated gateways may be provided in relation to legal activities, such as the making of a will and its subsequent replacement or amendment, or the completion of a written contract.
  • Other dedicated gateways may be used in relation to banking activities, or regulatory compliance, or the sourcing of parts in industrial manufacture, or the sale of luxury goods, drugs, munitions, insurance and so on.
  • a search function for searching archived documents and material. This may provide for word searches. Artificial intelligence may be incorporated. Machine translation may be offered in order that material in a range of languages can be searched.
  • the system may enable identification of artefacts, documents or other material relevant to a specific chain of custody. Al element in 4Trust to undertake word searches in archived documents in any languages to identify artifacts that are in some way determined to be relevant to a specific chain of custody. Examples may include documents that support litigation, contractual obligations or regulatory compliance, but were not part of the original chain of custody and not referenced in the initial archive, but could be added into a new chain of custody.
  • Artefacts other than documents need not in all cases be a physical document.
  • the artefact and the asset may be the same physical entity.
  • the artefact may be any manufactured item or item of value capable of carrying the necessary metadata, and specifically the archive key.
  • the item in question may be a complete item, for example a motor vehicle, or it may be a component item, for example the engine block of a motor vehicle.
  • the present system provides an advantageous means of recording and tracking chains of custody both during manufacture and assembly (for security against the use of counterfeit or otherwise illegitimate components) and after the item has been put on the market (as for example where a used motor vehicle is sold, and the purchaser needs to validate the provenance of the vehicle).
  • the archive key may be embedded in or on the item by any suitable means, be it in the form of a computer-readable, non natural- language code, or in an electronic metadata storage device, or in a natural language marking.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne un procédé et un système d'enregistrement et de validation de chaînes de contrôle. Une chaîne de contrôle comprend une ou plusieurs activités, se rapportant typiquement à un actif. Un artéfact est attribué à chaque chaîne de contrôle. Une clé d'archive est créée pour référencer la chaîne de contrôle. La clé d'archive est enregistrée sur l'artéfact. Un enregistrement de la chaîne de contrôle, en référence à l'utilisation de la clé d'archive, est créé dans une archive comprenant un grand livre numérique distribué. Le registre numérique distribué est, de préférence, mis en œuvre à l'aide d'une chaîne de blocs. Une passerelle de validation accessible à des utilisateurs finaux par le biais d'un réseau étendu est fournie, de préférence par le biais d'une application téléchargeable ou d'un site web. La passerelle de validation est configurée pour mettre en œuvre un processus de validation dans lequel : un utilisateur final s'authentifie auprès de la passerelle de validation ; la clé d'archive est lue à partir de l'artéfact et transmise à la passerelle de validation ; et un accès à la chaîne de contrôle référencée à l'aide de la clé d'archive est accordé à l'utilisateur final.
PCT/GB2019/051922 2018-07-27 2019-07-08 Système et procédé de gestion de chaînes de contrôle WO2020021228A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB1812274.7 2018-07-27
GBGB1812274.7A GB201812274D0 (en) 2018-07-27 2018-07-27 System and method for management of chains of custody

Publications (1)

Publication Number Publication Date
WO2020021228A1 true WO2020021228A1 (fr) 2020-01-30

Family

ID=63518067

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2019/051922 WO2020021228A1 (fr) 2018-07-27 2019-07-08 Système et procédé de gestion de chaînes de contrôle

Country Status (2)

Country Link
GB (1) GB201812274D0 (fr)
WO (1) WO2020021228A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113034265A (zh) * 2020-11-24 2021-06-25 腾讯科技(深圳)有限公司 数据验证方法、装置、计算机设备及计算机可读存储介质
WO2021163668A1 (fr) * 2020-02-13 2021-08-19 Hashquin Llc Systèmes et procédés de marquage et d'authentification d'articles rares
CN113961895A (zh) * 2021-09-18 2022-01-21 惠州Tcl移动通信有限公司 一种基于人脸识别的信息安全防护方法、系统及终端设备
US20220101340A1 (en) * 2020-09-28 2022-03-31 Bank Of America Corporation Distributed Ledgers for Enhanced Chain of Custody Certification

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100258636A1 (en) * 2001-12-24 2010-10-14 George Theodossiou Laser Etched Security Features for Identification Documents and Methods of Making Same
US20170345019A1 (en) * 2016-05-27 2017-11-30 Chronicled, Inc. Open registry for internet of things

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100258636A1 (en) * 2001-12-24 2010-10-14 George Theodossiou Laser Etched Security Features for Identification Documents and Methods of Making Same
US20170345019A1 (en) * 2016-05-27 2017-11-30 Chronicled, Inc. Open registry for internet of things

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SILVIA BONOMI ET AL: "B-CoC: A Blockchain-based Chain of Custody for Evidences Management in Digital Forensics", ARXIV.ORG, CORNELL UNIVERSITY LIBRARY, 201 OLIN LIBRARY CORNELL UNIVERSITY ITHACA, NY 14853, 26 July 2018 (2018-07-26), XP081254374 *
TEEMU RISSANEN: "Electronic identity in Finland: ID cards vs. bank IDs", IDENTITY IN THE INFORMATION SOCIETY, vol. 3, no. 1, 6 March 2010 (2010-03-06), pages 175 - 194, XP055373833, DOI: 10.1007/s12394-010-0049-8 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021163668A1 (fr) * 2020-02-13 2021-08-19 Hashquin Llc Systèmes et procédés de marquage et d'authentification d'articles rares
US20210258144A1 (en) * 2020-02-13 2021-08-19 Hashquin Llc Systems and methods for marking and authenticating scarce items
US20220101340A1 (en) * 2020-09-28 2022-03-31 Bank Of America Corporation Distributed Ledgers for Enhanced Chain of Custody Certification
US11803864B2 (en) * 2020-09-28 2023-10-31 Bank Of America Corporation Distributed ledgers for enhanced chain of custody certification
US20240013236A1 (en) * 2020-09-28 2024-01-11 Bank Of America Corporation Distributed Ledgers for Enhanced Chain of Custody Certification
CN113034265A (zh) * 2020-11-24 2021-06-25 腾讯科技(深圳)有限公司 数据验证方法、装置、计算机设备及计算机可读存储介质
WO2022111196A1 (fr) * 2020-11-24 2022-06-02 腾讯科技(深圳)有限公司 Procédé et appareil de vérification de données, dispositif informatique et support de stockage lisible par ordinateur
CN113034265B (zh) * 2020-11-24 2024-05-07 腾讯科技(深圳)有限公司 数据验证方法、装置、计算机设备及计算机可读存储介质
CN113961895A (zh) * 2021-09-18 2022-01-21 惠州Tcl移动通信有限公司 一种基于人脸识别的信息安全防护方法、系统及终端设备

Also Published As

Publication number Publication date
GB201812274D0 (en) 2018-09-12

Similar Documents

Publication Publication Date Title
Gresch et al. The proposal of a blockchain-based architecture for transparent certificate handling
CN112950220B (zh) 一种基于区块链的企业数字身份管理系统及方法
Ghazali et al. A graduation certificate verification model via utilization of the blockchain technology
WO2020021228A1 (fr) Système et procédé de gestion de chaînes de contrôle
US20060010487A1 (en) System and method of verifying personal identities
CA2436143A1 (fr) Procedes et systemes permettant de representer electroniquement des enregistrements d'obligations
Hsu et al. Design of an e-diploma system based on consortium blockchain and facial recognition
Noack et al. The introduction of online authentication as part of the new electronic national identity card in Germany
Shope The bill of lading on the blockchain: an analysis of its compatibility with international rules on commercial transactions
Thakare et al. Verificate–Transforming Certificate Verification Using Blockchain Technology
AU2023219787A1 (en) Identity verification and associated platform
Smith The role of the notary in secure electronic commerce
Blythe Croatia’s computer laws: promotion of growth in E-commerce via greater cyber-security
US20070300067A1 (en) Notice of Revocation System for Revocable or Modifiable Documents
Said et al. A blockchain-based conceptual model to address educational certificate verification challenges in Tanzania
Boudrez et al. Digital archiving
Hardjono et al. Core identities for future transaction systems
Broderick et al. Electronic signatures: they’re legal, now what?
Negasa et al. A Blockchain-Enabled Digital Document Locker and Verification Model for Ethiopia.
Barde et al. Blockchain Technology: Worldwide Supplier of Digital Services and Technology–Tactics, Methods, Limitations, and Performance
US20240070662A1 (en) Non-fungible token document platform
JP7477937B1 (ja) 鑑定証明システム、及び鑑定証明方法
Wijaksono et al. Execution of Blockchain in The World of Archive
US20230368186A1 (en) Process for Creation storage retrieval of immutable NFT Non-fungible token based electronic book publishing on a decentralized proof ofstake blockchain
Goswami et al. Document verification using Blockchain

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19746131

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19746131

Country of ref document: EP

Kind code of ref document: A1