-
-
2.
公开(公告)号:EP4292005B1
公开(公告)日:2024-10-30
申请号:EP22704073.0
申请日:2022-01-20
-
-
-
公开(公告)号:EP4446926A1
公开(公告)日:2024-10-16
申请号:EP24165761.8
申请日:2024-03-25
申请人: eBay Inc.
摘要: Methods, systems, and computer storage media are provided for minting non-fungible tokens (NFTs) using one or more location verification devices. For example, a request to mint an NFT may be received from a user device. In embodiments, the request includes an event identifier associated with an event (e.g., a sporting event) and an event location. A public blockchain address can be identified based on the request to mint the NFT. Using location verification data associated with the location verification device, a location of the user device can be verified. For example, location verification data can be associated with at least one signal received from the user device. In some embodiments, the location verification data also corresponds to a user device communication with a base station. Accordingly, the NFT can be minted based on the public blockchain address and verifying the location of the user device.
-
公开(公告)号:EP4139817B1
公开(公告)日:2024-10-16
申请号:EP21719142.8
申请日:2021-04-19
-
公开(公告)号:EP4022482B1
公开(公告)日:2024-10-16
申请号:EP21724133.0
申请日:2021-04-20
发明人: WANG, Gang , YUNG, Marcel M. Moti
-
公开(公告)号:EP4439364A1
公开(公告)日:2024-10-02
申请号:EP24718023.5
申请日:2024-02-14
发明人: JUN, Hyeeun , LEE, Kisung , SHIN, Yoonho , WOO, Hobin
摘要: According to an embodiment of the disclosure, an electronic device may include a memory and a processor operatively connected to the memory, wherein the memory may include instructions that cause, when executed, the processor to identify whether or not a specified operation command for data related to an application executed in the electronic device is received, if the specified operation command is received, identify an integrity check level specified for the application, perform an integrity check on the data, if the specified integrity check level of the application is greater than or equal to a reference level, in response to reception of the specified operation command, and determine whether or not to execute the specified operation command for the data according to a result of the integrity check. In addition to the embodiment of the disclosure, various other embodiments are possible.
-
公开(公告)号:EP4439281A1
公开(公告)日:2024-10-02
申请号:EP23897952.0
申请日:2023-06-19
发明人: SON, Jaehyeong , KIM, Ho Soo , AN, Jinhyuk , KIM, Duksu
摘要: A device management system that is interconnected with and manages the device may include at least one processor; and a memory configured to store a device management program including at least one instruction executed by the at least one processor.
Here, the at least one processor may store a first program and a second program separately in independently partitioned areas in the memory, wherein the first program is related to functional safety of the device and the second program is unrelated to the functional safety of the device.-
公开(公告)号:EP4395228A3
公开(公告)日:2024-09-25
申请号:EP24169061.9
申请日:2019-10-09
申请人: nChain Licensing AG
CPC分类号: H04L9/3255 , H04L9/3252 , G06F21/64 , H04L9/3239 , H04L9/3066 , H04L9/0833 , H04L9/50
摘要: A computer-implemented method is disclosed. The method includes obtaining a first blockchain transaction configured to be redeemable to permit access to, or transfer control of, a resource, wherein the first blockchain transaction has an output comprising a public key combination verification function. The function comprises a plurality of public keys including a first public key and a second public key, each public key being a point on an elliptic curve, and a group public key being the elliptic curve point addition of the first and second public keys. A first gradient value is determined, being the gradient of the line between the first and second public keys. A second blockchain transaction is provided, the second transaction comprising an input comprising the public keys, the first gradient value, and the group public key. The first blockchain transaction is configured to be redeemable to permit access to, or transfer control of, a resource on successful application of the public key combination verification function to the input to verify that the group public key is derived from a combination of the public keys.
-
-
-
-
-
-
-
-
-