GB201604789D0 - Methods for creating and verifying an electronic user identity - Google Patents
Methods for creating and verifying an electronic user identityInfo
- Publication number
- GB201604789D0 GB201604789D0 GBGB1604789.6A GB201604789A GB201604789D0 GB 201604789 D0 GB201604789 D0 GB 201604789D0 GB 201604789 A GB201604789 A GB 201604789A GB 201604789 D0 GB201604789 D0 GB 201604789D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- verifying
- creating
- methods
- user identity
- electronic user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/223—Payment schemes or models based on the use of peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB1604789.6A GB2548802A (en) | 2016-03-22 | 2016-03-22 | Methods for creating and verifying an electronic user identity |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB1604789.6A GB2548802A (en) | 2016-03-22 | 2016-03-22 | Methods for creating and verifying an electronic user identity |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB201604789D0 true GB201604789D0 (en) | 2016-05-04 |
| GB2548802A GB2548802A (en) | 2017-10-04 |
Family
ID=55968647
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB1604789.6A Withdrawn GB2548802A (en) | 2016-03-22 | 2016-03-22 | Methods for creating and verifying an electronic user identity |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2548802A (en) |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110447022A (en) * | 2017-03-19 | 2019-11-12 | 国际商业机器公司 | Automatic generation and analysis of blockchain data |
| CN110622490A (en) * | 2017-03-09 | 2019-12-27 | M·S·古尔布兰德森 | Core network access provider |
| CN110709871A (en) * | 2017-05-22 | 2020-01-17 | 区块链控股有限公司 | Parameterizable intelligent contracts |
| CN113169879A (en) * | 2018-11-27 | 2021-07-23 | 区块链控股有限公司 | Computer-implemented system and method for storing data on blockchains |
| CN114219491A (en) * | 2022-02-23 | 2022-03-22 | 国网电子商务有限公司 | Block chain-oriented privacy transaction method and related device |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108023893A (en) * | 2017-12-18 | 2018-05-11 | 王松山 | A kind of method of block chain data recognizing system |
| GB2570301A (en) * | 2018-01-17 | 2019-07-24 | Setl Development Ltd | Interaction between blockchains |
| DE102018002466A1 (en) | 2018-03-16 | 2019-09-19 | Xain Ag | Method and device for establishing a secure data transmission connection |
| DE102018004693A1 (en) | 2018-06-05 | 2019-12-05 | Xain Ag | Block chain network |
| EP3644549A1 (en) * | 2018-10-23 | 2020-04-29 | Siemens Aktiengesellschaft | Issuing device and method for issuing and requesting device and method for requesting a digital certificate |
| CN111383005B (en) * | 2018-12-29 | 2024-03-12 | 北京知帆科技有限公司 | Digital currency flow tracking method and device |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20160283939A1 (en) * | 2015-03-25 | 2016-09-29 | Qualcomm Incorporated | System and method to prevent loss of bitcoins due to address errors |
| US20160283920A1 (en) * | 2015-03-28 | 2016-09-29 | Justin Fisher | Authentication and verification of digital data utilizing blockchain technology |
| WO2016161073A1 (en) * | 2015-03-31 | 2016-10-06 | Nasdaq, Inc. | Systems and methods of blockchain transaction recordation |
-
2016
- 2016-03-22 GB GB1604789.6A patent/GB2548802A/en not_active Withdrawn
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110622490A (en) * | 2017-03-09 | 2019-12-27 | M·S·古尔布兰德森 | Core network access provider |
| CN110447022A (en) * | 2017-03-19 | 2019-11-12 | 国际商业机器公司 | Automatic generation and analysis of blockchain data |
| CN110709871A (en) * | 2017-05-22 | 2020-01-17 | 区块链控股有限公司 | Parameterizable intelligent contracts |
| CN113169879A (en) * | 2018-11-27 | 2021-07-23 | 区块链控股有限公司 | Computer-implemented system and method for storing data on blockchains |
| CN114219491A (en) * | 2022-02-23 | 2022-03-22 | 国网电子商务有限公司 | Block chain-oriented privacy transaction method and related device |
Also Published As
| Publication number | Publication date |
|---|---|
| GB2548802A (en) | 2017-10-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ZA202001439B (en) | Document verification and identity verification method and device | |
| GB201604789D0 (en) | Methods for creating and verifying an electronic user identity | |
| PL3280090T3 (en) | User authentication method and device | |
| GB2566896B (en) | Methods and apparatus for authentication in an electronic device | |
| PL3352412T3 (en) | Identity authentication method and device | |
| SG11201705035PA (en) | Method and device for identifying user identity | |
| GB2517775B (en) | Apparatus and methods for identity verification | |
| PL3378209T3 (en) | Systems and methods for authenticating an online user using a secure authorizaton server | |
| EP3214798A4 (en) | Identity authentication method and device | |
| SG11201607031SA (en) | Verification methods and verification devices | |
| ZA201802854B (en) | Authentication methods and sysyems | |
| EP3232634A4 (en) | Identity authentication method and device | |
| GB2555660B (en) | Methods and apparatus for authentication in an electronic device | |
| EP3355220A4 (en) | Facial authentication method and electronic device | |
| EP3338233A4 (en) | Electronic device and user authentication method thereof | |
| GB201616897D0 (en) | Methods and apparatus for authentication in an electronic device | |
| DK3476077T3 (en) | Password generation device and password verification device | |
| PL3223184T3 (en) | Method and device for verifying identity information | |
| PL3288036T3 (en) | An apparatus and associated methods | |
| ZA201802032B (en) | Information registration and authentication method and device | |
| SG11201700626PA (en) | Method and device for identity authentication | |
| SG11201701770XA (en) | User authentication method for enhancing integrity and security | |
| SG11201701483SA (en) | Method and device for verifying user behaviour in mobile scenario | |
| GB201714824D0 (en) | Systems and methods for user identity | |
| EP3316512A4 (en) | User identity authentication method and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |