Traitement en cours

Veuillez attendre...

Paramétrages

Paramétrages

Aller à Demande

1. WO2020112251 - PROCÉDÉS ET SYSTÈMES DE STOCKAGE ET DE VÉRIFICATION DE DONNÉES DE SUIVI DE PRODUIT SÉCURISÉ

Note: Texte fondé sur des processus automatiques de reconnaissance optique de caractères. Seule la version PDF a une valeur juridique

[ EN ]

CLAIMS

1. A computer-implemented verifiable data storage method comprising:

receiving a product serial number;

receiving an account identifier;

producing a non-invertible hash by operating on the product serial number and the account identifier; and

causing the hash to be written to a secure distributed data store.

2. The method of claim 1, further comprising receiving ancillary data, wherein:

the hash is produced by operating on the product serial number, the account identifier and the ancillary data; or

the method further comprises causing the ancillary data to be written to the data store such that it is linked to the hash, optionally such that the ancillary data is passcode protected with the hash as the passcode.

3. The method of either of claims 1 or 2, wherein causing the hash to be written to the secure distributed data store comprises selecting the secure distributed data store from a plurality of secure distributed data stores depending on the product serial number and/or received ancillary data.

4. A computer-implemented verification method comprising: receiving a product serial number;

receiving an account identifier;

producing a non-invertible hash by operating on the product serial number and the account identifier;

searching a secure distributed data store for the hash; and depending on a result of the searching, providing a confirmation or denial of the hash’s presence in the secure distributed data store.

5. The method of claim 4, wherein providing the confirmation or denial is performed by a user output device.

6. The method of either of claims 4 or 5, wherein, when a confirmation is provided, providing the confirmation comprises providing ancillary data which has been stored in the secure distributed data store such that it is linked to the hash, optionally such that the ancillary data is passcode protected with the hash as the passcode.

7. The method of any of claims 4 to 6, wherein searching the secure distributed data store comprises selecting the secure distributed data store from a plurality of secure distributed data stores depending on the product serial number and/or received ancillary data.

8. The method of any of claims 4 to 7, further comprising:

searching a further secure data store for a record comprising the account identifier and an additional account identifier; and

in response to finding such a record:

producing an additional non-invertible hash by operating on the product serial number and the additional account identifier; and

searching the secure distributed data store for the additional hash;

wherein providing a confirmation or denial of the hash’s presence in the secure distributed data store is dependent on a result of the searching for both the hash and the additional hash.

9. The method of any preceding claim, wherein the product serial number is globally unique.

10. The method of any preceding claim, wherein:

the product serial number is received from an input device; and/or the account identifier is received from an electronic point of sale,‘POS’ terminal.

11. A computer-implemented data storage and verification method comprising:

receiving one or more non-invertible hashes;

writing the one or more hashes to a secure distributed data store;

at a later time, receiving a search request comprising a further non-invertible hash from a network node;

comparing the further non-invertible hash with each of the one or more hashes previously written to the data store;

responsive thereto, ascertaining whether the further hash matches one of the one or more hashes previously written to the secure distributed data store; and responsive to and depending on a result of the ascertaining, transmitting a confirmation or denial of the further hash to the network node.

12. The method of claim 11, further comprising:

prior to receiving the further hash, receiving ancillary data associated with the one of the one or more hashes;

writing the ancillary data to the data store such that it is linked to the one of the one or more hashes, optionally such that the ancillary data is passcode protected with the one of the one or more hashes as the passcode; and

in response to ascertaining that the further hash matches the one of the one or more hashes, transmitting the ancillary data to the network node.

13. The method of any preceding claim, wherein the secure distributed data store is a distributed ledger, optionally a blockchain, or a distributed database exposing verifiable claims.

14. A computer program product comprising computer-readable instructions which, when executed by one or more processors, cause the method of any preceding claim to be performed.

15. A computer system configured to perform the method of any of claims 1 to 13.