17933898. ENABLING TRACEABLE TREES OF TRANSACTIONS simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

ENABLING TRACEABLE TREES OF TRANSACTIONS

Organization Name

International Business Machines Corporation

Inventor(s)

Gero Dittmann of Zürich (CH)

Angelo De Caro of Zürich (CH)

ENABLING TRACEABLE TREES OF TRANSACTIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17933898 titled 'ENABLING TRACEABLE TREES OF TRANSACTIONS

Simplified Explanation

The disclosed technique enables a tree of transactions between entities, such as a first entity and a second entity. The transaction recipient accesses two transactions and two respective secrets, obfuscates and connects the transactions, de-obfuscates them using the secrets, signs part of the second transaction, and allows the second entity to access the obtained signature.

  • Entities can engage in a tree of transactions.
  • Transaction recipient accesses and processes transactions and secrets.
  • Transactions are obfuscated and logically connected.
  • Transactions are de-obfuscated using secrets.
  • Part of the second transaction is signed cryptographically.
  • Second entity gains access to the obtained signature.

Potential Applications

The technology can be applied in secure financial transactions, supply chain management, and data sharing among multiple parties.

Problems Solved

The technique addresses the issues of transaction security, privacy, and authenticity in multi-party transactions.

Benefits

The technology provides enhanced security, privacy, and trust in transactions between multiple entities.

Potential Commercial Applications

"Enhancing Transaction Security and Privacy in Multi-Party Transactions"

Possible Prior Art

No known prior art.

Unanswered Questions

How does the technique handle potential conflicts or disputes between entities in the transaction tree?

The technique does not address the resolution of conflicts or disputes that may arise during the transaction process.

What measures are in place to prevent unauthorized access to the secrets and transactions by malicious actors?

The technique does not specify the security measures implemented to prevent unauthorized access to the secrets and transactions.


Original Abstract Submitted

A disclosed technique enables a tree of transactions between entities which may be a first entity and a second entity. The technique may be implemented at a transaction recipient, which can be one of the entities or an external actor, such as a certifier. The transaction recipient accesses two transactions, including a first and second transaction, and two respective secrets, including a first and second secret. The first transaction originates from the first entity, while the second transaction originates from the second entity. The first and second transaction are obfuscated based on the first secret and the second secret, respectively. The first transaction is logically connected to the second transaction. The transaction recipient further de-obfuscates the two transactions using the two respective secrets, and cryptographically signs at least a part of the second transaction to obtain a signature, prior to allowing the second entity to access the obtained signature.