专利摘要:
The invention relates to a method for validating message strings through a decentralized network. Said method also makes it possible to manage the validations of the messages relating to a message chain in a unitary and asynchronous manner thus rendering the process unlimited in terms of performance. The method also allows increased security and confidentiality, in particular by integrating the number and geolocation constraints of the message validations. The method thus makes it possible, through a decentralized network of trusted third parties with limited confidence, to restore real trust to the users.
公开号:FR3049089A1
申请号:FR1600470
申请日:2016-03-21
公开日:2017-09-22
发明作者:Sebastien Jean Serge Dupont
申请人:Sebastien Jean Serge Dupont;
IPC主号:
专利说明:

INTRODUCTION
The present invention relates to the field of message chains. More particularly, the invention relates to means for validating said message chains, particularly adapted to secure transactions, without disclosure, through a decentralized computer network.
This invention incorporates the notion of message strings, which unlike current technologies, including those based on centralized databases whether they are distributed or not, which although gaining performance are irremediably limited by their centralized nature. Other methods for overcoming these limitations are thus known. In particular, it is possible, via the blockchain technology - more generally referred to as the "Blockchain" to validate blocks of transactions through a decentralized network. Nevertheless with this type of technology it is not possible to validate transactions one by one. This technology makes it necessary to process the validation of transactions by block of messages, which has the consequence of generating a high latency on the transaction validation and thus of significantly reducing the capacity of this technology to process a large number of transactions in parallel, each block having a limited size and requiring a time set by complexity to solve a calculation. In addition, this technology "burns" a lot of energy, both by the complex calculations it requires, but also by the very large number of unnecessary validations, indeed a single validation device can validate a transaction block. This is why there is a need for message chain management means allowing both to rely on validation devices through a decentralized network, but also to allow message validation of a non-message string. more in blocks, but in a unitary way.
An object of the invention is to provide means for managing the validations of messages relating to a message chain in a unitary manner through a decentralized validation network. Another object of this invention is to rely on the mechanism of NoSQL databases to introduce the concept of "referent" nodes to a given transaction chain thus enabling validation of a unit message on a planetary decentralized network and instantaneously. Another object of this invention is to provide a new mechanism for validating message chains independently of each other and thus to make the process unlimited in terms of performance. Another object is to provide enhanced security and privacy for users of this technology. Another object is to allow validation complexity that is all the more important that the messages to be validated have a high criticality, this complexity is managed both by the number of validations required for a given message, but also in terms of the geographical distribution of the messages. validations. Another object of this invention is to transparently process data hosted by external devices. Finally, perhaps the most important object of this invention is to rely on a decentralized network of trust-limited trusted third parties who both possess the necessary knowledge to validate the messages, but who by transparency of the process makes it possible to restore a real confidence to the users. ABSTRACT
Thus an embodiment provides a method implemented in a network, able to implement a message chain protocol, comprising at least one transmitting device and at least a first and at least a second receiver device adapted to perform calculations. cryptographic, characterized in that it comprises the following steps: a first step where at least one transmitting device transmits at least a first message to at least a first receiving device comprising at least: at least one control key (CCJDA2) generated from a second cryptographic key and; at least one public key (CPUBJDA1) generated from a first cryptographic key and; at least one data area (DATA) and; at least one first cryptographic signature (SIGJDA1) generated by calculating and encrypting the content control key of the at least one first message with the first cryptographic private key and; at least one second cryptographic signature (SIG_DISPEM) generated by calculating and encrypting the content control key of the at least one first message with the cryptographic private key associated with the transmitting device. A second step where at least a first receiving device of the at least one first message performs the following operations: checks the concordance between at least one public key (CPUBJDA1) and a cryptographic signature (SIGJDA1) of the at least one first message; verifies the concordance between the at least one second cryptographic signature of the device (SIG_DISPEM) and a list of cryptographic public keys previously known by at least one receiving device and associated with the sending devices and; calculates the public key (CTRL_PUBU) corresponding to the signature of said sending device (SIG_DISPEM) from public cryptographic keys previously known by at least one receiving device and associated with the sending devices and; generates at least a second validation message associated with said at least one first message and comprising at least: the calculated control key of the content of the at least one first message (SIG_MSG) and; the control key (CTRL_PUBU) associated with the cryptographic public key which made it possible to verify the signature of said sending device (SIG_DISPEM) and; a status code relating to the validity of said at least one first message (STATUS) and; a public key (PUB_ROBOT) of the at least one first receiving device generated from at least one cryptographic key specific to the at least one first receiving device and; the cryptographic signature (SIG_ROBOT) generated by calculating and encrypting the content control key of the at least one first message and the content of the at least one second message with the cryptographic private key associated with the at least one first receiving device and; - Broadcast the first and the second message to at least a second receiver device. A third step, wherein at least a second receiving device of said at least one first and at least one second message transmitted by the at least one first receiving device performs the following operations: checks the concordance between at least one public key (CPUBJDA1) and a cryptographic signature (SIGJDA1) of the at least one first message transmitted by the transmitting device and; - checks the match between the signature (SIG_ROBOT) and the cryptographic public key (PUB_ROBOT) of said first receiver device and; verifies the correspondence between the signature of the at least one first message of the sending device (SIG_DISPEM) and the calculated public key (CTRL_PUBU) by the at least one first receiving device and; - checks the consistency of the status code (STATUS) and; generates at least a third validation message associated with the at least one first and the at least one second message comprising: the control key (SIG_MSG) calculated from the content of the at least one first message; the control key (CTRL_PUBU) associated with the cryptographic public key which made it possible to verify the signature of said at least one transmitting device (SIG_DISPEM) and; a status code relating to the validity of said at least one first message (STATUS) and; a public key (PUB_ROBOT2) of said at least one second receiver device generated from at least one cryptographic key specific to said at least one second receiver device and; the cryptographic signature (SIG_ROBOT2) generated by calculating and encrypting the content control key of the at least one first message and the content of the at least one second message with the cryptographic private key associated with the at least one second receiving device.
According to one embodiment, the method is able to connect at least one first message to at least one second message via at least two control keys, a public key and a signature, the method being characterized in that said at least one second message comprises: at least one control key (CCJDA2) generated from a second cryptographic key and; At least one control key (CCJDA1), at least one public key (CPUBJDA1) and at least one signature (SIGJDA1) of the at least one first message generated from a first cryptographic key and; The signature (SIGJDA1) being generated by calculating the control key of the content of the second message and encrypting the result with the first cryptographic private key.
According to one embodiment, the method is able to implement a decentralized peer-to-peer network, comprising at least a first and a second receiver device adapted to store data and a list of at least one receiving device of said decentralized network. peer-to-peer method, characterized in that it comprises the following steps: a first step where at least a first receiving device interrogates at least a second receiving device of said peer-to-peer distributed network in order to retrieve the list of at least one receiving device of said decentralized peer-to-peer network; A second step wherein said first receiving device retrieves the data from the at least one receiving device of said peer-to-peer network from the list of at least one receiving device of said peer-to-peer distributed network; A third step where said first receiving device is registered with the at least one receiving device of said peer-to-peer distributed network as a new receiving device of said peer-to-peer distributed network; A fourth step where said first receiving device makes available to at least one other receiving device said list of at least one receiving device of said decentralized peer-to-peer network, as well as the data coming from the at least one receiving device of said decentralized network peer to peer.
According to one embodiment, the method is able to transmit at least one message to at least one receiving device of said peer-to-peer distributed network, characterized in that it comprises the following steps: a first step where at least one device transmitter interrogates at least one receiving device of said peer-to-peer distributed network to retrieve the list of at least one receiving device of said peer-to-peer distributed network; A second step where said transmitting device transmits at least one message on at least one receiving device listed in said list of at least one receiving device of said decentralized peer-to-peer network.
According to one embodiment, the method is capable of identifying at least one referent receiver device (7) relating to at least one piece of information of at least one message characterized in that it makes it possible to identify the at least one referent device ( 7) from: • at least one information contained in said at least one message and; At least one message distribution algorithm and; And at least one list of at least one receiving device.
According to one embodiment, the method is able to validate and transmit at least one message to at least one referent receiver device (7), characterized in that it comprises the following steps: • the at least one receiving device after reception said at least one message: - verifies the validity of said at least one message and calculates the referent receiver device (7) relating to the control key of said at least one message; generates at least one validation message associated with said at least one message; - Diffuse said at least one message and said at least one validation message to said at least one referent receiver device (7) relating to the control key of said at least one message.
According to one embodiment, the method is characterized in that it further comprises at least one database.
According to one embodiment, the method is capable of storing and replicating at least one message in at least one database of at least one receiving device according to a data distribution algorithm, the method being characterized in that said at least one receiving device identifies for said at least one message at least one database and at least one receiving device as a function of: at least one piece of information relating to said at least one message and; • according to at least one data distribution algorithm and; According to at least one list of at least one receiving device.
According to one embodiment, the method is adapted to connect at least one message to at least one message chain via at least one validation message of at least one receiving device, characterized in that it comprises the following steps: • a first step where at least one receiving device: validates that at least one second message having control key (CCJDA2) is connected to at least one first message having control key (CCJDA1) by checking the consistency between the control key (CCJDA1), the public key (CPUBJDA1) and the signature (SIGJDA1) indicated in the at least one second message and; calculates the public key (CTRL_PUBU) corresponding to the private key of the transmitting device which made it possible to generate the signature (SIG_DISPEM) of the at least one second message. A second step or said at least one receiving device adds at least one validation message to said at least one second message comprising the following information: information relating to said message (PREMSG_VALID) comprising: the list (LIST_VALID) of at least one device receiver having previously validated said at least one first message and; the control key (SIG_MSG) of the content of the second message and; - a data area (DON) and; said public key (CTRL_PUBU) corresponding to the signature of the sending device (SIG_DISPEM) of the at least one second message. information relating to the validation of said at least one receiving device (VALID_ROBOT) comprising: - the status (STATUS) of the validation of said receiving device and; the public key associated with the at least one receiving device (PUB_ROBOT) and; the cryptographic signature (SIG_ROBOT) generated by calculating and encrypting the content control key of the at least one second message with the cryptographic private key associated with the at least one receiving device.
According to one embodiment, the method is able to independently and asynchronously validate at least one message from at least one message chain, characterized in that it comprises the following steps: a first step where the at least one first receive receiver device, valid, identifies the referent receiver device (7) relating to said at least one first message, and: - generates a message (PREMSG_VALID) and; generates a message (VALID_ROBOT) attesting to the validation of said at least one first message and; diffuses to said at least one referent receiver device: said at least one first message; - the message (PREMSG_VALID) and; - and the message (VALID_ROBOT). A second step where at least one second receiving device, valid, identifies the referent receiver device (7) relating to said at least one first message, and: generates a message (PREMSG_VALID) and; generates a message (VALID_ROBOT) attesting to the validation of said at least one first message and; diffuses to said at least one referent receiver device: said at least one first message; - the message (PREMSG_VALID) and; - and the message (VALID_ROBOT). A third step where said at least one referent receiving device relating to the at least one first receives said at least one transmitted message, the message (PREMSG_VALID) and the message (VALID_ROBOT) of at least one receiving device and: stores said at least one first message transmitted only if it is not already stored and otherwise verifies that it is concordant with said at least one previously stored first message and; stores said message (PREMSG_VALID) only if said message (PREMSG_VALID) is not already stored and otherwise verifies that it is concordant with said at least one message (PREMSG_VALID) previously stored and; - stores said message (VALID_ROBOT) only if said message (VALID_ROBOT) is not already stored. A fourth step where at least one receiving device receives at least a second message having the control key (CCJDA2) and whose previous control key indicated (CCJDA1) corresponds to the control key of said first message, and performs the operations following: - identifies the at least one referent receiver device (7) of the at least one first and at least one second message and; recovering said at least one first message, the message (PREMSG_VALID) and the set of messages (VALID_ROBOT) from said at least one referent receiver device (7) of said at least one first message and; - checks the validity of each of the messages and the conformity criteria relating to the receiving devices that have generated a validation message (VALID_ROBOT) and; - only if the compliance criteria are met: - generates a message (PREMSG_VALID) and a validation message (VALID_ROBOT) relating to the at least one second message and; - Diffuse said at least one second message, the message (PREMSG_VALID) and the message (VALID_ROBOT) to said at least one referent receiver device relating to the at least one second message.
According to one embodiment, the method is adapted to validate at least one message of at least one message chain, taking into account the geographical position of at least one other receiving device having previously validated said message, characterized by the steps following • at least one receiving device receives at least a second message having the control key (CCJDA2) and whose previous control key indicated (CCJDA1) corresponds to the control key of at least a first message, and performs the following operations: identifies the at least one first referent receiver device (7) relating to said at least one first message and; identifies the at least one second referent receiver device (7) relating to said at least one second message and; retrieves the message (PREMSG_VALID) and the set of messages (VALID_ROBOT) relative to said at least one first message from said at least one first referent receiver device (7) of said at least one first message and; checks the validity of each of the messages (PREMSG_VALID) and (VALID_ROBOT) and the geographical position of each of the at least one receiving device at the origin of at least one validation message (VALlD_ROBOT) of the at least one first message and; only if the compliance criteria relating to the geographical position of the at least one receiving device having generated a validation message (VALID_ROBOT) are combined: - generates a message (PREMSG_VALID) containing the list (LIST_VALID) of the at least one receiving device at the origin of a validation message relating to said first message and meeting the conformity criteria relating to the geographical position of the at least one receiving device at the origin of a validation message relating to said first message and; generates a validation message (VALID_ROBOT) relating to said at least one second message and; and diffuses to the at least one second referent receiver device (7) relating to the second message: said at least one second message and; - the associated message (PREMSG_VALID) and; - and the associated message (VALID_ROBOT).
According to one embodiment, the method is adapted to validate a message in a message chain, taking into account the number of receiving devices having previously validated said message, the method being characterized in that it comprises the following steps: at least one receiving device receives at least a second message having the control key (CCJDA2) and whose previous control key indicated (CCJDA1) corresponds to the control key of at least a first message, and performs the following operations : identifies the at least one first referent receiver device (7) relating to said at least one first message and; identifies the at least one second referent receiver device (7) relating to said at least one second message and; retrieves the message (PREMSG_VALID) and the set of messages (VALID_ROBOT) relative to said at least one first message from said at least one first referent receiver device of said at least one first message and; checks the validity of each of the messages (PREMSG_VALID) and (VALID_ROBOT) and the number of receiving devices at the origin of at least one validation message (VALID_ROBOT) of said first message and; only if the compliance criteria relating to the number of receiving devices that have generated a validation message (VALID_ROBOT) are gathered: - generates a message (PREMSG_VALID) containing the list (LIST_VALID) of the at least one receiving device at the origin of a validation message relating to said first message and meeting the conformance criteria relating to the number of receiving devices causing a validation message relating to said first message and; generates a validation message (VALID_ROBOT) relating to said at least one second message and; diffuses to the at least one second referent receiver device (7) relating to the second message: said at least one second message and; - the associated message (PREMSG_VALID) and; - the associated message (VALID_ROBOT).
BRIEF DESCRIPTION OF THE FIGURES Other features and advantages of the present invention will appear in the following description of embodiments, with reference to the accompanying drawings, in which: [Figure 1] schematic view of the transmission and validation of FIG. a message comprising transmitting devices (2), (3) and (4) and receiving devices (1) and (7) integrated in a decentralized network (8) according to one embodiment of the invention; [Figure 2] schematic view of the databases hosted by the receiving devices according to one embodiment of the invention; [Figure 3] schematic view of the link between biometric keys, cryptographic private keys, cryptographic public keys and control keys according to one embodiment of the invention; [Figure 4] schematic view of the messages transmitted by the emitting devices (2) (3) and (4) according to one embodiment of the invention; [Figure 5] schematic view of the content of a message transmitted by a transmitting device accompanied by the validation messages of the receiving devices according to one embodiment of the invention; [Figure 6] schematic view of the number of validations of receiving devices to achieve according to the value indicated in a value transfer type message according to one embodiment of the invention; [Figure 7] schematic view of the asynchronous operation of the validations of the messages transmitted by the transmitting devices and validated by the receiving devices according to one embodiment of the invention.
DETAILED DESCRIPTION
With reference in particular to FIG. 1, a method implemented in a network comprising at least one transmitting device (9) and at least a first and a second receiving device (1), all adapted to perform cryptographic calculations, will now be described. . The invention is composed on the one hand of sending devices (2), (3) and (4) adapted to transmit and retrieve messages to and from the receiving devices (1). The messages are stored through message chains themselves stored on databases hosted by the receiving devices implemented in a decentralized peer-to-peer network (8).
In the remainder of the description, the following points will be addressed to which the invention responds: how to guarantee the replication of data on the entire planet in order to overcome any disaster that could affect one or more continents How to ensure that this decentralized system can rely on as many small nodes as possible rather than a handful of data centers that would create a security flaw in the system How to cover the costs of electricity and networks that would have an individual who would like to host a node How to minimize the power consumption associated with message validation, and how to make message validation really useful for the system How to allow a system designed to accommodate the entire population of the planet to optimize the data that must pass through the network to cover the regions that are most deprived of it How to guarantee the real confidentiality of transactions even though all transactions will be public How to guarantee that the device can survive the arrival of the hypothetical quantum computer
The receiving devices (1), according to one embodiment, each host a first group of NoSQL-type databases, the messages are thus accessible through a decentralized peer-to-peer network of NoSQL databases, these databases being of data are related to a specific use, but remain associated with each other - Fig.2: • Identity database (ID): relating to messages specific to digital identities for example of an individual, an object , a group of individuals, the storage of biometric data, but also the messages relating to a digital identity from any external base. • contract database (CONTRACTS): relating to messages specific to the management of smart contracts, involving specific digital identities to identities stored in the database (ID), to external digital identities, to rules relating to sending devices and receivers, but also messages relating to a smart contract from any external base. • a meta-database (BANQ): to store the values relating to identity messages, contract messages, but also messages from any external database. • technical base (TECH): to store the technical data necessary for the operation of the entire system, for example the list and distribution of the nodes of the peer-to-peer network, the various messages for renewing the keys of the different devices . • basis of pending or rejected transactions (ATTENTKO): this database is related to messages waiting or refused on the whole system, it stores messages waiting for example as part of the notification of the sender or the recipient during a transfer of values.
The peer-to-peer network - or more commonly referred to by the Anglo-Saxon term "peer-to-peer" - is the keystone of any decentralized system. The message strings as used in this invention use this type of network to share the information and the totality of the resources of this system. The nodes of these networks are carried by the receiving devices (1) which in addition to the validation of the messages ensure the storage and dissemination of information wherever the receiving devices (1) are connected to the network - FIG. 1. In the context of a message sent by a transmitting device, the transmitting device will therefore not contact a particular receiving device (1), but any receiving device (1) to validate the message, the receiving device ( 1) directly process the validation of said message or propagate it to a referent receiver device (7) in particular.
The unresolved issues so far on decentralized networks are; management of the distribution of data and validations across the nodes, the organization of the data to allow each node to validate / refute a message without having to modify everything, the control of latency so that a message can be validated on both sides of the planet, the organization of data to prevent a device from downloading several messages of a chain to consult for example its portfolio of values and without going through a centralized service, the distribution of data so that all the data is not replicated on all the nodes and thus optimize the occupation rate of the disks and significantly increase the overall admissible size.
These problems are solved by this invention, in particular by the use of a "column-oriented" type of NoSQL database that is particularly efficient for this type of decentralized system. This database will contain, for example, 5 database schemas, each of which may have a different replication strategy - splitting the databases makes it possible to apply different replication strategies depending on at least one primary key. The data relating to the storage of values, materialized by the database (BANQ), must for example be replicated on all the nodes to ensure maximum availability. However, the messages relating to the biometric identity data may be distributed less systematically, the need for a user to access them quickly (collocation on several nodes nearby), and some other nodes further to ensure the persistence of data even in the event that a country loses its Internet connection and / or its electricity network as is regularly the case in many developing countries. One of the particularly interesting features in this type of database is the indexing of the nodes according to the address of the primary key. By this means, it is therefore possible for each node, or receiver device (1) in the context of this invention, to know the device (s) receiver (s) "referents" (7) to a specific data. Thus, the problem of "planetary" validation by message is solved by the prior knowledge of referent receiver devices (7) in charge of these specific messages.
Smart contracts, also known by the term "smart-contract" as defined in this invention, represent programs whose execution is controlled and verifiable, designed to execute the terms of a contract automatically when certain conditions are met "Also, and to solve the problem of" individual point of failure "known as the Anglo-Saxon" Single Point of Failure ", the configuration of the databases will not be done centrally, but directly by algorithms published on the basis of the technical data (TECH), each new receiving device (1) which will register in the system will then be automatically and dynamically assigned a role known and shared with the other receiving devices (1).
FIG. 4 represents a series of messages destined for the databases relating to the receiving devices: • (11): a message making it possible to link biometric keys to a main digital identity • (12): a message relating to a main digital identity • (13): a message relating to a digital identity • (14): a message relating to a smart contract • (15): a message relating to a transfer of values
Once a message is transmitted, it is then checked and validated or not by the receiving devices that add a validation message connected to said transmitted message. The capacity of the column-oriented database takes on full meaning in FIG. 4, where each column (CC), (PUB) ... must be able to contain an infinity of columns (BioPubDoigt1 [1,2,3], BioPubDoigt2 [1 , 2,3,4] ... or BioHashDoigt1-1, BioHashDoigt1-2 ...), in practice there will be potentially as many columns relating to the validation messages of the receiving devices as of the receiving devices, these columns are also called "supercolumns" ..
For the understanding of the following paragraphs it should be noted that the mining work is a fundamental step of blockchain technologies more generally designated by the Anglo-Saxon term "Blockchain", indeed, it is through the mining that each transaction is validated and that the security of the network is ensured, because in each mining work the whole chain must be checked, if a transaction is added or modified then it is the whole branch of the chain which is refused . In the context of this invention, the mining work is performed by receiving devices, or more precisely autonomous software agents also called "iris robots" (1) that will respond to calls for tenders (the mining is a) which are published in the contract databases (CONTRACTS) and technical data (TECH). Iris Robots accept or not this tender according to the proposed remuneration and with the obligation to execute the contract and to follow the general rules of the system (which is constantly checked by the other Iris Robots - Fig. 1-1) - in the unlikely event of a "crazy miner robot", the other minor robots never use the blocks it has generated and revoke it from the list of Iris Robots enabled by the device. The iris robots (1) are the trusted third parties of this network, but with limited confidence, because each transaction must be proven since its origin.
Mining is the big revolution built into blockchain protocols, this device allows you to manage the security of a distributed network thanks to the mining work that both validates each block of transactions, but where each minor monitors also from the beginning that each block of a string is valid and linked to the previous one. Nevertheless, this "really democratic" system poses three major problems: • the attack of 51%, which is for the attacker to provide 51% of available resources and therefore statistically and temporarily to have the virtual monopoly on the block validation (6 transactions statistically to be certain that a transfer of bitcoin (cryptocurrency operating through a decentralized network) is well integrated in the main chain) • second problem, more perverse this one, which is the emergence of the centers Dedicated mining calculation has the effect of annihilating the interest for a user to take part in the mining network which is catastrophic for the security of the system that is found in the problems of centralized systems. • Although proof of work is necessary to verify the effective work of a minor, the current operation of solving mathematical problems "burns energy" without being useful to the system. This invention focuses particularly on this point so that the proof of work is really useful to the system as a whole. • Finally, all current systems based on Blockchain technology use blocks containing several transactions, which has the effect of making the system slow (on average 10 minutes) for the actual validation of a transaction, on the other hand, this operation has the effect of making some of the mining work unnecessary, because using, for example, already validated transactions, one of the last major drawbacks of this block validation and of requiring a given user to download all the blocks to know the state of its accounts (except to go through a centralized system that does the work for him, but centralizes the system again).
The mining system proposed in the context of this invention is therefore: • To guarantee a transparent execution of mining rules or contracts by the publication of at least one contract in the technical data database (TECH); • To control the distribution of the "right of mining" so as not to annihilate the interest of the greatest number to participate in the security of the network (with an equal distribution of the gains for all the robots (1) which contribute to the validation messages, in other words, the technical chain (TECH) will integrate an algorithm that limits the number of robots (1) so that it remains permanently profitable for those who host it • To provide as proof of work, the verification of the public keys associated with the private keys used for the signature of the authorized sending devices The work of indicating the control key of said public key associated with the signature used by said sending device (the list of public keys relating to the authorized devices being stored on a technical basis (TECH).) This process adds additional security and privacy while tracing the size of the validation message data • To validate each message one by one in place of a message block validation, each message is thus associated with at least one validation message generated by at least one receiving device or iris robot, the succession of validated messages associated with a control key relating to a previous message will thus represent a message chain, furthermore the mechanism for distributing messages associated with referent receiver devices - FIG. 1 - (7) will have the major advantage of making the system asynchronous and thus allow an unlimited number of validations of simultaneous messages; • Finally, the operation of the Iris Robots (1) will have the double advantage of proving both the validity of the messages, but also of proving the replication of the message storage.
The operation of the Iris Robot (1) is therefore an essential link in the system, this autonomous software robot has functionalities enabling it to be the trustworthy limited third party of all the methods described in this invention. The Iris Robots (1) integrate a set of cryptographic keys stored in a cryptoprocessor, allowing it both to identify itself on the network, to renew its keys, but also to provide the computing power necessary while allowing a lowest power consumption possible. The private keys of the iris robots (1) are generated directly by said cryptoprocessor so as never to leave the sequestration zone, thus enabling them to guard against any software or hardware attack. To ensure global replication of the data, it includes a GPS chip to determine for example to 50 km near the position of the robot (which is also verified by network latency between the different robots). Only the operation of the NoSQL database requires more resources that are provided by embedded devices such as those integrated in the "Internet box", "Raspberry PI" or smart mobile phones.
The work carried out by at least one iris robot is as follows: • receive messages transmitted (10) by the sending devices (9); • propagate said transmitted messages to the referring robots (7); • verify that the signature of the sending device (SIG_DISPEM) is valid and that it corresponds to at least one of the public keys listed in the list of public keys corresponding to the authorized transmitting devices; If the message has not yet been associated with a validation message on the referring robot associated with the control key relating to the message, then said robot will generate a message (PREMSG_VALID) - FIG. 5 - to which it will associate a validation message (VALID_ROBOT), if not said robot will check the message (PREMSG_VALID) and if the result is concordant with its computations, it will then add an additional message (VALID_ROBOT), otherwise, if the data are not correct said robot will alert the others robots via the base (TECH).
FIG. 5 represents the materialization of the proof of the work of a robot, the first validation message (PREMSG_VALID) (FIG. 7) comprises the following data: • (LIST_VALID): this zone lists the public keys of the robots having validated the previous message, only the required number of robots is mentioned and in order of date of validation; • (DON): data area encrypted or not with the public key of the shared key of the robots; • (SIG_MSG): the signature of the message including the validations messages of the robots mentioned in the zone (LIST_VALID); • (CTRL_PUBU): the control key corresponding to the public key used by the sending device to sign the message; • (CTRL_AMO): the control key corresponding for example to the public key used by the removable cryptoprocessor of the sending device to sign the message, this zone is encrypted with the public key of the shared key of the robots.
The message (VALID_ROBOT) contains the following data: • (STATUS): containing the status code of the validation message; • (D): containing the date of generation of the validation message; • (PUB_ROBOT): zone containing the public key specific to the robot having validated the message; • (SIG_ROBOT): signature associated with the validation message and associated with the public key of said robot.
It should be noted that the verification of the calculation is instantaneous for the robots that verify it, because the control key of the signature of the sending device is already indicated in the message (PREMSG_VALID) generated previously.
The alert message relating to an erroneous calculation or a non-respect of the contract of a given robot is stored on the basis (TECH), a significant number of other robots will then have to confirm the error or the fraud, if such a case had to occur the robot at the origin of the fraudulent message would then be revoked as well as the individual who would have recorded it.
Since the geographical distribution of robots (1) is a fundamental element of network security, robots' remuneration algorithms are focused on favoring receiving devices or iris robots (1), hosted by the largest number of individuals. , relying for example on the ability of issuing devices to certify the uniqueness of a digital identity. The transmitter device shown in FIG. 2 will for example display several performance indices, both to maximize the gains associated with mining, but also to enable the various robots to be able to maximize the efficiency of their work, the performance indices displayed on the screen. For example, there are the network, the filling rate of the disks, the utilization rates of the microprocessor or of the memory. All of these indices aim to allow the entire network to function optimally.
To ensure greater security for the entire chain (in number of validations and also in number and distance of replications) and significantly increase the complexity of an attacker depending on the criticality of the message, the system will impose for example d as many validations as the value (VAL) indicated in the message (15) will be high -Fig.6, for example, to validate a message indicating a value of 0.0001 it will take five validations is 5 x 500 km distance while to validate a value of 100 it will for example 77 validations or 77 x 500km or approximately the perimeter of the Earth cumulative distance.
To perform these operations without generating too much network latency and while ensuring a security all the more important that the criticality is high, which, in fact, is one of the major innovations of this invention, the validations are performed asynchronously . For example in the following way - Fig.7 - the transfer of value realized on the operation (TXN2), which has been validated by a sufficient number of robots during the operation (TXN1) can be used instantly to be transferred to the " account 3 ", on the other hand the operation (TXN3), which obtained only three validations out of the five required, must await the validation of two additional robots on the message (TXN2) to be validated, no robot having the right, via smart contracts, to validate a message referring to a previous message that has not been validated.
It should also be noted in this example of Figure 7, that the wait required to transfer the values of "account 3", only concerns the "account 3" and only if it has no other values than those mentioned in the example - Fig.7. Full validation, for example up to 322 validations, is only needed when reuse funds for other transactions.
Thus, not only the checks performed are even more important that the criticality of the message is high, but also, it is not necessary to wait for the validation of previous messages to process new messages. This makes it possible to authorize an almost unlimited number of simultaneous transactions, which at the moment does not exist, even less on value transfer messages. It is the presence of the address of a robot in the list of robots listed that allows the remuneration of each, if the transaction is validated. Thus, to avoid the phenomenon of infinite validations, only the validations necessary and indicated in (LIST_VALID) will give rise to remuneration.
权利要求:
Claims (12)
[1" id="c-fr-0001]
1) A method implemented in a network, able to implement a message chain protocol, comprising at least one transmitting device and at least a first and at least a second receiver device adapted to perform cryptographic calculations, characterized in it comprises the following steps: a first step where at least one transmitting device transmits at least a first message to at least a first receiving device comprising at least: at least one control key (CCJDA2) generated from a second cryptographic key and; at least one public key (CPUBJDA1) generated from a first cryptographic key and; at least one data area (DATA) and; at least one first cryptographic signature (SIGJDA1) generated by calculating and encrypting the content control key of the at least one first message with the first cryptographic private key and; at least one second cryptographic signature (SIG_DISPEM) generated by calculating and encrypting the content control key of the at least one first message with the cryptographic private key associated with the transmitting device. A second step where at least a first receiving device of the at least one first message performs the following operations: checks the concordance between at least one public key (CPUBJDA1) and a cryptographic signature (SIGJDA1) of the at least one first message; verifies the concordance between the at least one second cryptographic signature of the device (SIG_DISPEM) and a list of cryptographic public keys previously known by at least one receiving device and associated with the sending devices and; calculates the public key (CTRL_PUBU) corresponding to the signature of said sending device (SIG_DISPEM) from public cryptographic keys previously known by at least one receiving device and associated with the sending devices and; generates at least a second validation message associated with said at least one first message and comprising at least: the calculated control key of the content of the at least one first message (SIG_MSG) and; the control key (CTRL_PUBU) associated with the cryptographic public key which made it possible to verify the signature of said sending device (SIG_DISPEM) and; a status code relating to the validity of said at least one first message (STATUS) and; a public key (PUB_ROBOT) of the at least one first receiving device generated from at least one cryptographic key specific to the at least one first receiving device and; the cryptographic signature (SIG_ROBOT) generated by calculating and encrypting the content control key of the at least one first message and the content of the at least one second message with the cryptographic private key associated with the at least one first receiving device and; - Broadcast the first and the second message to at least a second receiver device. A third step, wherein at least a second receiving device of said at least one first and at least one second message transmitted by the at least one first receiving device performs the following operations: checks the concordance between at least one public key (CPUBJDA1) and a cryptographic signature (SIGJDA1) of the at least one first message transmitted by the transmitting device and; - checks the match between the signature (SIG_ROBOT) and the cryptographic public key (PUB_ROBOT) of said first receiver device and; verifies the correspondence between the signature of the at least one first message of the sending device (SIG_DISPEM) and the calculated public key (CTRL_PUBU) by the at least one first receiving device and; - checks the consistency of the status code (STATUS) and; generates at least a third validation message associated with the at least one first and the at least one second message comprising: the control key (SIG_MSG) calculated from the content of the at least one first message; the control key (CTRL_PUBU) associated with the cryptographic public key which made it possible to verify the signature of said at least one transmitting device (SIG_DISPEM) and; a status code relating to the validity of said at least one first message (STATUS) and; a public key (PUB_ROBOT2) of said at least one second receiver device generated from at least one cryptographic key specific to said at least one second receiver device and; the cryptographic signature (SIG_ROBOT2) generated by calculating and encrypting the content control key of the at least one first message and the content of the at least one second message with the cryptographic private key associated with the at least one second receiving device.
[0002]
2) Method according to claim 1, able to connect at least a first message to at least a second message via at least two control keys, a public key and a signature, the method being characterized in that said at least one second message comprises: at least one control key (CCJDA2) generated from a second cryptographic key and; At least one control key (CCJDA1), at least one public key (CPUBJDA1) and at least one signature (SIGJDA1) of the at least one first message generated from a first cryptographic key and; The signature (SIGJDA1) being generated by calculating the control key of the content of the second message and encrypting the result with the first cryptographic private key.
[0003]
3) Method according to claim 1, able to implement a decentralized network peer-to-peer, comprising at least a first and a second receiver device adapted to store data and a list of at least one receiving device of said decentralized network of peer-to-peer, characterized in that it comprises the following steps: a first step where at least a first receiving device interrogates at least a second receiver device of said peer-to-peer distributed network in order to retrieve the list from least one receiving device of said decentralized peer-to-peer network; A second step wherein said first receiving device retrieves the data from the at least one receiving device of said peer-to-peer network from the list of at least one receiving device of said peer-to-peer distributed network; A third step where said first receiving device is registered with the at least one receiving device of said peer-to-peer distributed network as a new receiving device of said peer-to-peer distributed network; A fourth step where said first receiving device makes available to at least one other receiving device said list of at least one receiving device of said decentralized peer-to-peer network, as well as the data coming from the at least one receiving device of said decentralized network peer to peer.
[0004]
4) Method according to any one of the preceding claims, adapted to transmit at least one message to at least one receiving device of said decentralized peer-to-peer network via at least one transmitting device, characterized in that comprises the following steps: a first step where at least one transmitting device interrogates at least one receiving device of said peer-to-peer distributed network in order to retrieve the list of at least one receiving device of said peer-to-peer distributed network; A second step where said transmitting device transmits at least one message on at least one receiving device listed in said list of at least one receiving device of said decentralized peer-to-peer network.
[0005]
5) Method according to any one of the preceding claims, adapted to identify at least one referent receiver device (7) relating to at least one information of at least one message characterized in that it identifies the at least one referring device (7) from: • at least one information contained in said at least one message and; At least one message distribution algorithm and; And at least one list of at least one receiving device.
[0006]
6) Method according to any one of the preceding claims, able to validate and transmit at least one message to at least one referent receiver device (7), characterized in that it comprises the following steps: • the at least one device receiver after receiving said at least one message: - verifies the validity of said at least one message and calculates the referent receiver device (7) relating to the control key of said at least one message; generates at least one validation message associated with said at least one message; - Diffuse said at least one message and said at least one validation message to said at least one referent receiver device (7) relating to the control key of said at least one message.
[0007]
7) Method according to any one of the preceding claims, comprising at least one receiving device characterized in that it further comprises at least one database.
[0008]
8) Method according to any one of the preceding claims, able to store and replicate at least one message in at least one database of at least one receiving device according to a data distribution algorithm, the method being characterized in that at least one receiving device identifies for at least one message at least one database and at least one receiving device as a function of: at least one piece of information relating to said at least one message and; • according to at least one data distribution algorithm and; According to at least one list of at least one receiving device.
[0009]
9) Method according to any one of the preceding claims, adapted to connect at least one message to at least one message chain via at least one validation message of at least one receiving device, characterized in that it comprises the following steps: a first step where at least one receiving device validates that at least one second message having the control key (CCJDA2) is connected to at least one first message having as control key (CCJDA1) by checking the consistency between the control key (CCJDA1), the public key (CPUBJDA1) and the signature (SIGJDA1) indicated in the at least one second message and; calculates the public key (CTRL_PUBU) corresponding to the private key of the transmitting device which made it possible to generate the signature (SIG_DISPEM) of the at least one second message. A second step or said at least one receiving device adds at least one validation message to said at least one second message comprising the following information: information relating to said message (PREMSG_VALID) comprising: the list (LIST_VALID) of at least one device receiver having previously validated said at least one first message and; the control key (SIG_MSG) of the content of the second message and; - a data area (DON) and; said public key (CTRL_PUBU) corresponding to the signature of the sending device (SIG_DISPEM) of the at least one second message. information relating to the validation of said at least one receiving device (VALID_ROBOT) comprising: - the status (STATUS) of the validation of said receiving device and; the public key associated with the at least one receiving device (PUB.ROBOT) and; the cryptographic signature (SIG_ROBOT) generated by calculating and encrypting the content control key of the at least one second message with the cryptographic private key associated with the at least one receiving device.
[0010]
10) Method according to any one of the preceding claims, able to independently and asynchronously validate at least one message from at least one message chain, characterized in that it comprises the following steps: • a first step where the at least one first receiving device, valid, identifies the referent receiver device (7) relating to said at least one first message, and: - generates a message (PREMSG_VALID) and; generates a message (VALID_ROBOT) attesting to the validation of said at least one first message and; diffuses to said at least one referent receiver device: said at least one first message; - the message (PREMSG_VALID) and; - and the message (VALID_ROBOT). A second step where at least one second receiving device, valid, identifies the referent receiver device (7) relating to said at least one first message, and: generates a message (PREMSG_VALID) and; generates a message (VALID_ROBOT) attesting to the validation of said at least one first message and; diffuses to said at least one referent receiver device: said at least one first message; - the message (PREMSG_VALID) and; - and the message (VALID_ROBOT). A third step where said at least one referent receiving device relating to the at least one first receives said at least one transmitted message, the message (PREMSG_VALID) and the message (VALID_ROBOT) of at least one receiving device and: stores said at least one first message transmitted only if it is not already stored and otherwise verifies that it is concordant with said at least one previously stored first message and; stores said message (PREMSG_VALID) only if said message (PREMSG_VALID) is not already stored and otherwise verifies that it is concordant with said at least one message (PREMSG_VALID) previously stored and; - stores said message (VALID_ROBOT) only if said message (VALID_ROBOT) is not already stored. A fourth step where at least one receiving device receives at least a second message having the control key (CCJDA2) and whose previous control key indicated (CCJDA1) corresponds to the control key of said first message, and performs the operations following: - identifies the at least one referent receiver device (7) of the at least one first and at least one second message and; recovering said at least one first message, the message (PREMSG_VALID) and the set of messages (VALID_ROBOT) from said at least one referent receiver device (7) of said at least one first message and; - checks the validity of each of the messages and the conformity criteria relating to the receiving devices that have generated a validation message (VALID_ROBOT) and; - only if the compliance criteria are met: - generates a message (PREMSG_VALID) and a validation message (VALID_ROBOT) relating to the at least one second message and; - Diffuse said at least one second message, the message (PREMSG_VALID) and the message (VALID_ROBOT) to said at least one referent receiver device relating to the at least one second message.
[0011]
11) Method according to any one of the preceding claims, adapted to validate at least one message from at least one message chain, taking into account the geographical position of at least one other receiving device having previously validated said message, characterized by the following steps: • at least one receiving device receives at least a second message having the control key (CCJDA2) and whose previous control key indicated (CCJDA1) corresponds to the control key of at least a first message , and performs the following operations: identifies the at least one first referent receiver device (7) relating to said at least one first message and; identifies the at least one second referent receiver device (7) relating to said at least one second message and; retrieves the message (PREMSG_VALID) and the set of messages (VALID_ROBOT) relative to said at least one first message from said at least one first referent receiver device (7) of said at least one first message and; checks the validity of each of the messages (PREMSG_VALID) and (VALID_ROBOT) and the geographical position of each of the at least one receiving device at the origin of at least one validation message (VALID_ROBOT) of the at least one first message and; only if the compliance criteria relating to the geographical position of the at least one receiving device having generated a validation message (VALID_ROBOT) are combined: - generates a message (PREMSG_VALID) containing the list (LIST_VALID) of the at least one receiving device at the origin of a validation message relating to said first message and meeting the conformity criteria relating to the geographical position of the at least one receiving device at the origin of a validation message relating to said first message and; generates a validation message (VALID_ROBOT) relating to said at least one second message and; and diffuses to the at least one second referent receiver device (7) relating to the second message: said at least one second message and; - the associated message (PREMSG_VALID) and; - and the associated message (VALID_ROBOT).
[0012]
12) Method according to any one of the preceding claims, adapted to validate a message in a message chain, taking into account the number of receiving devices having previously validated said message, the method being characterized in that it comprises the steps following: • at least one receiving device receives at least a second message having the control key (CCJDA2) and whose previous control key indicated (CCJDA1) corresponds to the control key of at least a first message, and realizes the following operations: identifies the at least one first referent receiver device (7) relating to said at least one first message and; identifies the at least one second referent receiver device (7) relating to said at least one second message and; retrieves the message (PREMSG_VALID) and the set of messages (VALID_ROBOT) relative to said at least one first message from said at least one first referent receiver device of said at least one first message and; checks the validity of each of the messages (PREMSG_VALID) and (VALID_ROBOT) and the number of receiving devices at the origin of at least one validation message (VALID_ROBOT) of said first message and; only if the compliance criteria relating to the number of receiving devices that have generated a validation message (VALID_ROBOT) are gathered: - generates a message (PREMSG_VALID) containing the list (LIST_VALID) of the at least one receiving device at the origin of a validation message relating to said first message and meeting the conformance criteria relating to the number of receiving devices causing a validation message relating to said first message and; generates a validation message (VALID_ROBOT) relating to said at least one second message and; diffuses to the at least one second referent receiver device (7) relating to the second message: said at least one second message and; - the associated message (PREMSG_VALID) and; - the associated message (VALID_ROBOT).
类似技术:
公开号 | 公开日 | 专利标题
EP3403213A2|2018-11-21|Methods and systems implemented in a network architecture with nodes capable of performing message-based transactions
FR3049089A1|2017-09-22|METHOD FOR MANAGING VALIDATIONS OF MESSAGE CHANNEL-RELATED MESSAGES THROUGH A DECENTRALIZED VALIDATION NETWORK
JP6873270B2|2021-05-19|Handling of transaction activities based on smart contracts in the blockchain Caution Methods and devices for protecting data
US20180357683A1|2018-12-13|Rating data management
WO2018131004A9|2018-12-06|Methods and systems for executing smart contracts in secure environments
EP1829280A2|2007-09-05|Secured authentication method for providing services on a data transmission network
WO2017162930A2|2017-09-28|Adaptive device for biometric authentication using ultrasound, infrared and contrast visible light photographs, without disclosure, via a decentralised computer network
US11106487B2|2021-08-31|Performing parallel execution of transactions in a distributed ledger system
FR3058243A1|2018-05-04|METHOD FOR CONTROLLING IDENTITY OF A USER USING A PUBLIC DATABASE
CN111066047A|2020-04-24|Implementing a blockchain based workflow
FR3062499A1|2018-08-03|METHOD FOR REDUCING THE SIZE OF A BLOCKED CHAIN TYPE DATABASE, DEVICE AND PROGRAM THEREOF
Monti et al.2017|An alternative information plan
FR3035248A1|2016-10-21|SECURE-OPERATING-ON-CHIP SYSTEM AND USES THEREOF
US20220085989A1|2022-03-17|Techniques for single round multi-party computation for digital signatures
EP3863219A1|2021-08-11|Method and device for assessing matching of sets of structured data protected by encryption
EP3840287A1|2021-06-23|Decentralised, automated and multi-player secure platform for managing identities of objects through the use of blockchain technology
US20210279358A1|2021-09-09|Cryptographic data entry blockchain data structure
WO2022053951A1|2022-03-17|Techniques for single round multi-party computation for digital signatures
Sansiya et al.2021|Integrate Hybrid Cloud Computing Server With Automated Remote Monitoring for Blockchain as a Service
WO2021069827A1|2021-04-15|Method for deriving a partial signature with partial verification
Singh2019|Blockchain Technologies
pour les Systèmes Collaboratifs2021|Alex AUVOLAT
FR3109234A1|2021-10-15|Process for processing a transaction carried out by a debtor entity with a target creditor entity
WO2020136126A1|2020-07-02|Secure, tracked communication network
FR3093259A1|2020-08-28|Secure and decentralized sidechain achieving consensus for public or private blockchains
同族专利:
公开号 | 公开日
WO2017162931A1|2017-09-28|
FR3049089B1|2018-02-16|
US20190044735A1|2019-02-07|
US11038693B2|2021-06-15|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
WO2004057796A1|2002-12-21|2004-07-08|International Business Machines Corporation|Methods, apparatus and computer programs for generating and/or using conditional electronic signatures for reporting status changes|
US20050005108A1|2003-05-13|2005-01-06|Bsi2000, Inc.|Cryptographically secure transactions with optical cards|
US7178029B2|1998-08-18|2007-02-13|Privador, Ltd|Method and apparatus for validating a digital signature|
US7447904B1|2001-11-14|2008-11-04|Compass Technology Management, Inc.|Systems and methods for obtaining digital signatures on a single authoritative copy of an original electronic record|
JP4556111B2|2004-09-02|2010-10-06|ソニー株式会社|Information processing device|
US20090313171A1|2008-06-17|2009-12-17|Microsoft Corporation|Electronic transaction verification|
US8977013B2|2010-07-12|2015-03-10|The Institute For Diagnostic Imaging Research, University Of Windsor|Biometric sensor and method for generating a three-dimensional representation of a portion of a finger|
US8984286B2|2012-06-28|2015-03-17|International Business Machines Corporation|Message originator token verification|
US9473494B2|2014-01-09|2016-10-18|Fujitsu Limited|Access credentials using biometrically generated public/private key pairs|
WO2015175722A1|2014-05-13|2015-11-19|Nant Holdings Ip, Llc|Healthcare transaction validation via blockchain proof-of-work, systems and methods|
US10599932B2|2014-06-09|2020-03-24|Lawrence Livermore National Security, Llc|Personal electronic device for performing multimodal imaging for non-contact identification of multiple biometric traits|
WO2016128491A1|2015-02-11|2016-08-18|British Telecommunications Public Limited Company|Validating computer resource usage|
US10158480B1|2015-03-16|2018-12-18|Winklevoss Ip, Llc|Autonomous devices|
EP3767878A1|2015-03-27|2021-01-20|Black Gold Coin, Inc.|A system and a method for personal identification and verification|
US20160342989A1|2015-05-21|2016-11-24|Mastercard International Incorporated|Method and system for processing blockchain-based transactions on existing payment networks|
US10366204B2|2015-08-03|2019-07-30|Change Healthcare Holdings, Llc|System and method for decentralized autonomous healthcare economy platform|
KR101661930B1|2015-08-03|2016-10-05|주식회사 코인플러그|Certificate issuance system based on block chain|
US10402792B2|2015-08-13|2019-09-03|The Toronto-Dominion Bank|Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers|
US20170132626A1|2015-11-05|2017-05-11|Mastercard International Incorporated|Method and system for processing of a blockchain transaction in a transaction processing network|
US20170132625A1|2015-11-05|2017-05-11|Mastercard International Incorporated|Method and system for use of a blockchain in a transaction processing network|
US9948467B2|2015-12-21|2018-04-17|Mastercard International Incorporated|Method and system for blockchain variant using digital signatures|
EP3423999A1|2016-03-03|2019-01-09|NEC Laboratories Europe GmbH|Method for managing data in a network of nodes|
FR3049089B1|2016-03-21|2018-02-16|Sebastien Jean Serge Dupont|METHOD FOR MANAGING VALIDATIONS OF MESSAGE CHANNEL-RELATED MESSAGES THROUGH A DECENTRALIZED VALIDATION NETWORK|
US20170344988A1|2016-05-24|2017-11-30|Ubs Ag|System and method for facilitating blockchain-based validation|
US20170352027A1|2016-06-07|2017-12-07|Cornell University|Authenticated data feed for blockchains|
WO2017219007A1|2016-06-17|2017-12-21|Weimer Jonathan|Blockchain systems and methods for user authentication|
KR20190033564A|2016-07-29|2019-03-29|엔체인 홀딩스 리미티드|Block Chain Implementation Method and System|
DE102016215917A1|2016-08-24|2018-03-01|Siemens Aktiengesellschaft|Secured processing of a credential request|
US20180343120A1|2016-10-26|2018-11-29|Black Gold Coin, Inc.|Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features|
EP3560136B1|2016-12-22|2020-12-02|Itext Group NV|Distributed blockchain-based method for saving the location of a file|
US20180341775A1|2017-05-23|2018-11-29|International Business Machines Corporation|Digital license authentication with secure privacy logging|
US10530581B2|2017-09-08|2020-01-07|Fujitsu Limited|Authenticated broadcast encryption|
US10887322B2|2017-12-04|2021-01-05|Microsoft Technology Licensing, Llc|Preserving integrity of multi-authored message content|
US10756902B2|2017-12-28|2020-08-25|Dish Network L.L.C.|System and method using distributed blockchain database|
US11223481B2|2018-08-29|2022-01-11|J2 Cloud Services, Llc|Electronic document signing using blockchain|
US10797873B2|2018-09-12|2020-10-06|Keysight Technologies, Inc.|Methods, systems, and computer readable media for verifying calibration information using a distributed ledger|
US11196569B2|2018-09-12|2021-12-07|Bitclave Pte. Ltd.|Systems and methods for accuracy and attestation of validity of data shared in a secure distributed environment|FR3049089B1|2016-03-21|2018-02-16|Sebastien Jean Serge Dupont|METHOD FOR MANAGING VALIDATIONS OF MESSAGE CHANNEL-RELATED MESSAGES THROUGH A DECENTRALIZED VALIDATION NETWORK|
CN109981689B|2019-04-29|2020-05-12|清华大学|Cross-domain logic strong isolation and security access control method and device in scene of Internet of things|
CN112468525A|2019-09-06|2021-03-09|傲为信息技术有限公司|Domain name management system based on block chain|
CN112468603B|2019-09-06|2022-01-11|傲为信息技术有限公司|Domain name query system and method based on block chain|
法律状态:
2017-03-17| PLFP| Fee payment|Year of fee payment: 2 |
2017-09-22| PLSC| Publication of the preliminary search report|Effective date: 20170922 |
2018-02-20| PLFP| Fee payment|Year of fee payment: 3 |
2019-11-09| PLFP| Fee payment|Year of fee payment: 5 |
2019-11-29| ST| Notification of lapse|Effective date: 20191106 |
2020-02-21| RN| Application for restoration|Effective date: 20200109 |
2020-02-28| FC| Decision of inpi director general to approve request for restoration|Effective date: 20200122 |
2020-11-10| PLFP| Fee payment|Year of fee payment: 6 |
2021-08-14| PLFP| Fee payment|Year of fee payment: 7 |
优先权:
申请号 | 申请日 | 专利标题
FR1600470A|FR3049089B1|2016-03-21|2016-03-21|METHOD FOR MANAGING VALIDATIONS OF MESSAGE CHANNEL-RELATED MESSAGES THROUGH A DECENTRALIZED VALIDATION NETWORK|
FR1600470|2016-03-21|FR1600470A| FR3049089B1|2016-03-21|2016-03-21|METHOD FOR MANAGING VALIDATIONS OF MESSAGE CHANNEL-RELATED MESSAGES THROUGH A DECENTRALIZED VALIDATION NETWORK|
PCT/FR2017/000055| WO2017162931A1|2016-03-21|2017-03-21|Method for managing the validation of messages relating to a message chain individually via a decentralised validation network|
US16/133,989| US11038693B2|2016-03-21|2018-09-18|Method for managing the validation of messages relating to a message chain individually via a decentralised validation network|
[返回顶部]