WO2022005434A1 - A trusted zone-based method for safe storage and transfer of blockchain registered digital keys - Google Patents
A trusted zone-based method for safe storage and transfer of blockchain registered digital keys Download PDFInfo
- Publication number
- WO2022005434A1 WO2022005434A1 PCT/TR2021/050673 TR2021050673W WO2022005434A1 WO 2022005434 A1 WO2022005434 A1 WO 2022005434A1 TR 2021050673 W TR2021050673 W TR 2021050673W WO 2022005434 A1 WO2022005434 A1 WO 2022005434A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- vehicle
- trusted environment
- blockchain
- digital
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3226—Use of secure elements separate from M-devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/363—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
Definitions
- the method of the invention relates to a method that ensures safe storage and use of digital keys by storing of various digital keys on the trusted zone for their safe storage on user devices and calling the hardware required to use or transfer these keys from within this trusted zone.
- the method of the invention specifically aims to solve the problem of reliably storing and using a tokenized physical asset key on user devices. In this way, users will be able to take the tokenized keys on their own devices, store them in this device, use them and transfer them from this device without the need for additional hardware.
- the method of the invention is a solution for digitizing physical assets and storing and transferring these assets in trusted environments.
- the environments where the assets are stored digitally are called digital wallets, and the issue of safe recording, storage and transfer of the assets stored in these digital wallets is a current problem.
- One of the most common applications today for the generation and transfer of keys corresponding to physical assets has become blockchain.
- Blockchain which has proven to be applicable to many different platforms, is the most common solution in the field of tokenization. Since the digital key to be produced will be singular and will be reused, it is a common problem in the art that the key can be reused after being transferred or the key can be destroyed.
- Blockchain is distributed database technology where data is saved in blocks and each block contains the digital hash information of the previous block. The data saved in it cannot be changed and is encrypted.
- the digital keys and the transfer transaction information of digital keys are recorded in Blockchain. Blockchain ensures that the generated digital key can be used singularly and is resistant to tampering.
- the security level depends on the protocols to which the transfer is made because the transfer cannot be done through these wallets.
- the keys stored on these wallets without connection are removed from this security shield and become vulnerable to attacks as soon as they are removed from the wallet and are subject to transfer.
- Trusted environments are environments that offer reliable data storage and application operation capability in an isolated way on microprocessors.
- Trustzone and TEE on ARM processors, TxT on Intel processors or crypto processor TPM (Trusted Platform Module) dedicated only to security operations are examples of trusted environments.
- Trusted environments provide safe storage of keys and certificates and provide an additional security level independent of the operating system.
- trusted environments are used to digitally store the vehicle key in the user.
- the use of devices that users constantly carry and use in daily life for the storage of vehicle keys can be secured by means of trusted environments.
- the method of the invention proposes a solution in this direction. Accordingly, users will call the trusted environment over their devices, open the passwords of their pre-loaded keys in this area by entering them with the hardware called from this area and transfer them with the hardware called from this area, so they will continue their transactions without being affected even if there is a leakage to the device itself. Moreover, since they do not leave any traces on the device, there will be no possibility of information leakage afterwards.
- a special digital key (100) for the vehicle is generated by the vehicle producer. Accordingly, a key is generated by conversion from the generated physical key or generating a digital key (100) from scratch. Then this key is identified to the vehicle. The problem of whether it is to be identified to an additional hardware in the vehicle or directly to the vehicle itself will be solved in line with the area recognized by the vehicle producer.
- the information of the generated digital vehicle key (100) is added to the blockchain and sent to the vehicle owner (203) via blockchain.
- the vehicle owner (203) must have created a digital wallet at this point.
- the vehicle owner wants to sell, rent or give his vehicle to the buyer for free of charge he sends the digital vehicle key in his digital wallet to the buyer via Blockchain.
- the vehicle buyer (200) performs the transaction of buying the vehicle by registering the digital key (100) defined on the blockchain to his digital wallet (103) that has been created in advance. If the digital key (100) is requested again for different reasons, it can be re-identified to the digital wallet by the vehicle producer company via blockchain.
- the transaction of creating a digital wallet (103) refers to first of all, call the trusted environment (301) from the device with the trusted environment (300), and perform the authentication process (204) to this called trusted environment (301) with a hardware of which driver is called from within the trusted environment, after this authentication process (204), create the required space to store the keys by creating a wallet from within the trusted environment.
- the main difference from the transaction applied in the art is logging into the trusted environment, performing this authentication process over the hardware called from the trusted environment and storing the keys in this trusted environment. In this respect, it provides an additional security to the user.
- the second important issue is related to transfer.
- the method of the invention also provides differences in transfer; accordingly, the key stored in a trusted environment in a source is encrypted in this trusted environment and transferred to the rich area. After this transfer, it is transferred over the blockchain in an encrypted form and moved to the target device as an encrypted file. After this moving transaction, it is moved to the trusted environment without opening its password and deleted from the rich area. Then, by opening it from the trusted environment and logging in with the hardware called from the trusted environment, the key password is decrypted in the trusted environment and the key is stored there.
- the method of the invention can be briefly expressed as including the following steps;
- a trusted environment (301) is created on the vehicle producer device
- the digital key (100) is sent by the vehicle owner (203) to the buyer (200) over the blockchain (23) through the trusted environment (301),
- Drawing 1 is a schematic representation of the method of the invention and is a demonstration between two sample users of the method of the invention that makes secure the key transfer of the method of the invention. Accordingly, a key generated by drivers called from within the trusted zone is stored on the memory element created within the trusted zone and when it is transferred to another user, it is carried directly through the blockchain to the trusted zone opened on the user device, in this way, it is protected from outside interference.
- the drawing given in the annex of the description document is a schematic representation of the method of the invention, and shows step by step how to perform the transactions once.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The method of the invention relates to a method that ensures safe storage and use of digital keys by storing of various digital keys on the trusted zone for their safe storage on user devices and calling the hardware required to use or transfer these keys from within this trusted zone.
Description
A TRUSTED ZONE-BASED METHOD FOR SAFE STORAGE AND TRANSFER OF BLOCKCHAIN REGISTERED DIGITAL KEYS
TECHNICAL FIELD
The method of the invention relates to a method that ensures safe storage and use of digital keys by storing of various digital keys on the trusted zone for their safe storage on user devices and calling the hardware required to use or transfer these keys from within this trusted zone.
STATE OF THE ART
In the state of the art, it has been common in recent years to tokenize various physical assets and store them on various devices. However, the problem of the use and security of these keys is widely tried to be solved in the art. The method of the invention, specifically aims to solve the problem of reliably storing and using a tokenized physical asset key on user devices. In this way, users will be able to take the tokenized keys on their own devices, store them in this device, use them and transfer them from this device without the need for additional hardware.
DETAILED DESCRIPTION OF THE INVENTION
The method of the invention is a solution for digitizing physical assets and storing and transferring these assets in trusted environments. The environments where the assets are stored digitally are called digital wallets, and the issue of safe recording, storage and transfer of the assets stored in these digital wallets is a current problem. One of the most common applications today for the generation and transfer of keys corresponding to physical assets has become blockchain. Blockchain, which has proven to be applicable to many different platforms, is the most common solution in the field of tokenization. Since the digital key to be produced will be singular and will be reused, it is a common problem in the art that the key can be reused after being transferred or the key can be destroyed. Blockchain is distributed database technology where data is saved in blocks and each block contains the digital hash
information of the previous block. The data saved in it cannot be changed and is encrypted. In the method of invention, the digital keys and the transfer transaction information of digital keys are recorded in Blockchain. Blockchain ensures that the generated digital key can be used singularly and is resistant to tampering.
Although it has led to many innovations, especially in key generation and singularity, blockchain could not offer a reliable solution for the storage of these keys by itself. Although there are many studies on this subject in the art, none of the existing solutions has been able to balance between security and convenience. Since it is not a reliable solution on the one hand and an easy-to-use solution on the other, the generated keys are either stored in insecure environments with the danger of being stolen or are stored in trusted environments, but there are serious problems in transferring them. An example of the first case is storage in cloud servers, and the second case is storage in encrypted private wallets. Low security and high availability are provided in cloud servers, and high security and low availability are provided in encrypted hardware that acts as a wallet. However, although the device itself provides security, the security level depends on the protocols to which the transfer is made because the transfer cannot be done through these wallets. In this respect, the keys stored on these wallets without connection are removed from this security shield and become vulnerable to attacks as soon as they are removed from the wallet and are subject to transfer.
In this respect, it can be said that the solutions proposed in the state of the art create a security problem in this respect. Here, the method of the invention proposes a solution to this problem.
Trusted environments are environments that offer reliable data storage and application operation capability in an isolated way on microprocessors. Trustzone and TEE on ARM processors, TxT on Intel processors or crypto processor TPM (Trusted Platform Module) dedicated only to security operations are examples of trusted environments.
Trusted environments provide safe storage of keys and certificates and provide an additional security level independent of the operating system. In the method of the invention, trusted environments are used to digitally store the vehicle key in the user. The use of devices that users constantly carry and use in daily life for the storage of vehicle keys can be secured by means of trusted environments. The method of the invention proposes a solution in this
direction. Accordingly, users will call the trusted environment over their devices, open the passwords of their pre-loaded keys in this area by entering them with the hardware called from this area and transfer them with the hardware called from this area, so they will continue their transactions without being affected even if there is a leakage to the device itself. Moreover, since they do not leave any traces on the device, there will be no possibility of information leakage afterwards.
Accordingly, the transactions for the application of the invention can be examined by dividing it into two in terms of easier understanding; these two parts are images of the same method from two different sides and mainly indicate the application of the same method.
First of all, a special digital key (100) for the vehicle is generated by the vehicle producer. Accordingly, a key is generated by conversion from the generated physical key or generating a digital key (100) from scratch. Then this key is identified to the vehicle. The problem of whether it is to be identified to an additional hardware in the vehicle or directly to the vehicle itself will be solved in line with the area recognized by the vehicle producer. The information of the generated digital vehicle key (100) is added to the blockchain and sent to the vehicle owner (203) via blockchain.
The vehicle owner (203) must have created a digital wallet at this point. When the vehicle owner wants to sell, rent or give his vehicle to the buyer for free of charge, he sends the digital vehicle key in his digital wallet to the buyer via Blockchain. He adds the digital key (100) he creates for the vehicle to this digital wallet (103) and sends the digital key (100) to the buyer via blockchain (23) to sell, rent or deliver the vehicle for free of charge.
The vehicle buyer (200) performs the transaction of buying the vehicle by registering the digital key (100) defined on the blockchain to his digital wallet (103) that has been created in advance. If the digital key (100) is requested again for different reasons, it can be re-identified to the digital wallet by the vehicle producer company via blockchain.
There are two important issues during the transaction here; the first is the transaction of creating a digital wallet (103). The transaction of creating a digital wallet (103) refers to first of all, call the trusted environment (301) from the device with the trusted environment (300),
and perform the authentication process (204) to this called trusted environment (301) with a hardware of which driver is called from within the trusted environment, after this authentication process (204), create the required space to store the keys by creating a wallet from within the trusted environment. The main difference from the transaction applied in the art is logging into the trusted environment, performing this authentication process over the hardware called from the trusted environment and storing the keys in this trusted environment. In this respect, it provides an additional security to the user.
The second important issue is related to transfer. The method of the invention also provides differences in transfer; accordingly, the key stored in a trusted environment in a source is encrypted in this trusted environment and transferred to the rich area. After this transfer, it is transferred over the blockchain in an encrypted form and moved to the target device as an encrypted file. After this moving transaction, it is moved to the trusted environment without opening its password and deleted from the rich area. Then, by opening it from the trusted environment and logging in with the hardware called from the trusted environment, the key password is decrypted in the trusted environment and the key is stored there.
The method of the invention can be briefly expressed as including the following steps;
• A trusted environment (301) is created on the vehicle producer device,
• Hardware drivers are called from the trusted environment (301),
• This called trusted environment drivers and the digital key (100) created for the vehicle are encrypted in the digital wallet (103) opened to memory (303) called from within the trusted environment again,
• The generated digital key (100) is matched with the vehicle and recorded in the Blockchain,
• In case the vehicle is sold, rented and given free of charge, the digital key (100) is sent by the vehicle owner (203) to the buyer (200) over the blockchain (23) through the trusted environment (301),
• The decrypted key by the hardware of which trusted environment driver is called from the trusted environment (301) on the device with trusted environment installed (300) of the buyer (200), is saved in a digital wallet (103) opened to memory (303) called from within the trusted environment again. This ensures that vehicle keys are safely transferred and stored.
• Transaction information containing the digital key being sent from the vehicle owner to
the buyer is recorded in the Blockchain.
Explanations of the drawings given in the annex of the description document are as follows; Drawing 1 is a schematic representation of the method of the invention and is a demonstration between two sample users of the method of the invention that makes secure the key transfer of the method of the invention. Accordingly, a key generated by drivers called from within the trusted zone is stored on the memory element created within the trusted zone and when it is transferred to another user, it is carried directly through the blockchain to the trusted zone opened on the user device, in this way, it is protected from outside interference.
The drawing given in the annex of the description document is a schematic representation of the method of the invention, and shows step by step how to perform the transactions once.
The explanations of the reference marks shown in the drawings given in the annex of the description document are as follows;
100-Digital key 103 -Digital wallet 200-Buyer
203 -Vehicle Owner
204-Authentication
300-Device with Trusted Environment Installed
301 -Trusted Environment Zone
303 -Trusted Environment Memory Element
304-Rich Area 23-Blockchain Network
Claims
1. The method of the invention is a method for safe storing and transferring digital vehicle keys, characterized by; a. Creating a trusted environment zone (301) on the vehicle producer device; b. Calling hardware drivers over this trusted environment (301) created; c. Saving this called trusted environment drivers and the digital key (100) created for the vehicle as encrypted in the digital wallet (103) opened to memory (303) called from within the trusted environment again; d. Matching the generated digital key (100) with the vehicle and recording it in the Blockchain; e. Sending the digital key (100) by the vehicle owner (203) to the buyer (200) using the blockchain (23) through the trusted environment (301), in case the vehicle is sold, rented and given free of charge; f. Ensuring that vehicle keys are securely transferred and stored by means of saving the decrypted key by the hardware of which trusted environment driver is called from the trusted environment (301) on the device with trusted environment installed (300) of the buyer (200), in a digital wallet (103) opened to memory (303) called from within the trusted environment again; g. Recording the transaction information containing the digital key being sent from the vehicle owner to the buyer in the blockchain.
2. The method as defined in the Claim 1, characterized in that the vehicle keys are produced by the blockchain method.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP21831621.4A EP4165528A4 (en) | 2020-07-03 | 2021-06-30 | A trusted zone-based method for safe storage and transfer of blockchain registered digital keys |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TR2020/10606 | 2020-07-03 | ||
| TR2020/10606A TR202010606A1 (en) | 2020-07-03 | 2020-07-03 | A SECURE ZONE-BASED METHOD FOR RELIABLE STORAGE AND TRANSFER OF BLOCK-CHAIN REGISTERED DIGITAL KEYS |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2022005434A1 true WO2022005434A1 (en) | 2022-01-06 |
Family
ID=79317208
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/TR2021/050673 Ceased WO2022005434A1 (en) | 2020-07-03 | 2021-06-30 | A trusted zone-based method for safe storage and transfer of blockchain registered digital keys |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP4165528A4 (en) |
| TR (1) | TR202010606A1 (en) |
| WO (1) | WO2022005434A1 (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2018020377A1 (en) * | 2016-07-29 | 2018-02-01 | nChain Holdings Limited | Blockchain-implemented method and system |
| CN110322312A (en) * | 2019-03-21 | 2019-10-11 | 复旦大学 | A kind of shared lease method of commerce based on block chain |
| US10521780B1 (en) * | 2015-12-16 | 2019-12-31 | United Services Automobile Association (Usaa) | Blockchain based transaction management |
| US20200151992A1 (en) * | 2018-11-27 | 2020-05-14 | Alibaba Group Holding Limited | System and method for information protection |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR102889452B1 (en) * | 2018-06-13 | 2025-11-24 | 콘스탄티노스 바칼리스 | Systems and methods for securely accessing characteristics or information using blockchain |
| CN110182171A (en) * | 2019-06-13 | 2019-08-30 | 戴姆勒股份公司 | Digital car key system and vehicle based on block chain technology |
-
2020
- 2020-07-03 TR TR2020/10606A patent/TR202010606A1/en unknown
-
2021
- 2021-06-30 EP EP21831621.4A patent/EP4165528A4/en active Pending
- 2021-06-30 WO PCT/TR2021/050673 patent/WO2022005434A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10521780B1 (en) * | 2015-12-16 | 2019-12-31 | United Services Automobile Association (Usaa) | Blockchain based transaction management |
| WO2018020377A1 (en) * | 2016-07-29 | 2018-02-01 | nChain Holdings Limited | Blockchain-implemented method and system |
| US20200151992A1 (en) * | 2018-11-27 | 2020-05-14 | Alibaba Group Holding Limited | System and method for information protection |
| CN110322312A (en) * | 2019-03-21 | 2019-10-11 | 复旦大学 | A kind of shared lease method of commerce based on block chain |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP4165528A4 * |
Also Published As
| Publication number | Publication date |
|---|---|
| EP4165528A4 (en) | 2024-06-26 |
| TR202010606A1 (en) | 2022-01-21 |
| EP4165528A1 (en) | 2023-04-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7587608B2 (en) | Method and apparatus for storing data on the application layer in mobile devices | |
| US20250286869A1 (en) | Systems and methods for third party data protection | |
| RU2602790C2 (en) | Secure access to personal health records in emergency situations | |
| KR101641809B1 (en) | Method and system for distributed off-line logon using one-time passwords | |
| EP3701668B1 (en) | Methods for recording and sharing a digital identity of a user using distributed ledgers | |
| KR101608510B1 (en) | System and method for key management for issuer security domain using global platform specifications | |
| US9043610B2 (en) | Systems and methods for data security | |
| CN103124261B (en) | Wireless Telecom Equipment and the Subscriber Identity Module of extension used in WTRU | |
| US8782403B1 (en) | Method and apparatus for securing confidential data for a user in a computer | |
| US7644285B1 (en) | Recovery access to secure data | |
| EP1914951B1 (en) | Methods and system for storing and retrieving identity mapping information | |
| US20050138389A1 (en) | System and method for making password token portable in trusted platform module (TPM) | |
| US20070130462A1 (en) | Asynchronous encryption for secured electronic communications | |
| GB2595167A (en) | Secure, multi-level access to obfuscated data for analytics | |
| US11706022B1 (en) | Method for trusted data decryption based on privacy-preserving computation | |
| US20080072066A1 (en) | Method and apparatus for authenticating applications to secure services | |
| US8204233B2 (en) | Administration of data encryption in enterprise computer systems | |
| US7234060B1 (en) | Generation and use of digital signatures | |
| US20250182092A1 (en) | A concept for recovering access to a cryptocurrency wallet on a remote server | |
| KR20250052991A (en) | Creation and maintenance of digital tokens on the blockchain using physical device identifiers | |
| US11044105B2 (en) | System, method, and computer program product for sensitive data recovery in high security systems | |
| EP4080815B1 (en) | Managing sensitive information using a trusted platform module | |
| US11283600B2 (en) | Symmetrically encrypt a master passphrase key | |
| US20250209445A1 (en) | A concept for recovering access to a cryptocurrency wallet on a remote server | |
| EP4165528A1 (en) | A trusted zone-based method for safe storage and transfer of blockchain registered digital keys |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21831621 Country of ref document: EP Kind code of ref document: A1 |
|
| ENP | Entry into the national phase |
Ref document number: 2021831621 Country of ref document: EP Effective date: 20230113 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |