International business machines corporation (20240095725). ENABLING TRACEABLE TREES OF TRANSACTIONS simplified abstract

From WikiPatents
Jump to navigation Jump to search

ENABLING TRACEABLE TREES OF TRANSACTIONS

Organization Name

international business machines corporation

Inventor(s)

Gero Dittmann of Zürich (CH)

Angelo De Caro of Zürich (CH)

ENABLING TRACEABLE TREES OF TRANSACTIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240095725 titled 'ENABLING TRACEABLE TREES OF TRANSACTIONS

Simplified Explanation

The disclosed technique enables a tree of transactions between entities, allowing a transaction recipient to access and de-obfuscate two transactions using respective secrets, sign part of the second transaction, and allow the second entity to access the obtained signature.

  • Entities can engage in a series of transactions with enhanced security measures.
  • Transactions are obfuscated and connected logically to ensure integrity.
  • Cryptographic signatures are used to verify the authenticity of the transactions.

Potential Applications

The technology can be applied in secure financial transactions, supply chain management, and digital asset transfers.

Problems Solved

The technique addresses the issue of transaction security, data integrity, and authentication in a network of entities.

Benefits

Enhanced security, data integrity, and authentication in transactions between entities.

Potential Commercial Applications

Secure payment systems, blockchain technology, digital asset management platforms.

Possible Prior Art

Previous methods of transaction verification and authentication in blockchain technology and secure communication protocols.

Unanswered Questions

How does this technique compare to existing transaction security methods?

The article does not provide a direct comparison with existing transaction security methods.

What are the potential limitations or vulnerabilities of this technique?

The article does not address potential limitations or vulnerabilities of the disclosed technique.


Original Abstract Submitted

a disclosed technique enables a tree of transactions between entities which may be a first entity and a second entity. the technique may be implemented at a transaction recipient, which can be one of the entities or an external actor, such as a certifier. the transaction recipient accesses two transactions, including a first and second transaction, and two respective secrets, including a first and second secret. the first transaction originates from the first entity, while the second transaction originates from the second entity. the first and second transaction are obfuscated based on the first secret and the second secret, respectively. the first transaction is logically connected to the second transaction. the transaction recipient further de-obfuscates the two transactions using the two respective secrets, and cryptographically signs at least a part of the second transaction to obtain a signature, prior to allowing the second entity to access the obtained signature.