Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Guardtime Ip Holdings Limited patents


Recent patent applications related to Guardtime Ip Holdings Limited. Guardtime Ip Holdings Limited is listed as an Agent/Assignee. Note: Guardtime Ip Holdings Limited may have other listings under different names/spellings. We're not affiliated with Guardtime Ip Holdings Limited, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "G" | Guardtime Ip Holdings Limited-related inventors


Blockchain-supported, fail-safe synchronization in a data authentication infrastructure

A distributed hash tree-based authentication system for digital input records has more than one upper-level core node, each of which receives at least one uppermost value from aggregators. Communicating with each other about which aggregator values they have received, the nodes try to reach agreement as to which of these values should be included in duplicated current intra-node hash tree evaluations so as to form a consistent top-level value used as the basis for digital signatures associated with the digital input records. ... Guardtime Ip Holdings Limited

Event verification receipt system and methods

Blockchain blocks are provided with either or both of two element types that enable later verification of block validity. One element type is identifiers, such as signatures, of trusted validators that approve entry of the block into the blockchain. ... Guardtime Ip Holdings Limited

Blockchain-supported, hash tree-based digital signature infrastructure

Transformations of digital records are used as lowest level inputs to a tree data structure having nodes computed as digital combinations of child node values up to a current calendar value. Signature vectors are generated for each of the digital records and have parameters that enable recomputation of the respective current calendar. ... Guardtime Ip Holdings Limited

System and method for access control using context-based proof

Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. ... Guardtime Ip Holdings Limited

Challenge-response access control using context-based proof

Access by a requesting entity to an asset is authorized by an access-controlling entity, which transmits to the requesting entity a challenge data set and then receives from the requesting entity a response purportedly corresponding to a representation of the challenge data set in a non-repudiatable form, obtained from an event validation system. The access-controlling entity queries the event validation system to determine whether the response does correspond to a correct representation of the challenge data set in the non-repudiatable form, and authorizes the requesting entity for access only if the response is correct representation. ... Guardtime Ip Holdings Limited

Strengthened entity identity for digital record signature infrastructure

At least one node in a distributed hash tree verification infrastructure is augmented with either a function of a signature of a child computational node, or of a child entity attestation value derived from an hmac value of the child entity, or both. A data signature, which includes parameters for recomputation of a verifying value, and which is associated with a digital input record, will therefore also include data that identifies at least one child entity in the hash tree path used for its initial registration in the infrastructure.. ... Guardtime Ip Holdings Limited

System and method for secure transmission of streamed data frames

Data acquired, for example by a mobile platform, such as a sequence of images observed by a mobile platform, is grouped. A signature is computed for each group and is transmitted along with frame data to a reception system, which verifies correct transmission based on the group signature. ... Guardtime Ip Holdings Limited

Verification mechanism for network service chain paths

Data packets passing from a source to a destination in a network according to a service function chain (sfc) are processed by an ordered sequence of at least one service function (sf). For each sf in the sfc in order, a current value of a function, such as a hash function, is recursively computed including, as input values, at least current identifying data that identifies a corresponding current one of the sfs, and a value of the function output from an immediately preceding sf. ... Guardtime Ip Holdings Limited

System and method for access control using context-based proof

Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. ... Guardtime Ip Holdings Limited

Verification lineage tracking and transfer control of data sets

Whenever users receive or transfer a copy of any of a set of documents, prior verification of the document is enforced by an administrative system, which associates verification metadata with the copy. As each copy is itself copied, possibly modified, and transferred, updated verification metadata is included with the previous verification metadata to form a verification lineage chain, which can later be examined to determine the circumstances of any verification failure. ... Guardtime Ip Holdings Limited

System and method for verification lineage tracking of data sets

Whenever users receive or transfer a copy of any of a set of documents, prior verification of the document is enforced by an administrative system, which associates verification metadata with the copy. As each copy is itself copied and transferred, updated verification metadata is included with the previous verification metadata to form a verification lineage chain, which can later be examined to determine the circumstances of any verification failure. ... Guardtime Ip Holdings Limited

Blockchain-supported device location verification with digital signatures

Location data from one or more geolocation engines such as gps, a system that determines location from relative signal strengths or transit times, etc., within and/or connected to a device, such as a mobile phone, vehicle, movable electronic device, computer, etc., is included in a digital record that submitted to obtain a digital signature such that the presence of the device at the particular location can later be proven. The digital record may include data that encodes a message, as well as other parameters such as time. ... Guardtime Ip Holdings Limited

Blockchain-supported, node id-augmented digital record signature method

At least one node in a distributed hash tree verification infrastructure is augmented with an identifier of an entity in a registration path. A data signature, which includes parameters for recomputation of a verifying value, and which is associated with a digital input record, will therefore also include data that identifies at least one entity in the hash tree path used for its initial registration in the infrastructure. ... Guardtime Ip Holdings Limited








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Guardtime Ip Holdings Limited in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Guardtime Ip Holdings Limited with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###