-
公开(公告)号:US20220029969A1
公开(公告)日:2022-01-27
申请号:US17396404
申请日:2021-08-06
申请人: Springcoin, Inc.
摘要: A third-party intermediary manages a protocol that prohibits the third-party intermediary from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request as one or more functions of data, parts of which data may be in tokenized or untokenized form, wherein the values of the functions are generated using secrets, at least one of which is unavailable to the third-party intermediary. By one approach, tokens comprised of data in tokenized form are generated using secrets, at least one of which is unavailable to the third-party intermediary.
-
公开(公告)号:US20200336470A1
公开(公告)日:2020-10-22
申请号:US16817483
申请日:2020-03-12
申请人: Springcoin, Inc.
发明人: David William Kravitz , Mollie Johanna Zechlin , Matthew Benjamin Smith , Fabrice Cheng , John Sun , Robert Zbigniew Krzyzanowski , Ashwini Rao
摘要: A coordinating network element manages a protocol that prohibits the coordinating network element from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request in tokenized form, wherein the tokens are generated using secrets, at least one of which is unavailable to the coordinating network element.
-
公开(公告)号:US11374910B2
公开(公告)日:2022-06-28
申请号:US16817483
申请日:2020-03-12
申请人: Springcoin, Inc.
发明人: David William Kravitz , Mollie Johanna Zechlin , Matthew Benjamin Smith , Fabrice Cheng , John Sun , Robert Zbigniew Krzyzanowski , Ashwini Rao
摘要: A coordinating network element manages a protocol that prohibits the coordinating network element from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request in tokenized form, wherein the tokens are generated using secrets, at least one of which is unavailable to the coordinating network element.
-
-