[go: up one dir, main page]

Yaga et al., 2025 - Google Patents

A Security Perspective on the Web3 Paradigm

Yaga et al., 2025

View PDF
Document ID
2929311280585806816
Author
Yaga D
Mell P
Publication year

External Links

Snippet

Web3 is a proposed vision for the future of the internet that is restructured to be more usercentric with an emphasis on decentralized data. Users would own and manage their personal data, and systems would be decentralized and distributed. Digital tokens would be …
Continue reading at csrc.nist.rip (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Nizamuddin et al. IPFS-blockchain-based authenticity of online publications
EP3837617B1 (en) Distributed storage of custom clearance data
US12463823B2 (en) Systems and methods for digitally signed contracts with verifiable credentials
WO2020169123A2 (en) Blockchain-based smart contract pools
EP3844655B1 (en) Managing user authorizations for blockchain-based custom clearance services
AU2024219519A1 (en) Low trust privileged access management
WO2020169122A2 (en) Blockchain-based import custom clearance data processing
US11556959B2 (en) Internet data usage control system
US12526155B2 (en) Multi-signature wallets in public trust ledger actions via a database system
WO2020169127A2 (en) User management of blockchain-based custom clearance service platform
US20230214398A1 (en) Data Privacy Management & Compliance Using Distributed Ledger Technology
WO2020169125A2 (en) Blockchain-based document registration for custom clearance
US20240171414A1 (en) Blockchain-based electronic document vault
KR20250050077A (en) How to verify ownership and authentication of digital assets
US20240177143A1 (en) Intermediary roles in public trust ledger actions via a database system
Thomas et al. Distributed identity and verifiable claims using Ethereum standards
AlBadi et al. A review on blockchain techniques used for identity management system: Privacy and access control
US20230394481A1 (en) Authorizing public trust ledger actions via a database system
Yaga et al. A Security Perspective on the Web3 Paradigm
Feulner et al. Self-Sovereign Identity for Digital KYC
Agarwal et al. Blockchain-Enabled Secure Identity Verification in Agri-Food Supply Chain
Bolourforoush et al. Security challenges of digital transformation in smart cities: Case of banking sector
Patel Blockchain and digital signatures for digital self-sovereignty
Zanbaghi A Blockchain-Based Privacy-Preserving Physical Delivery System
de Oliveira Secure Documents in Collaborative Environments