Search International and National Patent Collections
Some content of this application is unavailable at the moment.
If this situation persists, please contact us atFeedback&Contact
1. (IN201637016609) SYSTEM AND METHOD FOR MONITORING THIRD PARTY ACCESS TO A RESTRICTED ITEM

Office : India
Application Number: 201637016609 Application Date: 12.05.2016
Publication Number: 201637016609 Publication Date: 26.08.2016
Publication Kind : A
Prior PCT appl.: Application Number:PCTIB2014065586 ; Publication Number:WO2015059669 Click to see the data
IPC:
G06Q 30/00
G06F 21/16
H04L 9/32
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
Q
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
30
Commerce, e.g. shopping or e-commerce
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10
Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
16
Program or content traceability, e.g. by watermarking
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9
Arrangements for secret or secure communication
32
including means for verifying the identity or authority of a user of the system
Applicants: STELLENBOSCH UNIVERSITY
Inventors: VAN ROOYEN Gert Jan
LUTZ Frederick Johannes
ENGELBRECHT Herman Arnold
Priority Data: 2013/08093 25.10.2013 ZA
2014/00928 07.02.2014 ZA
Title: (EN) SYSTEM AND METHOD FOR MONITORING THIRD PARTY ACCESS TO A RESTRICTED ITEM
Abstract:
(EN) A system and method for monitoring third party access to a restricted item is provided. Key data is embedded in the restricted item the key data being associated with a store of value and usable to conduct a transaction against the store of value. A record of such a transaction becomes visible in a transaction ledger. The transaction ledger is monitored to determine whether a transaction against the store of value has occurred and the restricted item is designated as accessed by a third party in the event that a transaction against the store of value has occurred.
Also published as:
CN105849757EP3061057RU2016119148WO/2015/059669