专利摘要:
the present invention relates to a method of using digital signatures to sign blockchain transactions that includes: generating a pair of domain keys comprising a private domain key and a public domain key, where the public domain key is signed after its generation; receive a plurality of public keys from members, in which each member public key is received from an associated member of a blockchain network and is a public key in a key pair comprising a member public key and a private key from member corresponding to the associate member; sign each member public key using the private domain key; receiving a transaction block from a specific member of the blockchain network, in which the transaction block includes a plurality of blockchain transaction values and a hash function signed using the member private key corresponding to the specific member; sign the block of transactions received using the private domain key; and transmit the signed transaction block.
公开号:BR112018011775B1
申请号:R112018011775-7
申请日:2016-12-14
公开日:2020-02-11
发明作者:David J. King
申请人:Mastercard International Incorporated;
IPC主号:
专利说明:

Invention Patent Descriptive Report for METHOD AND SYSTEM OF USE OF DIGITAL SIGNATURES TO SIGN BLOCKCHAIN TRANSACTIONS.
CROSS REFERENCE TO RELATED PATENT APPLICATIONS [001] This patent application claims priority and benefit from the filing date of US patent application, serial number 14 / 976,331, filed on December 21, 2015, which is incorporated here at its entirety by reference.
TECHNICAL FIELD [002] The present invention relates to the use of digital signatures to sign Blockchain transactions, more specifically, the use of digital signatures by multiple entities in the signature and validation of Blockchain transactions to increase security and make validation more efficient.
BACKGROUND [003] Blockchains are used as a public fiscal book for electronic transactions. Each new transaction block added to the Blockchain provides additional validation of the previous blocks, which makes the Blockchain increasingly solid over time. As old Blockchain blocks never change and Blockchain neither loses nor discards old blocks, Blockchain becomes an immutable, yet publicly accessible record of all transactions. Blockchains can also offer additional benefits that encourage their use in conducting electronic transactions, such as anonymity and security.
[004] To generate new blocks, several Blockchains depend on an extensive computational capacity that uses a dispersion algorithm combined with brute force search to generate a hash function that corresponds to the previous block on the Blockchain. For
Petition 870190010582, of 01/31/2019, p. 11/16
2/43 encourage participation in the search, Blockchains generally allow the participation of any user with any suitable computing device and also offer a reward to the user who can find a suitable hash value. As more users participate and computing capacity increases, Blockchains can cope with increasing energy expenditure and computing capacity.
[005] Thus, there is a need for a technical solution whereby new blocks can be generated for the Blockchain, which are reliable and safe, but which do not result in significant computational and energy expenditure. The use of signatures by verified and trusted participants can ensure that the new blocks are reliable and safe, as well as allowing the blocks to be properly verified for inclusion in the Blockchain and require significantly less computational capacity. In addition, using only trusted entities, the group of participants can be limited, which can decrease the amount of energy spent on producing new blocks for the Blockchain. Thus, there is a need for a technical solution that uses a trusted group of participants and digital signatures to sign Blockchain transactions.
SUMMARY [006] The present invention provides a description of systems and methods for using digital signatures in signing Blockchain transactions.
[007] A method of using digital signatures to sign Blockchain transactions includes: generating, through a generation module of a processing server, a domain key pair comprising a private domain key and a domain key public, where the public domain key is signed after
Petition 870190010582, of 01/31/2019, p. 11/171
3/43 its generation; receive, through a receiving device from the processing server, a plurality of public keys from members, in which each member public key is received from an associated member of a Blockchain network and is a public key in a pair of keys comprising a member public key and a member private key corresponding to the associate member; sign, via a processing server signature module, each member public key of the plurality of members public keys using the private domain key; receive, via the processing server's receiving device, a transaction block from a specific member of the Blockchain network, in which the transaction block includes a plurality of Blockchain transaction values and a signed hash function using the key private member corresponding to the specific member; sign, via the processing server's subscription module, the block of transactions received using the private domain key; and transmitting the signed transaction block electronically, by means of a transmission device from the processing server.
[008] Another method of using digital signatures to sign Blockchain transactions includes: storing, in a memory of a processing server, the Blockchain, in which the Blockchain includes a plurality of transaction blocks, each block of transactions including at least a plurality of Blockchain transaction values; generate, by means of a processing server generation module, a member key pair comprising a member private key and a member public key; transmit electronically, through a transmission device from the processing server, the member public key generated to a signatory authority associated with a Blockchain network;
Petition 870190010582, of 01/31/2019, p. 11/18
4/43 receive, via a receiving device from the processing server, a plurality of Blockchain transaction values comprising a new transaction block; map, using a processing server hash module; a first hash value by applying one or more scatter algorithms to a specific block of the plurality of transaction blocks included in the Blockchain; generate, through the generation module of the processing server, a second hash value, in which the second hash value corresponds to the first hash value; sign, through a signature module of the processing server, the second hash value generated using the generated private member key; and transmit electronically, via the processing server's transmission device, the new transaction block and the second signed hash value to the signatory authority.
[009] A system of using digital signatures to sign Blockchain transactions includes: a transmission device from a processing server; a processing server generation module configured to generate a domain key pair comprising a private domain key and a public domain key, where the public domain key is signed after its generation; a processing server receiving device configured to receive a plurality of public keys from members, in which each member public key is received from an associated member of a Blockchain network and is a public key in a key pair comprising a member public key and a member private key corresponding to the associate member; and a processing server signature module configured to sign each member public key from the plurality of members public keys
Petition 870190010582, of 01/31/2019, p. 11/191
5/43 using the private domain key. The receiving device of the processing server is also configured to receive a transaction block from a specific member of the Blockchain network, in which the transaction block includes a plurality of Blockchain transaction values and a signed hash function using the key private member corresponding to the specific member The processing server signature module is also configured to sign the block of incoming transactions using the private domain key. The processing device of the processing server is also configured to electronically transmit the signed transaction block.
[0010] Another system for using digital signatures in signing Blockchain transactions includes: a signature module from a processing server; a processing server memory configured to store the Blockchain, wherein the Blockchain includes a plurality of transaction blocks, each transaction block including at least a plurality of Blockchain transaction values; a processing server generation module configured to generate a member key pair comprising a member private key and a member public key; a processing server transmission device configured to electronically transmit the generated public member key to a signatory authority associated with a Blockchain network; a processing server receiving device configured to receive a plurality of Blockchain transaction values comprising a new transaction block; and a processing server hash module configured to generate a first hash value by applying one or more spreading algorithms to a specific block from the plurality of transaction blocks included in the
Petition 870190010582, of 01/31/2019, p. 11/20
6/43
Blockchain. The processing module of the processing server is also configured to generate a second hash value, in which the second hash value corresponds to the first hash value. The processing server signature module is configured to sign the second generated hash value using the generated private member key. The processing device of the processing server is configured to electronically transmit the new transaction block and the second signed hash value to the signatory authority.
BRIEF DESCRIPTION OF THE DRAWINGS [0011] The scope of the present invention will be better understood from the following detailed description of the exemplary modalities when read in conjunction with the attached drawings, in which: [0012] Figure 1 is a block diagram illustrating a high-level system architecture for signing Blockchain transactions that uses digital signatures according to exemplary modalities.
[0013] Figure 2 is a block diagram illustrating the signatory authority's server in Figure 1 to verify transactions signed via Blockchain and digitally sign Blockchain blocks according to the exemplary modalities.
[0014] Figure 3 is a block diagram that illustrates the member processing server in Figure 1 to digitally sign Blockchain transactions and validate them according to exemplary modalities.
[0015] Figure 4 is a flow diagram that illustrates a process flow to generate, sign and distribute keys to be used to digitally sign Blockchain transactions according to the exemplary modalities.
[0016] Figure 5 is a flow diagram that illustrates a process
Petition 870190010582, of 01/31/2019, p. 11/211
7/43 to create and digitally sign blocks of Blockchain transactions to be included in the Blockchain according to the exemplary modalities.
[0017] Figures 6 and 7 are flowcharts that illustrate exemplary methods for using digital signatures in signing Blockchain transactions according to the exemplary modalities. [0018] Figure 8 is a block diagram that illustrates a computer system architecture according to the exemplary modalities.
[0019] Other areas of applicability of the present invention will become evident from the detailed description provided below. It is worth noting that the detailed description of the exemplary modalities serves the purpose of illustration only and, therefore, is not intended to necessarily limit the scope of the invention.
DETAILED DESCRIPTION
Glossary of Terms [0020] Blockchain - A public fiscal book of all transactions in a Blockchain-based currency. One or more computing devices can comprise a Blockchain network, which can be configured to process and record transactions as part of a block on the Blockchain. As soon as a block is completed, it is added to the Blockchain and the transaction record updated. In several cases, Blockchain can be a fiscal book of transactions organized in chronological order, or it can be presented in any other order whose use is suitable for the Blockchain network. In some configurations, transactions registered on the Blockchain may include a destination address and an amount of currency so that the Blockchain can record how much currency is attributable to a specific address. In some cases, additional information may be captured, such as a source address, date and time,
Petition 870190010582, of 01/31/2019, p. 11/22
8/43 etc. In some modalities, Blockchain may also consist of additional data and, in some cases, arbitrary data that is confirmed and validated by the Blockchain network through proof of work and / or any other appropriate verification techniques associated with it. In some cases, such data may be included in the Blockchain as part of transactions, as included in additional data attached to the transaction data. In some cases, the inclusion of such data on the Blockchain may constitute a transaction. In such cases, Blockchain may not be directly associated with a specific digital and virtual approval or other type of currency.
Blockchain Transaction Signature System Using Digital Signatures [0021] Figure 1 illustrates a system 100 for the signature of Blockchain transactions by a trusted group of participants using verifiable digital signatures.
[0022] System 100 can include a signatory authority server 102. Signatory authority server 102, discussed in more detail below, can be associated with Blockchain and configured to digitally sign the Blockchain transaction blocks to be included in the Blockchain. In some cases, the Blockchain can be associated with a single server of the signatory authority 102, which can digitally sign each block that is added to the Blockchain. In other cases, the Blockchain can be associated with multiple signatory authority servers 102, each of which can be configured to digitally sign the blocks added to the Blockchain separately, either with simultaneous or redundant subscription. In the latter cases, different signatory authority servers 102 may have different keys for separate validation of the blocks respectively signed by the
Petition 870190010582, of 01/31/2019, p. 11/23
9/43 member systems, or they can use the same keys, with the resulting signed blocks having their accuracy compared and being validated by a member system or another signatory authority server 102.
[0023] System 100 may also include a plurality of member processing servers 104, illustrated in Figure 1, as member processing servers 104a and 104b. Member processing servers 104, discussed in more detail below, can be associated with Blockchain and can be configured to digitally sign Blockchain transactions and create blocks to be included in the Blockchain. Member processing servers 104 can also be configured to digitally validate signed blocks that were signed by other member processing servers 104 and / or signatory authority servers 102 prior to their inclusion in the Blockchain. As discussed here, signatory authority 102 servers and member processing servers 104 can comprise a Blockchain network, which can be interpreted by people versed in the relevant technique as referring to the systems and infrastructure used in the management and maintenance of the Blockchain. .
[0024] System 100 may also include a plurality of participant devices 106, illustrated in Figure 1 as the participant devices 106a, 106b, 106c, 106d, 106e and 106f. Each participant device 106 can be a computing device suitable for adding new Blockchain transactions to a member processing server 104, for inclusion in a new block to be added to the Blockchain. The computing device can be a desktop computer, a laptop computer, a notebook computer, a
Petition 870190010582, of 01/31/2019, p. 11/24
10/43 table, cell phone, smart phone, smart television, smart watch, wearable computing device, implantable computing device, etc. Participant device 106 can electronically transmit the data associated with a Blockchain transaction to a member processing server 104 to be launched on the Blockchain. The data transmitted to the member processing server 104 can be based on the type of transaction, Blockchain properties and other criteria, as well as include, for example, a source address, a destination address and a quantity of currency of Blockchain to be transferred. In some cases, multiple source addresses or destination addresses may be included, and a source address may be digitally signed by the participant device 106 for validation as an authorized user of the associated Blockchain currency.
[0025] For use in the digital signature of blocks and other data, the signatory authority's server 102 can generate a pair of domain keys. The domain key pair can consist of a private domain key and a corresponding public domain key. Domain keys can be used for signing blocks and other data, where the private domain key can be used to sign data and where the public domain key can be used (for example, by another entity, such as a member processing server 104) to validate or otherwise verify the signature. The domain key pair can be generated using any suitable algorithm for generating the key pair. Digitally signing data using the private domain key can use any suitable method for digitally signing data using a private key that is consistent with the functions discussed here.
Petition 870190010582, of 01/31/2019, p. 11/25
11/43 [0026] As soon as the domain key pair is generated, the signatory authority server 102 can have the public domain key signed. In some embodiments, the public domain key can be self-signed by the signatory authority's server 102. In some cases, the public domain key can be self-signed only if the signatory authority's server 102 and member processing servers 104 are part of a closed network used to access and / or send to associated Blockchain. In other embodiments, the public domain key can be signed by a public authority, such as a trusted third party configured to sign public keys. The trusted third party can sign the public domain key, the signature of which can be validated by one or more member processing servers 104 on the Blockchain network.
[0027] Each member processing server 104 can also generate a key pair, referred to here as a member key pair. Each member key pair can consist of a member private key and a corresponding member public key. In some embodiments, the member key pair can be generated using the same key pair generation algorithm used by the signatory authority's server 102 when generating the domain key pair. Each member processing server 104 can securely store its respective member private key and can electronically transmit its respective member public key to a server of the signatory authority 102 to sign it. Member public keys can be electronically transmitted to a signatory authority server 102 via overlay on a data signal that is transmitted using any suitable type of network or communication method, such as a local area network, a network of area
Petition 870190010582, of 01/31/2019, p. 11/26
12/43 wide, a wireless area network, radio frequency, Bluetooth, near field communication, the Internet, etc.
[0028] The signatory authority's 102 server can be configured to sign each of the public keys of members using the private domain key. Public keys of already signed members can then be returned to member processing servers 104 for later use in validating signed blocks and Blockchain transactions. In some embodiments, each member processing server 104 may receive a publicly signed member key from one or more different member processing servers 104 on the Blockchain network, such as for use in validating signatures made by one or more member servers processing of different members 104. In some cases, the signatory authority server 102 may also distribute the public domain key already signed to one or more member processing servers 104, for use in validating signatures made by the signatory authority's server 102 using the private domain key.
[0029] In some embodiments, the signatory authority server 102 can be configured to authenticate a member processing server 104 prior to the distribution of any key to the member processing server 104. Authentication of member processing servers 104 can be performed using the standard registration scheme whereby a member processing server 104 and / or the entity associated with it can register with the signatory authority's server 102 as a trusted server for use in digitally signing transactions. Blockchain. For example, a 104 member processing server can provide industry credentials, identification information, detailed
Petition 870190010582, of 01/31/2019, p. 11/271
13/43 device, etc. as part of the registration process for signatory authority 102, which can verify the authenticity of the data and register the server as a member processing server 104 on the Blockchain network to which keys can be delivered. In some cases, the signatory authority's server 102 may be configured to ascertain or otherwise determine the suitability of a processing server that is attempting to register as a member processing server 104 for use in the digital signature of Blockchain transactions. This determination can be based, for example, on the technology level of the processing server, on the security protocols being used by the server and on the computing system, associated internal network infrastructure, etc. In some cases, the signatory authority server 102 may restrict the number of member processing servers 104, such as to a trusted group of member processing servers 104 and of a limited size for security reasons.
[0030] After being registered and receiving the public keys of signed members and the public domain key signed, a member processing server 104 can receive the Blockchain transactions to be posted on the Blockchain. To generate a new block for the Blockchain, the member processing server 104 must search for a hash function that corresponds to the hash of the previous block in the Blockchain where the new block will be added. The member processing server 104 can map the previous block using one or more scatter algorithms suitable for obtaining a first hash value. The member processing server 104 can then fetch a second hash value that corresponds to the first hash value. The match can be exact (for example, when both hash values are
Petition 870190010582, of 01/31/2019, p. 11/28
14/43 equivalents) or can correspond in one or more different ways, such as when the second hash value is the inverse of the first hash value, when characters of the hash value are equivalent to a specific number, when the numbers of the last characters of the first hash value are equivalent to the number of the first characters of the second hash value, etc. Acceptable match can be based on a desired time frame for the search, a desired security level, preferences of the Blockchain network, etc.
[0031] After a suitable second hash value is found, member processing server 104 can sign the hash value using its private member key. And then, the member processing server 104 can electronically transmit a block composed of the Blockchain transactions and the signed hash value on the signatory authority's server 102. The signatory authority's server 102 can then sign the block using its private domain key. . The signatory authority server 102 can distribute the digitally signed block so that one or more member processing servers 104 can perform its validation. In some embodiments, the digitally signed block can be validated by a member processing server 104 other than the member processing server 104 from which the block originates. For example, in the case illustrated in figure 1, the member processing server 104a can provide the transactions and the signed hash value to the signatory authority server 102 and the signed block can be delivered to the member processing server 104b for validation. .
[0032] The member processing server 104 may use the signed public domain key, associated with the signatory authority server 102 that signed the block, as well as the key
Petition 870190010582, of 01/31/2019, p. 11/29
15/43 public member already signed that is associated with the member processing server 104 that signed the hash value to validate the block. The validation of the block can include the application of the public domain key already signed to the signed block using an appropriate dispersion algorithm to generate the transactions and the signed hash value, as well as the application of the public key of members already signed to the value signed hash to generate the unsigned hash value. The unsigned hash value can then be verified to be equivalent to the hash value of the previous block on the Blockchain to which the new block is to be added. Once the block is validated, the new block can be added to the Blockchain. In some embodiments, the block can be validated primarily by multiple member processing servers 104. In some cases, a new block can be validated by a participant device 106. In this case, the participant device 106 can receive the domain key public signature already signed and the public key of members already signed for use in validating the signed block as discussed above. In some cases, the member processing server 104 or the participant device 106 that performs the validation may also validate a public domain key trust chain certificate, such as that used in the signing of the public domain key by the third party trustworthy.
[0033] The methods and systems discussed here can provide the signature and validation of new blocks of Blockchain transactions on a Blockchain that can be performed using less computational capacity and reducing energy expenditure, while maintaining the same level of security used in existing Blockchain systems. With the use of digital signatures, the security and authenticity of transaction blocks can be preserved,
Petition 870190010582, of 01/31/2019, p. 11/30
16/43 using less computational capacity, which can also result in a more efficient addition of blocks to the Blockchain and, in turn, deny the use of additional nodes in the Blockchain network and reduce energy expenditure. In addition, the use of digital signatures may also allow participant devices 106 to validate transaction blocks, which would be impossible or impractical for devices of participants on traditional Blockchain networks due to computational demands.
Signatory Authority Server [0034] Figure 2 illustrates a modality of the signatory authority server 102 of system 100. Obviously, people skilled in the relevant technique will understand that the modality of the signatory authority 102 illustrated in figure 2 is provided only as an illustration and which may not be thorough in all possible server configurations of the signatory authority 102 suitable for the performance of the functions as discussed here. For example, the computer system 800 illustrated in figure 8 and discussed in more detail below can be an appropriate configuration of the signatory authority server 102.
[0035] The signatory authority server 102 may include a receiving device 202. Receiving device 202 may be configured to receive data over one or more networks via one or more network protocols. In some cases, the receiving device 202 may also be configured to receive data from member processing servers 104, participant devices 106 and other entities through suitable communication networks, such as local area networks, networks of wide area, radio frequency networks, the Internet. In some embodiments, the receiving device 202 may consist of multiple devices, such as different devices
Petition 870190010582, of 01/31/2019, p. 11/311
17/43 receiving device to receive data through different networks, such as a first receiving device to receive data via near field communication and a second receiving device to receive data via the Internet. The receiving device 202 can receive electronically transmitted data signals, in which the data can be superimposed on the data signal, decoded, analyzed, read or otherwise obtained by receiving the data signal by the receiving device 202. In some In such cases, the receiving device 202 may include an analysis module for analyzing the received data signal to obtain the data superimposed on it. For example, the receiving device 202 may include an analysis program configured to receive and transform the received data signal into a usable register for the functions performed by the processing device to execute the methods and systems described here.
[0036] Receiving device 202 can be configured to receive data signals electronically transmitted by member processing servers 104. Data signals coming from member processing servers 104 can be superimposed on members' public keys for signing, transaction blocks and the signed hash values used for signing, as well as the results of the validations performed on the signed transaction blocks. The receiving device 202 can also be configured to receive data signals electronically transmitted by the devices of participants 106, which can be superimposed on the validation results. In some embodiments, the receiving device 202 can receive data signals from third parties, such as data signals received during the domain key signature
Petition 870190010582, of 01/31/2019, p. 11/31
Public 18/43.
[0037] The signatory authority server 102 may also include a communication module 204. The communication module 204 may be configured to transmit data between modules, mechanisms, databases, memories and other components of the signatory authority server 102 for use in performing the functions discussed here. The communication module 204 can be composed of one or more types of communication and use several communication methods for communications within a computing device. For example, the communication module 204 can consist of a bus, contact pin connectors, wires, etc. In some embodiments, the communication module 204 can also be configured to communicate with the internal components of the signatory authority server 102 and the external components of the signatory authority server 102, such as externally connected databases, display devices, devices input, etc. The signatory authority server 102 may also include a processing device. The processing device can be configured to perform the functions of the signatory authority server 102 discussed here as will become apparent to persons skilled in the relevant technique. In some embodiments, the processing device may include and / or be composed of a plurality of mechanisms and / or modules specially configured to perform one or more functions of the processing device, such as a query module 206, a generation module 208 , a signature module 210, an authentication module 212, etc. As used here, the term module can be software or hardware particularly programmed to receive an input, execute one or more processes using the input and provide an output. Input, output and processes
Petition 870190010582, of 01/31/2019, p. 11/33
19/43 executed by several modules will become evident to a person skilled in the art based on the present invention.
[0038] The signatory authority's server 102 may include a query module 206. The query module 206 can be configured to perform queries against databases to identify information. Query module 206 can receive one or more data values or query strings and can execute a query string based on them in an indicated database, such as a memory 216, to identify information stored therein. The query module can then send the identified information to an appropriate mechanism or module on the signatory authority's server 102 when necessary. Query module 206 can, for example, perform a query in memory 216 to identify keys, Blockchain data and other data for use in the methods discussed here.
[0039] The signatory authority server 102 may include a generation module 208. Generation module 208 may be configured to generate a key pair and shared sensitive information. The generation module 208 can receive a request as input, can perform the requested functions to generate data and can send the requested data to be used by another module or server mechanism of the signatory authority 102. For example, the generation module 206 can be configured to generate a key pair, such as a domain key pair used in signing and validating new blocks of Blockchain transactions to be included in the Blockchain. The generation module 206 can be configured to generate a domain key pair using any suitable key pair generation algorithm. The domain key pair can consist of a private domain key and a corresponding public domain key.
Petition 870190010582, of 01/31/2019, p. 11/34
20/43 [0040] The signatory authority's server 102 can also include a signature module 210. Signature module 210 can be configured to receive data to be signed, can sign the data using a private key, and can send the signed data for another module or server mechanism of the signatory authority 102. In some cases, signature module 210 may also be provided with a private key for use in signing. In other cases, signature module 210 may obtain the private key, such as by sending an instruction to query module 206 to identify a private key in memory 216 to be used in signing the data. Signature module 210 can be configured, for example, to sign public member keys and completed transaction blocks using the private domain key generated by generation module 208. In some embodiments, signature module 210 can also be configured to self-sign the private domain key generated by the generation module 208.
[0041] The signatory authority's server 102 can also include an authentication module 212. Authentication module 212 can be configured to receive data for authentication, can authenticate data and can send a result (for example, success or failure) from authentication to another module or mechanism of the signatory authority server 102. For example, the signatory authority server 102 can receive data from a member processing server 104 (for example, received through the receiving device 202), which can be authenticated by authentication module 212 as part of a standard registration process, which can register member processing server 104 as a node on the Blockchain network.
[0042] The signatory authority's 102 server can also
Petition 870190010582, of 01/31/2019, p. 11/35
21/43 include a transmission device 214. The transmission device 214 may be configured to transmit data over one or more networks via one or more network protocols. In some cases, transmission device 214 may be configured to transmit data to member processing servers 104, participant devices 106 and other entities through suitable communication networks, such as local area networks, wide area networks , radio frequency networks, the Internet. In some embodiments, the transmission device 214 can be composed of multiple devices, such as different transmission devices for transmitting data over different networks, such as a first transmission device for transmitting data via near field communication and a second transmission device to transmit data over the Internet. The transmission device 214 can electronically transmit data signals containing overlapping data that can be analyzed by a receiving computing device. In some cases, the transmission device 214 may include one or more modules to overlap, encode or otherwise format data in data signals suitable for transmission.
[0043] Transmission device 214 can be configured to transmit data signals electronically to member processing servers 104. Data signals electronically transmitted to member processing servers 104 can be superimposed on signed public keys, including keys public memberships already signed and public domain keys already signed, and transaction blocks signed for validation. Transmission device 214 can also be configured to electronically transmit data signals overlaid on signed transaction blocks to be
Petition 870190010582, of 01/31/2019, p. 36/111
22/43 validated by the devices of participants 106. In some cases, the transmission device 214 can also be configured to electronically transmit data signals to third parties, such as data signals overlaid on public domain keys to be signed by an entity reliable third.
[0044] Signatory authority server 102 can also include memory 216. Memory 216 can be configured to store data to be used by the signatory authority server 102 in performing the functions discussed here. Memory 216 can be configured to store data using suitable data formatting methods and schemes and can be any type of suitable memory, such as read-only memory, random access memory, etc. Memory 216 may include, for example, a private domain key, a signed public domain key, member public keys already signed, data associating each member public key already signed with a member processing server 104, a Blockchain, etc. Memory 216 can be configured to store the key pair generation algorithm, scatter algorithms and other algorithms for use in performing the functions of the signatory authority server 102 discussed here.
Signatory Authority Server [0045] Figure 2 illustrates an embodiment of the member processing server 104 of the system 100. Obviously, people skilled in the relevant technique will understand that the member processing server 104 illustrated in figure 2 is provided only as illustration and may not be thorough about all possible configurations of the appropriate member processing server 104 to perform the functions as discussed here. For example, computer system 800 illustrated in figure 8
Petition 870190010582, of 01/31/2019, p. 37/111
23/43 and discussed in more detail below may be an appropriate configuration of the member processing server 104.
[0046] The member processing server 104 may include a receiving device 302. The receiving device 302 can be configured to receive data over one or more networks via one or more network protocols. In some cases, the receiving device 302 can also be configured to receive data from signatory authority servers 104, participant devices 106 and other entities through suitable communication networks, such as local area networks, area networks broadband, radio frequency networks, the Internet. In some embodiments, the receiving device 302 can be composed of multiple devices, such as different receiving devices for receiving data through different networks, such as a first receiving device for receiving data via near field communication and a second receiving device to receive data over the Internet. The receiving device 302 can receive electronically transmitted data signals, in which the data can be superimposed on the data signal, decoded, analyzed, read or otherwise obtained by receiving the data signal by the receiving device 302. In some In such cases, the receiving device 302 may include an analysis module to analyze the received data signal to obtain the data superimposed on it. For example, the receiving device 302 may include an analysis program configured to receive and transform the received data signal into a usable register for the functions performed by the processing device to execute the methods and systems described here.
[0047] Receiving device 302 can be configured
Petition 870190010582, of 01/31/2019, p. 38/111
24/43 to receive data signals electronically transmitted by signatory authority servers 102. Data signals received from signatory authority servers 102 can be superimposed on already signed public domain keys and public keys of already signed members, as well as as transaction blocks signed for validation by the member processing server 104. Receiving device 302 can also be configured to receive data signals from devices of participants 106, which can be superimposed on Blockchain transactions for inclusion in a new block, as well as validation results in cases where participant devices 106 can perform the validation of new blocks.
[0048] The member processing server 104 can also include a communication module 304. The communication module 304 can be configured to transmit data between modules, mechanisms, databases, memories and other components of the member processing server 104 for use in performing the functions discussed here. The 304 communication module can be composed of one or more types of communication and use several communication methods for communications within a computing device. For example, the communication module 304 can consist of a bus, contact pin connectors, wires, etc. In some embodiments, the communication module 304 can also be configured to communicate with the internal components of the member processing server 104 and the external components of the member processing server 104, such as externally connected databases, display devices , input devices, etc. The member processing server 104 may also include a processing device. The device
Petition 870190010582, of 01/31/2019, p. 39/111
25/43 processing can be configured to perform the member processing server 104 functions discussed here as will become apparent to persons skilled in the relevant technique. In some embodiments, the processing device may include and / or be composed of a plurality of mechanisms and / or modules specially configured to perform one or more functions of the processing device, such as a query module 306, a generation module 308 , a subscription module 310, a validation module 312, etc. As used here, the term module can be hardware particularly programmed by special purpose software to receive input, execute one or more processes using the input, and provide an output. The input, output and processes performed by various modules will become apparent to a person skilled in the art based on the present invention.
[0049] The member processing server 104 can include a query module 306. The query module 306 can be configured to run queries against databases to identify information. The query module 306 can receive one or more data values or query strings and can execute a query string based on them in a specified database, such as a memory 316, to identify information stored therein. The query module can then send the identified information to an appropriate member processing server mechanism or module 104 when necessary. Query module 306 can, for example, perform a query in memory 316 to identify keys, Blockchain data and other data for use in the methods discussed here.
[0050] The member processing server 104 can include a generation module 308. The generation module 308 can be
Petition 870190010582, of 01/31/2019, p. 40/111
26/43 configured to generate a key pair and shared sensitive information. The 308 generation module can receive a request as input, can perform the requested functions to generate data, and can send the requested data for use by another member processing server module or mechanism 104. For example, the 306 generation module can be configured to generate a key pair, such as a member key pair used in signing hash values and validating new blocks of Blockchain transactions to be included in the Blockchain. The generation module 306 can be configured to generate member key pairs using any suitable key pair generation algorithm. Member key pairs can consist of a member private key and a corresponding member public key. The 306 generation module can also be configured to generate hash values. Hash values can be generated by applying one or more dispersion algorithms to the data to generate them. For example, the 306 generation module can be configured to generate hash values for a block on the Blockchain. The generation module 306 can also be configured to generate an analogous or corresponding hash value using a suitable method, such as applying a scatter algorithm to the data, performing a calculation with one or more algorithms, etc.
[0051] The member processing server 104 may also include a subscription module 310. The subscription module 310 can be configured to receive data to be signed, can sign the data using a private key and can send the signed data to another member processing server module or mechanism 104. In some cases, signature module 310 may also be provided with the private key for
Petition 870190010582, of 01/31/2019, p. 41/111
27/43 use in subscription. In other cases, signature module 310 may obtain private keys, such as by sending an instruction to query module 306 to identify a private key in memory 316 to be used in signing the data. The subscription module 310 can be configured, for example, to sign the hash values generated by the generation module 208 for inclusion with Blockchain transactions in a new block to be included in the Blockchain.
[0052] The member processing server 104 can also include a 312 validation module. The 312 validation module can be configured to receive data for validation, can validate the data and can send a result (for example, success or failure) ) from validation to another member processing server module or engine 104. For example, validation module 312 can receive (for example, via receiving device 302) a signed block, which can be validated by the membership module validation 312 using a signed public domain key, associated with the signatory authority's 102 server that signed the block. The 312 validation module can also validate signed hash values (for example, which can be obtained by validating a signed block that includes the signed hash value) using the already signed members public key. The member public key can be the member public key generated by generation module 308, or it can be a member public key received from the signatory authority server 102 that is associated with the member processing server 104 used to sign the hash value. In the latter case, the signatory authority server 102 may provide (for example, with the signed block) the members' public key already signed or an indication that the member public key should be used for validation.
Petition 870190010582, of 01/31/2019, p. 42/111
28/43 [0053] The member processing server 104 may also include a transmission device 314. The transmission device 314 may be configured to transmit data over one or more networks via one or more network protocols. In some cases, the transmission device 314 can be configured to transmit data to signatory authority servers 102, participant devices 106 and other entities through suitable communication networks, such as local area networks, wide area networks, networks radio frequency, the Internet. In some embodiments, the transmission device 314 may be composed of multiple devices, such as different transmission devices for transmitting data over different networks, such as a first transmission device for transmitting data by means of near field communication and a second transmission device to transmit data over the Internet. The transmitting device 314 can electronically transmit data signals containing overlapping data that can be analyzed by a receiving computing device. In some cases, the transmission device 314 may include one or more modules to overlap, encode or otherwise format data into data signals suitable for transmission.
[0054] Transmission device 314 can be configured to transmit data signals electronically to signatory authority 102 servers. Data signals electronically transmitted to signatory authority 102 servers can be superimposed on a member public key for signature, values of signed hashes, transaction blocks to be added to the Blockchain, validation results and other data suitable for use in performing the functions discussed here. The 314 transmission device can also be configured to transmit electronically
Petition 870190010582, of 01/31/2019, p. 43/111
29/43 data signals overlaid on the signed transaction blocks so that the devices of participants 106 perform their validation.
[0055] Member processing server 104 may also include memory 316. Memory 316 can be configured to store data to be used by member processing server 104 in performing the functions discussed here. Memory 316 can be configured to store data using suitable data formatting methods and schemes and can be any type of suitable memory, such as read-only memory, random access memory, etc. Memory 316 may include, for example, a member private key, a corresponding member public key already signed, member public keys already signed, associated with other member processing servers 102, data associating each additional member public key already signed with another 104 member processing server, a Blockchain, a signed public domain key, etc. Memory 316 can be configured to store the key pair generation algorithm, scatter algorithms and other algorithms for use in performing the member processing server 104 functions discussed here.
Generation and Distribution of Keys for Digital Signatures [0056] Figure 4 illustrates a process for the generation and distribution of keys by the signatory authority's server 102 and by the member processing servers 104 of system 100 illustrated in figure 1 for use in the digital signature Blockchain transactions and Blockchain inclusion.
[0057] In step 402, the generation module 208 of the signatory authority's server 102 can generate a pair of domain keys. The domain key pair can be generated using an algorithm
Petition 870190010582, of 01/31/2019, p. 44/111
30/43 key generation and can be composed of a private domain key and a corresponding public domain key. In step 404, the signing module 210 of the signatory authority server 102 can self-sign the public domain key. In some cases, the public domain key can be signed using the corresponding private domain key. In other cases, a different private key can be used. In some embodiments, step 404 can be replaced by signing the public domain key with a trusted third party.
[0058] In step 406, the generation module 308 of a member processing server 104 can generate a member key pair. The member key pair can be generated using a suitable key pair generation algorithm and can be composed of a member private key and a corresponding member public key. In step 408, the transmission device 314 of the member processing server can electronically transmit a data signal to the signatory authority's server 102 using a suitable communication network, in which the data signal is superimposed on the generated member public key and authentication data. The authentication data can be data associated with the member processing server 104 that is suitable for identifying and / or authenticating it.
[0059] In step 410, the receiving device 202 of the signatory authority server 102 can receive the data signal from the member processing server 104. In step 412, the authentication module 212 of the signatory authority server 102 can authenticate the member processing server 104 using the provided authentication data. Once authentication is complete, in step 414, signature module 210 on the
Petition 870190010582, of 01/31/2019, p. 45/111
31/43 signatory authority 102 can sign the member public key using the private domain key.
[0060] In step 416, the transmitting device 214 of the signatory authority's server 102 can electronically transmit a data signal to the member processing server 104 using a suitable communication network that is superimposed on the already signed members public key, as well as additional already signed member public keys associated with other member processing servers 104. In some cases, the already signed public domain key can also be transmitted to member processing server 104. In step 418, the device receiver 302 from member processing server 104 can receive the data signal to analyze the data included therein.
Generation and Validation of Digitally Signed Blocks [0061] Figure 5 illustrates a process for the generation of a digitally signed block of Blockchain transactions and validation using the signatory authority server 102 and the member processing server 104 of system 100 illustrated in figure 1.
[0062] In step 502, the receiving device 302 of the member processing server 104 can receive a plurality of Blockchain transactions. Each Blockchain transaction can be received from a participant device 106 and can include the data associated with the transaction to be posted on the Blockchain associated with the member processing server 104. In step 504, the generation module 308 of the server processing member 104 can generate a new block composed of Blockchain transactions. In some cases, the block may also include additional data, such as a header, a transaction counter and other data. The additional data included in a block of the
Petition 870190010582, of 01/31/2019, p. 46/111
32/43
Blockchain may be dependent on the characteristics of the Blockchain, as will become evident to people versed in the relevant technique.
[0063] In step 506, the generation module 308 of the member processing server 104 can find a suitable hash value. The action of finding a suitable hash value may include generating a first hash value by applying a scatter algorithm to a block on the previous Blockchain, such as adding the block that precedes the new block, as well as generation or other identification of a second hash value that corresponds to the first hash value. Once the appropriate hash value is identified, in step 508, the signature module 310 of the member processing server 102 can sign the hash value using its private member key.
[0064] In step 510, the transmission device 314 of the member processing server 104 can electronically transmit a data signal to the signatory authority's server 102 using a suitable communication network that is superimposed on the new block and the hash value signed. In step 512, the receiving device 202 of the signatory authority's server 102 can receive the data signal to analyze the data overlaid on it. In step 514, the signing module 210 of the signatory authority's server 102 can sign the combined block, composed of the new block and the signed hash value, using its private domain key.
[0065] In step 516, the transmitting device 214 of the signatory authority's server 102 can electronically transmit a data signal superimposed on the digitally signed block to the member processing server 104 using the appropriate communication network. In step 518, the receiving device 302 from the server
Petition 870190010582, of 01/31/2019, p. 47/111
33/43 member processing 104 can receive the signed block and, in step 520, the validation module 312 of member processing server 104 can validate the signed block using the already signed public domain key and the members public key already signed. In some embodiments, steps 518 and 520 can be performed by a member processing server 104 other than the one used in steps 502 to 510. In such modalities, the validation performed in step 520 can use the already signed member public key, associated with the member processing server 104 used to sign the hash value in step 508.
First Exemplary Method of Using Digital Signatures to Sign Blockchain Transactions [0066] Figure 6 illustrates a 600 method for digitally signing a block of Blockchain transactions that includes a signed hash value to validate them.
[0067] In step 602, a pair of domain keys can be generated by a generation module (for example, the generation module 208) of a processing server (for example, the signatory authority server 102), in which the domain key pair comprises a private domain key and a public domain key, and where the public domain key is signed after its generation. In step 604, a plurality of member public keys can be received by a receiving device (for example, receiving device 202) from the processing server, where each member public key is received from an associated member ( for example, member processing server 104) of a Blockchain network and is a public key in a key pair comprising a member public key and a corresponding member private key
Petition 870190010582, of 01/31/2019, p. 48/111
34/43 to the associate member.
[0068] In step 606, each member public key of the plurality of member public keys can be signed by a signature module (for example, signature module 210) of the processing server using the private domain key. In step 608, a transaction block can be received by the processing server receiving device from a specific member of the Blockchain network, in which the transaction block includes a plurality of Blockchain transaction values and a signed hash function using the member private key corresponding to the specific member.
[0069] In step 610, the block of received transactions can be signed by the signature module of the processing server using the private domain key. In step 612, the signed transaction block can be electronically transmitted by a transmission device (for example, the transmission device 214) of the processing server.
[0070] In one embodiment, method 600 may also include transmitting electronically, through the transmission device of the processing server, each member public key already signed to one or more members of the Blockchain network. In some embodiments, the public domain key can be signed by a public authority. In other ways, the public domain key can be signed by the signature module of the processing server. In one embodiment, method 600 may also include: receiving, via the receiving device from the processing server, authentication information from each member of the Blockchain network; and authenticate, through an authentication module (for example, authentication module 212) of the processing server, each member of the Blockchain network using the
Petition 870190010582, of 01/31/2019, p. 49/111
35/43 authentication information received before signing the associated member public key.
Second Exemplary Method of Using Digital Signatures to Sign Blockchain Transactions [0071] Figure 7 illustrates a method 700 for the digital signature of a hash value to be included in a Blockchain transaction block for digital signature and inclusion in the Blockchain.
[0072] In step 702, the Blockchain can be stored in a memory (for example, memory 316) of a processing server (for example, the member processing server 104), where the Blockchain includes a plurality of blocks transactions, each transaction block including at least a plurality of Blockchain transaction values. In step 704, a member key pair comprising a member private key and a member public key can be generated by a generation module (for example, the generation module 308) of the processing server.
[0073] In step 706, the generated member public key can be transmitted electronically by a transmission device (for example, the transmission device 314) from the processing server to a signatory authority (for example, the signatory authority's server 102 ) associated with a Blockchain network. In step 708, a plurality of Blockchain transaction values can be received by a receiving device (e.g., receiving device 302) from the processing server that comprises a new transaction block.
[0074] In step 710, a hash module (for example, the generation module 308) of the processing server can map a first hash value by applying one or more dispersion algorithms to a specific block of the plurality of
Petition 870190010582, of 01/31/2019, p. 50/111
36/43 transaction blocks included in the Blockchain. In step 712, a second hash value can be generated by the generation module of the processing server that corresponds to the first hash value.
[0075] In step 714, the second generated hash value can be signed by a signature module (for example, signature module 210) of the processing server using the member private key that was generated. In step 716, the new transaction block and the second signed hash value can be electronically transmitted by the transmitting device from the processing server to the signatory authority.
[0076] In one embodiment, the second hash value can be generated by applying one or more dispersion algorithms to the new transaction block that has been received. In some embodiments, method 700 may also include transmitting electronically, via the transmission device of the processing server, authentication information to the signatory authority. In one embodiment, method 700 may also include: receiving, via the receiving device from the processing server, a signed transaction block and the signed public domain key from the signatory authority, in which the signed transaction block includes the new transaction block and the second signed hash value and is signed using a private domain key corresponding to the public domain key already signed; and validating, via a validation module (for example, the 312 validation module) of the processing server, the transaction block signed using the member public key and the signed public domain key. In another modality, the validation of the signed transaction block may include: applying the public domain key already signed to the signed transaction block to generate the new transaction block and the
Petition 870190010582, of 01/31/2019, p. 51/111
37/43 second signed hash value; applying the member public key to the second signed hash value to generate the second hash value; and validating the second generated hash value as a match for the second generated hash value.
Computer System Architecture [0077] Figure 8 illustrates a computer system 800 in which the modalities of the present invention, or parts thereof, can be deployed as computer-readable code. For example, the signatory authority server 102 and the member processing server 104 of figure 1 can be deployed to computer system 800 using computer-readable hardware, software, firmware, non-transitory means that have instructions stored therein or a combination of them, and can be deployed in one or more computer systems or other processing systems. Hardware, software or any combination thereof may incorporate modules and components used to implement the methods in figures 4-7.
[0078] If programmable logic is used, that logic can be performed on a commercially available processing platform or on a special purpose device. A person skilled in the art will understand that the modalities of the subject described can be practiced with various computer system configurations, which include multi-core multiprocessor systems, minicomputers, mainframe computers, computers connected or grouped with distributed functions, as well as ubiquitous computers or miniature that can be embedded into virtually any device. For example, at least one processor device and memory can be used to implement the modalities described above.
[0079] A processing unit or device complying with
Petition 870190010582, of 01/31/2019, p. 11/11
38/43 discussed here can be a single processor, a plurality of processors or combinations thereof. Processor devices can have one or more processor cores. The terms computer program medium, computer readable non-transitory medium and computer usable medium, as discussed here, are generally used to refer to tangible media, such as a removable storage unit 818, a removable storage unit 822 and a hard drive installed in the 812 hard drive.
[0080] Various embodiments of the present invention are described in relation to that exemplary computer system 800. After reading this description, it will become apparent to a person skilled in the relevant technique how to deploy the present invention using other computer systems and / or architectures of computer. Although operations have been described as a sequential process, some of these operations can in fact be performed in parallel, simultaneously and / or in a distributed environment, and with the program code stored locally or remotely to be accessed by machines with a or multiple processors. In addition, in some modalities, the order of operations can be redefined without departing from the spirit of the theme described.
[0081] The processor device 804 can be a special purpose or general purpose processor device specifically configured to perform the functions discussed here. The processor device 804 can be connected to a communication infrastructure 806, such as a bus, message queue, network, multicore scheme for passing messages, etc. The network can be any network suitable for performing the functions as described here and can include a local area network (LAN), a wide area network (WAN), a wireless network (for example,
Petition 870190010582, of 01/31/2019, p. 53/111
39/43
WiFi), a mobile communication network, a satellite network, the Internet, optical fiber, coaxial cable, infrared, radio frequency (RF) or any combination thereof. Other suitable types of networks and configurations will become apparent to persons skilled in the relevant technique. Computer system 800 can also include main memory 808 (for example, random access memory, read-only memory, etc.) and can also include secondary memory 810. Secondary memory 810 can include hard drive 812 and a removable storage unit 814, such as a floppy drive, a magnetic tape drive, an optical disc drive, a flash memory, etc. [0082] Removable storage unit 814 can read and / or write to removable storage unit 818 in a well known manner. The removable storage unit 818 can include a removable storage medium that can be read by and written to the removable storage unit 814. For example, if the removable storage unit 814 is a floppy drive or a universal serial bus input, the removable storage unit 818 can be a floppy disk or a portable flash drive, respectively. In one embodiment, the removable storage unit 818 may be a non-transient, computer-readable recording medium.
[0083] In some embodiments, secondary memory 810 may include alternative means to allow computer programs or other instructions to be loaded onto computer system 800, for example, removable storage unit 822 and an interface 820. Examples of such means may include a program cartridge and cartridge interface (for example, like that found on video game systems), a removable memory chip (for example, EEPROM, PROM, etc.) and associated jack, and others
Petition 870190010582, of 01/31/2019, p. 54/111
40/43 removable storage units 822 and interfaces 820, as will become apparent to persons skilled in the relevant technique.
[0084] The data stored in the computer system 800 (for example, in the main memory 808 and / or in the secondary memory 810) can be stored in any suitable type of computer-readable medium, such as optical storage (for example, a compact disc, digital versatile disc, Blu-ray disc, etc.) or magnetic tape storage (for example, a hard disk drive). The data can be configured in any type of suitable database configuration, such as a relational database, a database in structured query language (SQL), a distributed database, an object-oriented database , etc. The appropriate types of configurations and storage will become evident to people skilled in the relevant technique.
[0085] The computer system 800 can also include a communication interface 824. The communication interface 824 can be configured to allow software and data to be transferred between the computer system 800 and external devices. Examples of 824 communication interfaces may include a modem, a network interface (for example, an Ethernet card), a communications port, a PCMCIA card slot, etc. The software and data transferred via the 824 communication interface may be in the form of signals, which may be electronic, electromagnetic, optical or other signals, as will become evident to persons skilled in the relevant technique. The signals can travel through an 826 communication path that can be configured to carry the signals and can be deployed using wire, cable, fiber optics, a phone line, a cell phone connection,
Petition 870190010582, of 01/31/2019, p. 55/111
41/43 a radio frequency connection, etc.
[0086] Computer system 800 can also include an 802 display interface. The 802 display interface can be configured to allow data transfer between computer system 800 and external screen 830. Examples of 802 display interfaces can include high definition multimedia interface (HDMI), digital visual interface (DVI), video graphics set (VGA), etc. Screen 830 can be any type of screen suitable for displaying data transmitted via the computer system's 802 display interface 800, which includes a cathode ray tube (CRT) screen, a liquid crystal display (LCD) , a light-emitting diode (LED) screen, a capacitive touch screen, a thin-film transistor (TFT) screen, etc.
[0087] The terms computer program medium and computer usable medium can refer to memories, such as main memory 808 and secondary memory 810, which can be memory semiconductors (for example, DRAMs, etc.). And these computer program products can be a means of providing software for the computer system 800. Computer programs (for example, computer control logic) can be stored in main memory 808 and / or in secondary memory 810 Computer programs can also be received via the 824 communication interface. Such computer programs, when executed, may allow computer system 800 to implement the present methods as discussed here. In particular, computer programs, when executed, may allow the processor device 804 to implement the methods illustrated in figures 4 to 7, as discussed here. Consequently, such computer programs may represent controllers of the computer system 800. When this
Petition 870190010582, of 01/31/2019, p. 56/111
42/43 invention is deployed using software, the software can be stored in a computer program type product and loaded into computer system 800 using the removable storage unit 814, the interface 820 and the hard disk drive 812, or the 824 communication interface.
[0088] The processor device 804 may comprise one or more modules or mechanisms configured to perform the functions of the computer system 800. Each of the modules or mechanisms can be deployed using hardware and, in some cases, also software, for example. example, corresponding to a program code and / or programs stored in main memory 808 or in secondary memory 810. In such cases, the program code can be compiled by the processor device 804 (for example, by a compilation module or mechanism) before being executed by the computer system hardware 800. For example, the program code can be a source code written in a programming language that is translated into a lower level language, such as assembly language or machine code, to be performed by the processor device 804 and / or any additional hardware components of the computer system 800. The build process can to include the use of lexical analysis, pre-processing, parsing, semantic analysis, syntax-based translation, code generation, code optimization and any other techniques that are suitable for translating program code into a lower level language suitable for controlling the computer system 800 in its task of carrying out the functions described here. Obviously, people skilled in the relevant technique will understand that because of such processes, computer system 800 is a specially configured computer system 800, programmed exclusively to perform the functions
Petition 870190010582, of 01/31/2019, p. 57/111
43/43 discussed above.
[0089] Techniques consistent with the present invention provide, among other features, systems and methods for using digital signatures in signing Blockchain transactions. Although several examples of system and method modalities have been described above, it is worth noting that their purpose is only to exemplify and not to limit the invention to the precise form presented here. In this way, modifications and variations are possible in view of the aforementioned teachings or can be conceived from the practice of the invention, without departing from its scope and scope.
权利要求:
Claims (19)
[1]
1. Method of using digital signatures to sign Blockchain transactions, characterized by understanding:
generate, by means of a module for generating a processing server, a pair of domain keys comprising a private domain key and a public domain key, in which the public domain key is signed after its generation;
receive, through a receiving device from the processing server, a plurality of public keys from members, where each public key of member is received from an associated member of a Blockchain network and is a public key in a pair of keys comprising a member public key and a member private key corresponding to the associate member;
sign, via a processing server signature module, each member public key of the plurality of members public keys using the private domain key;
receive, via the processing server's receiving device, a transaction block from a specific member of the Blockchain network, where the transaction block includes a plurality of Blockchain transaction values and a signed hash function using the member private key corresponding to the specific member;
sign, via the processing server's subscription module, the block of transactions received using the private domain key;
transmit electronically, by means of a transmission device from the processing server, the signed transaction block;
transmit electronically, through the trans device
Petition 870190010582, of 01/31/2019, p. 59/111
[2]
2/9 processing server mission, each member public key signed for one or more members of the Blockchain network;
receive, through the receiving device of the processing server, a new transaction block and a second signed hash function value from the specific member of the Blockchain network;
sign, via the processing server signature module, the new transaction block received using the private domain key; and electronically transmit, via the processing server's transmission device, the new transaction block signed for validation by a member of the Blockchain network.
2. Method according to claim 1, characterized by the fact that the public domain key is signed by a public authority.
[3]
3. Method according to claim 1, characterized by the fact that the public domain key is signed by the signature module of the processing server.
[4]
Method according to claim 1, characterized in that it further comprises:
receive, through the receiving device of the processing server, authentication information from each member of the Blockchain network; and authenticate, through a processing server authentication module, each member of the Blockchain network using the authentication information received before signing the associated member public key.
[5]
5. Method of using digital signatures to sign Blockchain transactions, characterized by understanding:
store, in a memory of a processing server
Petition 870190010582, of 01/31/2019, p. 60/111
3/9 ment, a Blockchain, in which the Blockchain includes a plurality of transaction blocks, each transaction block including at least a plurality of Blockchain transaction values;
generate, by means of a processing server generation module, a member key pair comprising a member private key and a member public key;
transmit electronically, through a transmission device from the processing server, the member public key generated to a signatory authority associated with a Blockchain network;
receiving, via a receiving device from the processing server, a plurality of Blockchain transaction values comprising a new transaction block;
map, using a processing server hash module, a first hash value by applying one or more dispersion algorithms to a specific block of the plurality of transaction blocks included in the Blockchain;
generate, through the generation module of the processing server, a second hash value, in which the second hash value corresponds to the first hash value;
sign, via a processing server signature module, the second hash value generated using the generated member private key;
transmit electronically, through the transmission device of the processing server, the new transaction block and the second signed hash value to the signatory authority;
receive, via a receiving device from the processing server, a signed transaction block and a signed public domain key from the signatory authority, where the signed transaction block includes the new transaction block
Petition 870190010582, of 01/31/2019, p. 61/111
4/3 transactions and the second signed hash value;
applying the member public key to the second signed hash value to generate the second hash value; and validating the second generated hash value as corresponding to the second generated hash value in order to validate the signed transaction block for addition to the Blockchain.
[6]
6. Method according to claim 5, characterized by the fact that the second hash value is generated by applying one or more dispersion algorithms to the new transaction block received.
[7]
Method according to claim 5, characterized in that it further comprises:
transmit electronically, through the transmission device of the processing server, authentication information to the signatory authority.
[8]
8. Method according to claim 5, characterized by the fact that the signed transaction block is signed using a private domain key corresponding to the public domain key already signed; and the method further comprising:
validate, using a processing server validation module, the transaction block signed using the member public key and the signed public domain key.
[9]
9. Method according to claim 8, characterized by the fact that the validation of the signed transaction block includes:
apply the public domain key already signed to the signed transaction block to generate the new transaction block and the second signed hash value.
[10]
10. System of using digital signatures to sign Blockchain transactions, characterized by comprising:
a transmission device from a process serverPetition 870190010582, from 01/31/2019, p. 62/111
5/9 samento;
a processing server generation module configured to generate a domain key pair comprising a private domain key and a public domain key, where the public domain key is signed after generation;
a processing server receiving device configured to receive a plurality of public keys from members, where each public key of member is received from an associated member of a Blockchain network and is a public key in a key pair comprising a member public key and a member private key corresponding to the associate member; and a processing server signature module configured to sign each member public key from the plurality of member public keys using the private domain key, where the processing server receiving device is further configured to receive a transaction block from a specific member of the Blockchain network, where the transaction block includes a plurality of Blockchain transaction values and a hash function signed using the member private key corresponding to the specific member, the processing server signature module is further configured to sign the received transaction block using the private domain key, the processing server's transmission device is further configured to:
electronically transmit the signed transaction block, and electronically transmit each public key of
Petition 870190010582, of 01/31/2019, p. 63/111
6/9 members signed for one or more members of the Blockchain network, the receiving device of the processing server is further configured to receive a new transaction block and a second signed hash function value from the specific Blockchain network member, the The processing server's signature module is further configured to sign the new transaction block received using the private domain key, and the processing server's transmission device is further configured to electronically transmit the new transaction block signed for validation by a member of the Blockchain network.
[11]
11. System according to claim 10, characterized by the fact that the public domain key is signed by a public authority.
[12]
12. System according to claim 10, characterized by the fact that the public domain key is signed by the signature module of the processing server.
[13]
13. System according to claim 10, characterized by further comprising:
a processing server authentication module, in which the receiving device of the processing server is further configured to receive authentication information from each member of the Blockchain network; and the processing server authentication module is configured to authenticate each member of the Blockchain network using the authentication information received before signing the associated member public key.
Petition 870190010582, of 01/31/2019, p. 64/111
7/9
[14]
14. System of using digital signatures to sign Blockchain transactions, characterized by comprising:
a processing server signature module;
a processing server validation module;
a processing server memory configured to store a Blockchain, wherein the Blockchain includes a plurality of transaction blocks, each transaction block including at least a plurality of Blockchain transaction values;
a processing server generation module configured to generate a member key pair comprising a member private key and a member public key;
a processing server transmission device configured to electronically transmit the generated public member key to a signatory authority associated with a Blockchain network;
a processing server receiving device configured to receive a plurality of Blockchain transaction values comprising a new transaction block; and a processing server hash module configured to generate a first hash value by applying one or more spreading algorithms to a specific block from the plurality of transaction blocks included in the Blockchain, where the server generation module processing is further configured to generate a second hash value, where the second hash value corresponds to the first hash value, the signature module of the processing server is
Petition 870190010582, of 01/31/2019, p. 65/111
8/9 configured to sign the second generated hash value using the generated private member key, the processing server's transmission device is configured to electronically transmit the new transaction block and the second signed hash value to the signatory authority, the receiving device of the processing server is further configured to receive a signed transaction block and a public domain key from the signatory authority, where the signed transaction block includes the new transaction block and the second signed hash value , and the processing server validation module is further configured to apply the member public key to the second signed hash value to generate the second hash value and validate the second generated hash value as corresponding to the second generated hash value from in order to validate the transaction block signed for addition to the Blockchain.
[15]
15. System according to claim 14, characterized by the fact that the second hash value is generated by applying one or more dispersion algorithms to the new transaction block received.
[16]
16. System according to claim 14, characterized by the fact that the transmission device of the processing server is further configured to transmit authentication information electronically to the signatory authority.
[17]
17. System according to claim 14, characterized by the fact that the signed transaction block is signed using a private domain key corresponding to the signed public domain key, and the processing server validation module is
Petition 870190010582, of 01/31/2019, p. 66/111
9/9 configured to validate the signed transaction block using the member public key and the signed public domain key.
[18]
18. System according to claim 17, characterized by the fact that the validation of the signed transaction block includes:
apply the signed public domain key to the signed transaction block to generate the new transaction block and the second signed hash value.
Petition 870190010582, of 01/31/2019, p. 67/111
8/8 the processing server validation module is configured to validate the signed transaction block using the member public key and the signed public domain key.
[19]
20. System according to claim 19, characterized by the fact that the validation of the signed transaction block includes:
apply the public domain key already signed to the signed transaction block to generate the new transaction block and the second signed hash value;
applying the member public key to the second signed hash value to generate the second hash value; and validating the second generated hash value as a match for the second generated hash value.
类似技术:
公开号 | 公开日 | 专利标题
BR112018011775B1|2020-02-11|METHOD AND SYSTEM FOR USING DIGITAL SIGNATURES TO SIGN BLOCKCHAIN TRANSACTIONS
US11082204B2|2021-08-03|Method and system for partitioned blockchains and enhanced privacy for permissioned blockchains
BR112018011353B1|2020-03-17|METHOD AND SYSTEM FOR PROVISION AND STORAGE OF CRYPTOGRAPHED KEY DISTRIBUTED VIA ELYPTIC CURVE CRYPTOGRAPHY
US11025431B2|2021-06-01|Method and system for two factor authentication for blockchain transactions
US11032078B2|2021-06-08|Method and system for blockchain wallet dynamic private key
US11063764B2|2021-07-13|Method and system for quantum-resistant hashing scheme
US20210281427A1|2021-09-09|Method and system for quantum-resistant hashing scheme
AU2022200535A1|2022-02-24|Method and system for blockchain variant using digital signatures
US20210295278A1|2021-09-23|Method and system to delegate issuance capability to a third-party
US20210012331A1|2021-01-14|Method and system for secure and verifiable offline blockchain transactions
US20210176039A1|2021-06-10|Method and system for iot device digital asset permission transfer system using blockchain network
US20210295313A1|2021-09-23|Method and system for user-based distributed ledgers
US20200234257A1|2020-07-23|Method and system for a failsafe mechanism for blockchain wallets
US20210184863A1|2021-06-17|Method and system for regulation of blockchain-based payments
US20210295330A1|2021-09-23|Method and system to represent scalar digital assets using hash chains
同族专利:
公开号 | 公开日
EP3395007A1|2018-10-31|
US20190097813A1|2019-03-28|
CA3009326A1|2017-06-29|
MX2018007483A|2018-08-01|
AU2016378211B2|2019-12-05|
US10567175B2|2020-02-18|
AU2016378211A1|2018-06-07|
JP2019505150A|2019-02-21|
AU2020201652A1|2020-03-26|
JP6577680B2|2019-09-18|
WO2017112469A1|2017-06-29|
CN108370318A|2018-08-03|
CA3009326C|2020-10-06|
AU2020201652B2|2021-10-28|
US20180212783A1|2018-07-26|
US9948467B2|2018-04-17|
CN108370318B|2020-08-21|
BR112018011775A2|2018-12-04|
SG11201804190YA|2018-06-28|
US20170180134A1|2017-06-22|
CN111953496A|2020-11-17|
US10171248B2|2019-01-01|
SG10202004616XA|2020-06-29|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US20020091922A1|2000-12-28|2002-07-11|International Business Machines Corporation|Architecture for a unified synchronous and asynchronous sealed transaction|
US7451116B2|2001-03-07|2008-11-11|Diebold, Incorporated|Automated transaction machine digital signature system and method|
US9542671B2|2004-05-12|2017-01-10|Paypal, Inc.|Method and system to facilitate securely processing a payment for an online transaction|
KR101298562B1|2004-07-23|2013-08-22|데이터 시큐어리티 시스템즈 솔루션스 피티이 엘티디|System and method for implementing digital signature using one time private keys|
CN101039182B|2007-03-07|2010-08-11|广东南方信息安全产业基地有限公司|Authentication system and method for issuing user identification certificate|
CN101089880A|2007-07-13|2007-12-19|王少波|Electronic signature method|
CN101546407B|2009-02-11|2012-04-25|广州杰赛科技股份有限公司|Electronic commerce system and management method thereof based on digital certificate|
CN102684879A|2012-05-02|2012-09-19|四川建设网有限责任公司|Method and system for remote bid opening and bid evaluation|
CN103595530B|2012-08-17|2017-04-26|华为技术有限公司|Software secret key updating method and device|
AU2014321178A1|2013-09-20|2016-04-14|Visa International Service Association|Secure remote payment transaction processing including consumer authentication|
US9672499B2|2014-04-02|2017-06-06|Modernity Financial Holdings, Ltd.|Data analytic and security mechanism for implementing a hot wallet service|
US20150324789A1|2014-05-06|2015-11-12|Case Wallet, Inc.|Cryptocurrency Virtual Wallet System and Method|
US10929843B2|2014-05-06|2021-02-23|Apple Inc.|Storage of credential service provider data in a security domain of a secure element|
US20160098723A1|2014-10-01|2016-04-07|The Filing Cabinet, LLC|System and method for block-chain verification of goods|
US9973341B2|2015-01-23|2018-05-15|Daniel Robert Ferrin|Method and apparatus for the limitation of the mining of blocks on a block chain|
AU2016288644A1|2015-07-02|2018-02-22|Nasdaq, Inc.|Systems and methods of secure provenance for distributed transaction databases|
US9948467B2|2015-12-21|2018-04-17|Mastercard International Incorporated|Method and system for blockchain variant using digital signatures|US10083415B2|2014-03-31|2018-09-25|Kountable, Inc.|Multi-variable assessment systems and methods that evaluate and predict entrepreneurial behavior|
US10122711B2|2014-03-31|2018-11-06|Kountable, Inc.|Secure communications methods for use with entrepreneurial prediction systems and methods|
US9948467B2|2015-12-21|2018-04-17|Mastercard International Incorporated|Method and system for blockchain variant using digital signatures|
EP3193299A1|2016-01-15|2017-07-19|Accenture Global Services Limited|Device, method and system for autonomous selection of a commodity supplier through a blockchain distributed database|
US10713654B2|2016-01-21|2020-07-14|International Business Machines Corporation|Enterprise blockchains and transactional systems|
US10116667B2|2016-01-26|2018-10-30|Bank Of America Corporation|System for conversion of an instrument from a non-secured instrument to a secured instrument in a process data network|
WO2017134281A1|2016-02-04|2017-08-10|Nasdaq Technology Ab|Systems and methods for storing and sharing transactional data using distributed computer systems|
US10142347B2|2016-02-10|2018-11-27|Bank Of America Corporation|System for centralized control of secure access to process data network|
US10129238B2|2016-02-10|2018-11-13|Bank Of America Corporation|System for control of secure access and communication with different process data networks with separate security features|
US10438209B2|2016-02-10|2019-10-08|Bank Of America Corporation|System for secure routing of data to various networks from a process data network|
US20170236121A1|2016-02-11|2017-08-17|Mastercard International Incorporated|Method and system for offline blockchain exchanges|
US11108566B2|2016-02-12|2021-08-31|Visa International Service Association|Methods and systems for using digital signatures to create trusted digital asset transfers|
US10693658B2|2016-02-12|2020-06-23|Visa International Service Association|Methods and systems for using digital signatures to create trusted digital asset transfers|
US10715531B2|2016-02-12|2020-07-14|Visa International Service Association|Network topology|
US10142312B2|2016-02-22|2018-11-27|Bank Of America Corporation|System for establishing secure access for users in a process data network|
US10140470B2|2016-02-22|2018-11-27|Bank Of America Corporation|System for external validation of distributed resource status|
US10679215B2|2016-02-22|2020-06-09|Bank Of America Corporation|System for control of device identity and usage in a process data network|
US10762504B2|2016-02-22|2020-09-01|Bank Of America Corporation|System for external secure access to process data network|
US10387878B2|2016-02-22|2019-08-20|Bank Of America Corporation|System for tracking transfer of resources in a process data network|
US10178105B2|2016-02-22|2019-01-08|Bank Of America Corporation|System for providing levels of security access to a process data network|
US10135870B2|2016-02-22|2018-11-20|Bank Of America Corporation|System for external validation of secure process transactions|
US10026118B2|2016-02-22|2018-07-17|Bank Of America Corporation|System for allowing external validation of data in a process data network|
US10318938B2|2016-02-22|2019-06-11|Bank Of America Corporation|System for routing of process authorization and settlement to a user in process data network based on specified parameters|
US10636033B2|2016-02-22|2020-04-28|Bank Of America Corporation|System for routing of process authorizations and settlement to a user in a process data network|
US10607285B2|2016-02-22|2020-03-31|Bank Of America Corporation|System for managing serializability of resource transfers in a process data network|
US10496989B2|2016-02-22|2019-12-03|Bank Of America Corporation|System to enable contactless access to a transaction terminal using a process data network|
US10475030B2|2016-02-22|2019-11-12|Bank Of America Corporation|System for implementing a distributed ledger across multiple network nodes|
US10440101B2|2016-02-22|2019-10-08|Bank Of America Corporation|System for external validation of private-to-public transition protocols|
WO2017152150A1|2016-03-04|2017-09-08|ShoCard, Inc.|Method and system for authenticated login using static or dynamic codes|
US10509932B2|2016-03-07|2019-12-17|ShoCard, Inc.|Large data transfer using visual codes with feedback confirmation|
US10007826B2|2016-03-07|2018-06-26|ShoCard, Inc.|Transferring data files using a series of visual codes|
WO2017156135A1|2016-03-08|2017-09-14|Ignacio Juarez|Vertical axis wind turbine|
FR3049089B1|2016-03-21|2018-02-16|Sebastien Jean Serge Dupont|METHOD FOR MANAGING VALIDATIONS OF MESSAGE CHANNEL-RELATED MESSAGES THROUGH A DECENTRALIZED VALIDATION NETWORK|
US10608825B2|2016-04-21|2020-03-31|Protoblock, Inc.|Decentralized exchanges in a distributed autonomous platform|
US10135616B2|2016-05-07|2018-11-20|Keir Finlow-Bates|Revocation of cryptographic keys in the absence of a trusted central authority|
US9774578B1|2016-05-23|2017-09-26|Accenture Global Solutions Limited|Distributed key secret for rewritable blockchain|
US10341309B1|2016-06-13|2019-07-02|Allstate Insurance Company|Cryptographically protecting data transferred between spatially distributed computing devices using an intermediary database|
US10826685B1|2016-06-28|2020-11-03|Amazon Technologies, Inc.|Combined blockchain integrity|
US10411905B2|2016-07-01|2019-09-10|Intel Corporation|Public key infrastructure using blockchains|
WO2018021535A1|2016-07-29|2018-02-01|日本電気株式会社|System, data management method, and program|
US10402796B2|2016-08-29|2019-09-03|Bank Of America Corporation|Application life-cycle transition record recreation system|
US20180082290A1|2016-09-16|2018-03-22|Kountable, Inc.|Systems and Methods that Utilize Blockchain Digital Certificates for Data Transactions|
US10348484B2|2016-10-24|2019-07-09|Mastercard International Incorporated|Method and system for fast tracking navigation of blockchains via data manipulation|
US10938571B2|2016-10-26|2021-03-02|Acronis International Gmbh|System and method for verification of data transferred among several data storages|
US10296764B1|2016-11-18|2019-05-21|Amazon Technologies, Inc.|Verifiable cryptographically secured ledgers for human resource systems|
US10484346B2|2017-02-07|2019-11-19|Microsoft Technology Licensing, Llc|Establishment of consortium blockchain network|
DE102017211201A1|2017-06-30|2019-01-03|Siemens Aktiengesellschaft|Method for asymmetric key management and security-relevant installation|
CN107395343B|2017-07-10|2019-10-25|腾讯科技(深圳)有限公司|Certificate management method and system|
US10862671B2|2017-08-02|2020-12-08|Visa International Service Association|Global ownership registry|
US10296248B2|2017-09-01|2019-05-21|Accenture Global Solutions Limited|Turn-control rewritable blockchain|
US20210167962A1|2017-09-07|2021-06-03|Visa International Service Association|System And Method For Generating Trust Tokens|
WO2019071026A1|2017-10-04|2019-04-11|Jintai Ding|Quantumproof blockchain|
US10771449B2|2017-12-04|2020-09-08|Mastercard International Incorporated|Method and system for trustworthiness using digital certificates|
US11206133B2|2017-12-08|2021-12-21|Ping Identity Corporation|Methods and systems for recovering data using dynamic passwords|
WO2019116249A1|2017-12-15|2019-06-20|nChain Holdings Limited|Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords|
US20190199516A1|2017-12-26|2019-06-27|Akamai Technologies, Inc.|High performance distributed system of record with cryptographic service support|
US10630769B2|2017-12-26|2020-04-21|Akamai Technologies, Inc.|Distributed system of record transaction receipt handling in an overlay network|
CN108323200A|2018-01-25|2018-07-24|深圳前海达闼云端智能科技有限公司|Data training method, device, storage medium based on block chain and block chain node|
KR102042339B1|2018-02-23|2019-11-07|에이치닥 테크놀로지 아게|Method and system for encrypted communication between devices based on the block chain system|
US10567393B2|2018-03-16|2020-02-18|Vector Launch Inc.|Distributed blockchain data management in a satellite environment|
US10708243B2|2018-04-24|2020-07-07|Capital One Services, Llc|Message encryption using public keychains|
US10928803B2|2018-05-02|2021-02-23|Rockwell Automation Technologies, Inc.|Managing blockchains for multiple components in an industrial facility|
US11038676B2|2018-05-25|2021-06-15|Incertrust Technologies Corporation|Cryptographic systems and methods using distributed ledgers|
US10972463B2|2018-06-06|2021-04-06|Cisco Technology, Inc.|Blockchain-based NB-IoT devices|
US10972279B2|2018-06-07|2021-04-06|International Business Machines Corporation|Efficient validation for blockchain|
US10673618B2|2018-06-08|2020-06-02|Cisco Technology, Inc.|Provisioning network resources in a wireless network using a native blockchain platform|
US10505718B1|2018-06-08|2019-12-10|Cisco Technology, Inc.|Systems, devices, and techniques for registering user equipmentin wireless networks using a native blockchain platform|
US10546444B2|2018-06-21|2020-01-28|Capital One Services, Llc|Systems and methods for secure read-only authentication|
US10915552B2|2018-06-28|2021-02-09|International Business Machines Corporation|Delegating credentials with a blockchain member service|
US10721060B1|2018-06-29|2020-07-21|Verisign, Inc.|Domain name blockchain user addresses|
CN108880803A|2018-07-12|2018-11-23|佛山伊苏巨森科技有限公司|A kind of method and system signed using digital signature to block chain affairs|
CN109039645A|2018-07-12|2018-12-18|佛山伊苏巨森科技有限公司|A kind of system and method signed using digital signature to block chain affairs|
US10929545B2|2018-07-31|2021-02-23|Bank Of America Corporation|System for providing access to data stored in a distributed trust computing network|
CN108880823A|2018-08-07|2018-11-23|佛山市苔藓云链科技有限公司|A kind of method and system generating the block chain quickly to navigate|
US10721069B2|2018-08-18|2020-07-21|Eygs Llp|Methods and systems for enhancing privacy and efficiency on distributed ledger-based networks|
CN109242681B|2018-08-21|2020-11-20|京东数字科技控股有限公司|Asset data storage method, device, equipment and system|
CN109118223A|2018-08-21|2019-01-01|上海点融信息科技有限责任公司|For managing the method, apparatus and medium of electronic data in block chain|
US10764070B2|2018-08-30|2020-09-01|International Business Machines Corporation|High precision timestamps in blockchain|
CA3054228A1|2018-09-06|2020-03-06|Intercontinental Exchange Holdings, Inc.|Multi-signature verification network|
CN109361734B|2018-09-18|2021-04-20|百度在线网络技术(北京)有限公司|Data processing method, device, equipment and medium for block chain|
CN109361740B|2018-09-27|2021-07-06|百度在线网络技术(北京)有限公司|Block generation method, device, equipment and medium of block chain|
US10685350B2|2018-10-02|2020-06-16|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
SG11202101171VA|2018-10-02|2021-03-30|Capital One Services Llc|Systems and methods for cryptographic authentication of contactless cards|
SG11202102543WA|2018-10-02|2021-04-29|Capital One Services Llc|Systems and methods for cryptographic authentication of contactless cards|
US10581611B1|2018-10-02|2020-03-03|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10680824B2|2018-10-02|2020-06-09|Capital One Services, Llc|Systems and methods for inventory management using cryptographic authentication of contactless cards|
CA3114753A1|2018-10-02|2020-04-09|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10771254B2|2018-10-02|2020-09-08|Capital One Services, Llc|Systems and methods for email-based card activation|
US10554411B1|2018-10-02|2020-02-04|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10607214B1|2018-10-02|2020-03-31|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10565587B1|2018-10-02|2020-02-18|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
BR112021005150A2|2018-10-02|2021-06-15|Capital One Services, Llc|data transmission system, method of guiding a transmission device, and receiving application|
KR20210066798A|2018-10-02|2021-06-07|캐피탈 원 서비시즈, 엘엘씨|System and method for cryptographic authentication of contactless card|
WO2020072474A1|2018-10-02|2020-04-09|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10949520B2|2018-10-02|2021-03-16|Capital One Services, Llc|Systems and methods for cross coupling risk analytics and one-time-passcodes|
US10542036B1|2018-10-02|2020-01-21|Capital One Services, Llc|Systems and methods for signaling an attack on contactless cards|
US10909527B2|2018-10-02|2021-02-02|Capital One Services, Llc|Systems and methods for performing a reissue of a contactless card|
US10505738B1|2018-10-02|2019-12-10|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US11210664B2|2018-10-02|2021-12-28|Capital One Services, Llc|Systems and methods for amplifying the strength of cryptographic algorithms|
US10579998B1|2018-10-02|2020-03-03|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
WO2020072413A1|2018-10-02|2020-04-09|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10771253B2|2018-10-02|2020-09-08|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
CA3115252A1|2018-10-02|2020-04-09|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10511443B1|2018-10-02|2019-12-17|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10783519B2|2018-10-02|2020-09-22|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10592710B1|2018-10-02|2020-03-17|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10748138B2|2018-10-02|2020-08-18|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10582386B1|2018-10-02|2020-03-03|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10992477B2|2018-10-02|2021-04-27|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10733645B2|2018-10-02|2020-08-04|Capital One Services, Llc|Systems and methods for establishing identity for order pick up|
US10489781B1|2018-10-02|2019-11-26|Capital One Services, Llc|Systems and methods for cryptographic authentication of contactless cards|
US10979227B2|2018-10-17|2021-04-13|Ping Identity Corporation|Blockchain ID connect|
US11082221B2|2018-10-17|2021-08-03|Ping Identity Corporation|Methods and systems for creating and recovering accounts using dynamic passwords|
US11146399B2|2018-10-19|2021-10-12|Eygs Llp|Methods and systems for retrieving zero-knowledge proof-cloaked data on distributed ledger-based networks|
CN109614823A|2018-10-26|2019-04-12|阿里巴巴集团控股有限公司|A kind of processing method of data, device and equipment|
CN113434592A|2018-10-31|2021-09-24|创新先进技术有限公司|Block chain-based data evidence storing method and device and electronic equipment|
CN109583230A|2018-10-31|2019-04-05|阿里巴巴集团控股有限公司|Data based on block chain deposit card method and device, electronic equipment|
US10691674B2|2018-11-16|2020-06-23|Accenture Global Solutions Limited|Distributed system for animal identification and management|
CN109672535B|2018-12-11|2021-10-08|成都四方伟业软件股份有限公司|Alliance chain signature generation method and device|
US11037136B2|2019-01-24|2021-06-15|Capital One Services, Llc|Tap to autofill card data|
US10510074B1|2019-02-01|2019-12-17|Capital One Services, Llc|One-tap payment using a contactless card|
US10467622B1|2019-02-01|2019-11-05|Capital One Services, Llc|Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms|
US11120453B2|2019-02-01|2021-09-14|Capital One Services, Llc|Tap card to securely generate card data to copy to clipboard|
US10425129B1|2019-02-27|2019-09-24|Capital One Services, Llc|Techniques to reduce power consumption in near field communication systems|
JP6853364B2|2019-02-28|2021-03-31|アドバンスド ニュー テクノロジーズ カンパニー リミテッド|Systems and methods for implementing blockchain-based digital certificates|
US10735204B2|2019-02-28|2020-08-04|Alibaba Group Holding Limited|System and method for generating digital marks|
EP3590084A4|2019-03-04|2020-04-01|Alibaba Group Holding Limited|Methods and devices for testing signature verification for blockchain system|
US10523708B1|2019-03-18|2019-12-31|Capital One Services, Llc|System and method for second factor authentication of customer support calls|
US10438437B1|2019-03-20|2019-10-08|Capital One Services, Llc|Tap to copy data to clipboard via NFC|
US10643420B1|2019-03-20|2020-05-05|Capital One Services, Llc|Contextual tapping engine|
US10535062B1|2019-03-20|2020-01-14|Capital One Services, Llc|Using a contactless card to securely share personal data stored in a blockchain|
US10984416B2|2019-03-20|2021-04-20|Capital One Services, Llc|NFC mobile currency transfer|
US10970712B2|2019-03-21|2021-04-06|Capital One Services, Llc|Delegated administration of permissions using a contactless card|
TWI711293B|2019-03-26|2020-11-21|宏碁股份有限公司|Method of identity authentication for voice over internet protocol call and related device|
US10467445B1|2019-03-28|2019-11-05|Capital One Services, Llc|Devices and methods for contactless card alignment with a foldable mobile device|
TWI695293B|2019-03-29|2020-06-01|天逸財金科技服務股份有限公司|Method, system and server for protection mechanism of digital signature certificate|
US11206138B2|2019-05-02|2021-12-21|Ernst & Young U.S. Llp|Biosignature-based tokenization of assets in a blockchain|
EP3913891A1|2019-05-15|2021-11-24|Advanced New Technologies Co., Ltd.|Processing data elements stored in blockchain networks|
CN114039733A|2019-05-23|2022-02-11|创新先进技术有限公司|Certificate storage service transfer method, device and equipment for alliance chain|
US10942920B2|2019-06-03|2021-03-09|Advanced New Technologies Co., Ltd.|Service processing system and method based on blockchain|
US10516447B1|2019-06-17|2019-12-24|Capital One Services, Llc|Dynamic power levels in NFC card communications|
US10871958B1|2019-07-03|2020-12-22|Capital One Services, Llc|Techniques to perform applet programming|
US10713649B1|2019-07-09|2020-07-14|Capital One Services, Llc|System and method enabling mobile near-field communication to update display on a payment card|
US10498401B1|2019-07-15|2019-12-03|Capital One Services, Llc|System and method for guiding card positioning using phone sensors|
US10885514B1|2019-07-15|2021-01-05|Capital One Services, Llc|System and method for using image data to trigger contactless card transactions|
US11182771B2|2019-07-17|2021-11-23|Capital One Services, Llc|System for value loading onto in-vehicle device|
US10733601B1|2019-07-17|2020-08-04|Capital One Services, Llc|Body area network facilitated authentication or payment authorization|
US10832271B1|2019-07-17|2020-11-10|Capital One Services, Llc|Verified reviews using a contactless card|
US10506426B1|2019-07-19|2019-12-10|Capital One Services, Llc|Techniques for call authentication|
US10541995B1|2019-07-23|2020-01-21|Capital One Services, Llc|First factor contactless card authentication system and method|
US11201746B2|2019-08-01|2021-12-14|Accenture Global Solutions Limited|Blockchain access control system|
US11232439B2|2019-08-09|2022-01-25|Eygs Llp|Methods and systems for preventing transaction tracing on distributed ledger-based networks|
WO2021038684A1|2019-08-26|2021-03-04|日本電気株式会社|Information processing device, node, data recording method, and computer-readable medium|
CN110545186A|2019-08-29|2019-12-06|北京艾摩瑞策科技有限公司|Block chain private key signing method and device for advertisement platform user|
CN110545178A|2019-08-29|2019-12-06|北京艾摩瑞策科技有限公司|block chain private key signing method and device for investigation platform user|
CN110740130A|2019-09-29|2020-01-31|南京金宁汇科技有限公司|block chain key management method, system and storage medium|
US10708040B1|2019-10-01|2020-07-07|Tyson York Winarski|Collision resistant blockchain|
US10701560B1|2019-10-02|2020-06-30|Capital One Services, Llc|Client device authentication using contactless legacy magnetic stripe data|
US10862540B1|2019-12-23|2020-12-08|Capital One Services, Llc|Method for mapping NFC field strength and location on mobile devices|
US10657754B1|2019-12-23|2020-05-19|Capital One Services, Llc|Contactless card and personal identification system|
US10885410B1|2019-12-23|2021-01-05|Capital One Services, Llc|Generating barcodes utilizing cryptographic techniques|
US10733283B1|2019-12-23|2020-08-04|Capital One Services, Llc|Secure password generation and management using NFC and contactless smart cards|
US11113685B2|2019-12-23|2021-09-07|Capital One Services, Llc|Card issuing with restricted virtual numbers|
US11200563B2|2019-12-24|2021-12-14|Capital One Services, Llc|Account registration using a contactless card|
US10853795B1|2019-12-24|2020-12-01|Capital One Services, Llc|Secure authentication based on identity data stored in a contactless card|
US10664941B1|2019-12-24|2020-05-26|Capital One Services, Llc|Steganographic image encoding of biometric template information on a card|
US10757574B1|2019-12-26|2020-08-25|Capital One Services, Llc|Multi-factor authentication providing a credential via a contactless card for secure messaging|
US10909544B1|2019-12-26|2021-02-02|Capital One Services, Llc|Accessing and utilizing multiple loyalty point accounts|
US11038688B1|2019-12-30|2021-06-15|Capital One Services, Llc|Techniques to control applets for contactless cards|
US10860914B1|2019-12-31|2020-12-08|Capital One Services, Llc|Contactless card and method of assembly|
US11018873B1|2020-01-16|2021-05-25|Tyson York Winarski|Collision resistant digital signatures|
CN111294205A|2020-02-24|2020-06-16|联想有限公司|Key management method and device, computer system and readable storage medium|
US11210656B2|2020-04-13|2021-12-28|Capital One Services, Llc|Determining specific terms for contactless card activation|
US10915888B1|2020-04-30|2021-02-09|Capital One Services, Llc|Contactless card with multiple rotating security keys|
US11030339B1|2020-04-30|2021-06-08|Capital One Services, Llc|Systems and methods for data access control of personal user data using a short-range transceiver|
US10861006B1|2020-04-30|2020-12-08|Capital One Services, Llc|Systems and methods for data access control using a short-range transceiver|
US11222342B2|2020-04-30|2022-01-11|Capital One Services, Llc|Accurate images in graphical user interfaces to enable data transfer|
US10963865B1|2020-05-12|2021-03-30|Capital One Services, Llc|Augmented reality card activation experience|
US11063979B1|2020-05-18|2021-07-13|Capital One Services, Llc|Enabling communications between applications in a mobile operating system|
US11100511B1|2020-05-18|2021-08-24|Capital One Services, Llc|Application-based point of sale system in mobile operating systems|
US11113191B1|2020-06-21|2021-09-07|Tyson York Winarski|Direct and indirect addressing pointers for big data|
CN111541727B|2020-07-08|2020-10-20|支付宝信息技术有限公司|Block chain all-in-one machine and automatic chain building method and device thereof|
US11062098B1|2020-08-11|2021-07-13|Capital One Services, Llc|Augmented reality information display and interaction via NFC based authentication|
US11165586B1|2020-10-30|2021-11-02|Capital One Services, Llc|Call center web-based authentication using a contactless card|
US11216799B1|2021-01-04|2022-01-04|Capital One Services, Llc|Secure generation of one-time passcodes using a contactless card|
CN113179165A|2021-03-25|2021-07-27|广东工业大学|Block chain-based mobile network key management and communication method, mobile network, computer device and storage medium|
US11245438B1|2021-03-26|2022-02-08|Capital One Services, Llc|Network-enabled smart apparatus and systems and methods for activating and provisioning same|
US11170130B1|2021-04-08|2021-11-09|Aster Key, LLC|Apparatus, systems and methods for storing user profile data on a distributed database for anonymous verification|
法律状态:
2019-12-03| B09A| Decision: intention to grant [chapter 9.1 patent gazette]|
2020-02-11| B15G| Petition not considered as such [chapter 15.7 patent gazette]|
2020-02-11| B16A| Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 14/12/2016, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
申请号 | 申请日 | 专利标题
US14/976,331|US9948467B2|2015-12-21|2015-12-21|Method and system for blockchain variant using digital signatures|
US14/976,331|2015-12-21|
PCT/US2016/066459|WO2017112469A1|2015-12-21|2016-12-14|Method and system for blockchain variant using digital signatures|
[返回顶部]