Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020069069 - INFORMATION INTEGRITY IN BLOCKCHAIN AND RELATED TECHNOLOGIES

Publication Number WO/2020/069069
Publication Date 02.04.2020
International Application No. PCT/US2019/053078
International Filing Date 26.09.2019
IPC
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04L 9/32 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system
CPC
H04L 2209/38
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
38Chaining, e.g. hash chain or certificate chain
H04L 9/0662
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
06the encryption apparatus using shift registers or memories for block-wise ; or stream; coding, e.g. DES systems ; or RC4; Hash functions; Pseudorandom sequence generators
065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
0662with particular pseudorandom sequence generator
H04L 9/0825
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
0825using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
H04L 9/085
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
085Secret sharing or secret splitting, e.g. threshold schemes
H04L 9/0869
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
0869involving random numbers or seeds
H04L 9/10
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
10with particular housing, physical features or manual controls
Applicants
  • MORD, Allan J. [US]/[US]
  • MORD, Benjamin Allan [US]/[US]
Inventors
  • MORD, Benjamin Allan
Agents
  • MALONEY, Denis G.
Priority Data
16/581,94625.09.2019US
62/738,32528.09.2018US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) INFORMATION INTEGRITY IN BLOCKCHAIN AND RELATED TECHNOLOGIES
(FR) INTÉGRITÉ D'INFORMATIONS DANS UNE CHAÎNE DE BLOCS ET TECHNOLOGIES ASSOCIÉES
Abstract
(EN)
Described are techniques for securing a most recent block in a data structure such as a blockchain. Techniques include configuring a data processing node that is deployable to a physical location, with a module that generates a verification signing key (VSK) pair, the VSK pair including a private VSK key that is known only to the data processing node, and a public VSK key, receiving by the data processing node, an indication of the deployment to the physical location, generating in response to the indication, by the data processing node the verification signing key (VSK) pair, and transmitting from the data processing node the public VSK key to one or more electronic devices. These techniques assure to a high degree that the generated private key remains unknown and thus can be used to secure the most recent block that is added to a data structure such as a blockchain.
(FR)
L'invention concerne des techniques permettant de sécuriser un bloc le plus récent dans une structure de données telle qu'une chaîne de blocs. Des techniques comprennent la configuration d'un noeud de traitement de données qui peut être déployé à un emplacement physique, avec un module qui génère une paire de clés de signature de vérification (VSK), la paire VSK comprenant une clé VSK privée qui est connue uniquement du noeud de traitement de données, et une clé VSK publique, la réception par le noeud de traitement de données d'une indication du déploiement à l'emplacement physique,la génération en réponse à l'indication, par le noeud de traitement de données, de la paire de clés de signature de vérification (VSK), et la transmission, à partir du noeud de traitement de données, de la clé VSK publique à un ou plusieurs dispositifs électroniques. Ces techniques garantissent dans une large mesure que la clé privée générée reste inconnue et peut ainsi être utilisée pour sécuriser le bloc le plus récent qui est ajouté à une structure de données telle qu'une chaîne de blocs.
Also published as
Latest bibliographic data on file with the International Bureau