International business machines corporation (20240095725). ENABLING TRACEABLE TREES OF TRANSACTIONS simplified abstract
Contents
- 1 ENABLING TRACEABLE TREES OF TRANSACTIONS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 ENABLING TRACEABLE TREES OF TRANSACTIONS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
ENABLING TRACEABLE TREES OF TRANSACTIONS
Organization Name
international business machines corporation
Inventor(s)
ENABLING TRACEABLE TREES OF TRANSACTIONS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240095725 titled 'ENABLING TRACEABLE TREES OF TRANSACTIONS
Simplified Explanation
The disclosed technique enables a tree of transactions between entities, allowing a transaction recipient to access and de-obfuscate two transactions using respective secrets, sign part of the second transaction, and allow the second entity to access the obtained signature.
- Entities can engage in a series of transactions with enhanced security measures.
- Transactions are obfuscated and connected logically to ensure integrity.
- Cryptographic signatures are used to verify the authenticity of the transactions.
Potential Applications
The technology can be applied in secure financial transactions, supply chain management, and digital asset transfers.
Problems Solved
The technique addresses the issue of transaction security, data integrity, and authentication in a network of entities.
Benefits
Enhanced security, data integrity, and authentication in transactions between entities.
Potential Commercial Applications
Secure payment systems, blockchain technology, digital asset management platforms.
Possible Prior Art
Previous methods of transaction verification and authentication in blockchain technology and secure communication protocols.
Unanswered Questions
How does this technique compare to existing transaction security methods?
The article does not provide a direct comparison with existing transaction security methods.
What are the potential limitations or vulnerabilities of this technique?
The article does not address potential limitations or vulnerabilities of the disclosed technique.
Original Abstract Submitted
a disclosed technique enables a tree of transactions between entities which may be a first entity and a second entity. the technique may be implemented at a transaction recipient, which can be one of the entities or an external actor, such as a certifier. the transaction recipient accesses two transactions, including a first and second transaction, and two respective secrets, including a first and second secret. the first transaction originates from the first entity, while the second transaction originates from the second entity. the first and second transaction are obfuscated based on the first secret and the second secret, respectively. the first transaction is logically connected to the second transaction. the transaction recipient further de-obfuscates the two transactions using the two respective secrets, and cryptographically signs at least a part of the second transaction to obtain a signature, prior to allowing the second entity to access the obtained signature.