The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 30, 2022

Filed:

May. 08, 2019
Applicant:

Nchain Holdings Limited, St. John's, AG;

Inventor:

Craig Steven Wright, London, GB;

Assignee:

nChain Holdings Limited, St. John's, AG;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 9/06 (2006.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04L 9/30 (2006.01); H04L 9/14 (2006.01);
U.S. Cl.
CPC ...
H04L 9/0643 (2013.01); H04L 9/0618 (2013.01); H04L 9/0656 (2013.01); H04L 9/085 (2013.01); H04L 9/0819 (2013.01); H04L 9/14 (2013.01); H04L 9/30 (2013.01); H04L 9/3213 (2013.01); H04L 9/3239 (2013.01); H04L 9/3297 (2013.01); H04L 2209/38 (2013.01);
Abstract

A computer-implemented security method is provided. The method may be implemented on one or more blockchains, such as the Bitcoin Cash blockchain. The method comprises the steps of: converting a first secret value (S) accessible to a first user into a first derived public key (P), and transmitting the first derived public key to the second user; converting a second secret value (S) accessible to a second user into a second derived public key (P), and transmitting the second derived public key to the first user; calculating a third derived public key (P_AE) based at least in part on the first derived public key; calculating a fourth derived public key (P_BE) based at least in part on the second derived public key; applying a one-way function to each of the first secret value and the second secret value to create respective first and second veiled secret values (H(S), H(S)); communicating the first veiled secret value from a first user to a second user and the second veiled secret value from the second user to the first user; and constructing first and second blockchain transactions (tx, tx) each comprising the first veiled secret value and the second veiled secret value, the transactions arranged to be unlockable to transfer control of a respective first or second resource upon provision of both the first secret value and the second secret value to the respective transaction, wherein unlocking of the first blockchain transaction causes the first secret value to be revealed to the second user, and unlocking of the second blockchain transaction causes the second secret value to be revealed to the first user, and wherein revelation of the first secret value to the second user enables the second user to calculate a second private key (S) corresponding to the third derived public key, and revelation of the second secret value to the first user enables the first user to calculate a first private key (S) corresponding to the fourth derived public key.


Find Patent Forward Citations

Loading…