GB201513629D0 - Access control - Google Patents
Access controlInfo
- Publication number
- GB201513629D0 GB201513629D0 GBGB1513629.4A GB201513629A GB201513629D0 GB 201513629 D0 GB201513629 D0 GB 201513629D0 GB 201513629 A GB201513629 A GB 201513629A GB 201513629 D0 GB201513629 D0 GB 201513629D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- access control
- access
- control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Finance (AREA)
- Databases & Information Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1513629.4A GB2540976A (en) | 2015-07-31 | 2015-07-31 | Access control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1513629.4A GB2540976A (en) | 2015-07-31 | 2015-07-31 | Access control |
Publications (2)
Publication Number | Publication Date |
---|---|
GB201513629D0 true GB201513629D0 (en) | 2015-09-16 |
GB2540976A GB2540976A (en) | 2017-02-08 |
Family
ID=54063049
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1513629.4A Withdrawn GB2540976A (en) | 2015-07-31 | 2015-07-31 | Access control |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2540976A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110663053A (en) * | 2017-05-22 | 2020-01-07 | 区块链控股有限公司 | Securely providing undetermined data of undetermined origin into a locked script of a blockchain transaction |
CN111083220A (en) * | 2016-08-29 | 2020-04-28 | 中国银联股份有限公司 | Method for providing financial service application |
CN111433803A (en) * | 2017-12-01 | 2020-07-17 | 快特网络有限公司 | Block chain communication and ordering |
CN112686653A (en) * | 2016-02-23 | 2021-04-20 | 区块链控股有限公司 | Registration and automatic management method of intelligent contracts executed by block chains |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016128491A1 (en) | 2015-02-11 | 2016-08-18 | British Telecommunications Public Limited Company | Validating computer resource usage |
EP3329408A1 (en) | 2015-07-31 | 2018-06-06 | British Telecommunications public limited company | Expendable access control |
US11347876B2 (en) | 2015-07-31 | 2022-05-31 | British Telecommunications Public Limited Company | Access control |
US10853750B2 (en) | 2015-07-31 | 2020-12-01 | British Telecommunications Public Limited Company | Controlled resource provisioning in distributed computing environments |
WO2017167548A1 (en) | 2016-03-30 | 2017-10-05 | British Telecommunications Public Limited Company | Assured application services |
US11194901B2 (en) | 2016-03-30 | 2021-12-07 | British Telecommunications Public Limited Company | Detecting computer security threats using communication characteristics of communication protocols |
EP3437291B1 (en) | 2016-03-30 | 2022-06-01 | British Telecommunications public limited company | Network traffic threat identification |
WO2017167547A1 (en) | 2016-03-30 | 2017-10-05 | British Telecommunications Public Limited Company | Cryptocurrencies malware based detection |
WO2017167549A1 (en) | 2016-03-30 | 2017-10-05 | British Telecommunications Public Limited Company | Untrusted code distribution |
US11586751B2 (en) | 2017-03-30 | 2023-02-21 | British Telecommunications Public Limited Company | Hierarchical temporal memory for access control |
EP3382591B1 (en) | 2017-03-30 | 2020-03-25 | British Telecommunications public limited company | Hierarchical temporal memory for expendable access control |
EP3602369B1 (en) | 2017-03-30 | 2022-03-30 | British Telecommunications public limited company | Anomaly detection for computer systems |
US11562293B2 (en) | 2017-05-08 | 2023-01-24 | British Telecommunications Public Limited Company | Adaptation of machine learning algorithms |
WO2018206405A1 (en) | 2017-05-08 | 2018-11-15 | British Telecommunications Public Limited Company | Interoperation of machine learning algorithms |
WO2018206374A1 (en) | 2017-05-08 | 2018-11-15 | British Telecommunications Public Limited Company | Load balancing of machine learning algorithms |
US11451398B2 (en) | 2017-05-08 | 2022-09-20 | British Telecommunications Public Limited Company | Management of interoperating machine learning algorithms |
WO2018228950A1 (en) | 2017-06-12 | 2018-12-20 | British Telecommunications Public Limited Company | Home network access |
WO2018228952A1 (en) * | 2017-06-12 | 2018-12-20 | British Telecommunications Public Limited Company | Expendable network access |
US11539701B2 (en) | 2017-06-12 | 2022-12-27 | British Telecommunications Public Limited Company | Network access point |
GB2565411A (en) * | 2017-06-12 | 2019-02-13 | British Telecomm | Improved hardware security module management |
EP3639466B1 (en) * | 2017-06-12 | 2022-05-11 | British Telecommunications public limited company | Expendable cryptographic key access |
DE102017211201A1 (en) * | 2017-06-30 | 2019-01-03 | Siemens Aktiengesellschaft | Method for asymmetric key management and security-relevant installation |
CN107332847B (en) * | 2017-07-05 | 2019-04-26 | 武汉凤链科技有限公司 | A kind of access control method and system based on block chain |
JP2021105750A (en) * | 2018-04-02 | 2021-07-26 | ソニーグループ株式会社 | Information processing device, information processing method, and program |
DE102018207306A1 (en) * | 2018-05-09 | 2019-11-14 | Siemens Mobility GmbH | Device for the controlled execution of a safety-related action in rail traffic |
CN109711184B (en) * | 2018-12-28 | 2020-11-10 | 国网电子商务有限公司 | Block chain data access control method and device based on attribute encryption |
CN111339208B (en) * | 2020-05-15 | 2020-08-25 | 支付宝(杭州)信息技术有限公司 | Method and device for calling intelligent contract |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2514716A (en) * | 2013-10-25 | 2014-12-03 | Univ Stellenbosch | System and method for monitoring third party access to a restricted item |
US9426151B2 (en) * | 2013-11-01 | 2016-08-23 | Ncluud Corporation | Determining identity of individuals using authenticators |
-
2015
- 2015-07-31 GB GB1513629.4A patent/GB2540976A/en not_active Withdrawn
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112686653A (en) * | 2016-02-23 | 2021-04-20 | 区块链控股有限公司 | Registration and automatic management method of intelligent contracts executed by block chains |
CN112686653B (en) * | 2016-02-23 | 2024-06-07 | 区块链控股有限公司 | Registration and automation management method for intelligent contract executed by block chain |
CN111083220A (en) * | 2016-08-29 | 2020-04-28 | 中国银联股份有限公司 | Method for providing financial service application |
CN111083220B (en) * | 2016-08-29 | 2022-08-12 | 中国银联股份有限公司 | Method for providing financial service application |
CN110663053A (en) * | 2017-05-22 | 2020-01-07 | 区块链控股有限公司 | Securely providing undetermined data of undetermined origin into a locked script of a blockchain transaction |
CN110709872A (en) * | 2017-05-22 | 2020-01-17 | 区块链控股有限公司 | Constraint injection to unlock transaction bytecodes |
CN110663053B (en) * | 2017-05-22 | 2024-06-07 | 区块链控股有限公司 | Securely providing uncertain data of an uncertain origin into a locked script of a blockchain transaction |
CN110709872B (en) * | 2017-05-22 | 2024-06-07 | 区块链控股有限公司 | Constraint injection for unlocking transaction bytecodes |
CN111433803A (en) * | 2017-12-01 | 2020-07-17 | 快特网络有限公司 | Block chain communication and ordering |
Also Published As
Publication number | Publication date |
---|---|
GB2540976A (en) | 2017-02-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB201513629D0 (en) | Access control | |
GB201518778D0 (en) | Access point | |
GB201513630D0 (en) | Expendable access control | |
GB201518967D0 (en) | Access control device | |
IL246890A0 (en) | Distributed access control | |
GB2579925B (en) | Control unit | |
GB201513967D0 (en) | Control system | |
GB2543781B (en) | Access control device | |
GB2538577B (en) | Control system | |
GB201808722D0 (en) | Access control | |
GB2542364B (en) | Control system | |
GB201520364D0 (en) | Control system | |
GB201507720D0 (en) | Access provision | |
AU366233S (en) | Control box | |
GB2534886B (en) | Control system | |
HUE057405T2 (en) | Control system | |
GB2542793B (en) | Control system | |
GB201617061D0 (en) | Control unit | |
GB201911510D0 (en) | Control unit | |
GB2559681B (en) | Control system | |
AU366232S (en) | Control box | |
PL2985635T3 (en) | Access control gate | |
PL2966625T3 (en) | Access control device | |
GB201619541D0 (en) | Access control | |
GB201617315D0 (en) | Access control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |