1. Distributed key generation system and key generation method
A distributed key generation system and key generation method. The distributed key generation system includes plural electronic devices and one server. Each electronic device must send a data fragment and then the system will synthesize the private key based on these data fragments. In this way, the key is not generated in advance, which can reduce the risk of key leakage. The user can customize the smallest unit as a fragment. Whether it is a melody, a picture, a biometric electronic file or a digital signature of dongle, it can be used as a key-specific fragment. Only at the moment of signing and approving, the key is synthesized instantly through the exclusive patented non-reversible algorithm, and there is no risk of theft when initializing the private key. The system does not have any reserved keys, avoiding the risk that hackers will have the opportunity to hack into the system to obtain the private key.
2. Web Page Data Anti-Counterfeiting Technology
As use digital technology continues to spread, digital photos and on-screen texts have effectively become our daily lives' records and media for any evidence. As a result, ensuring the authenticity of digital material, being free of tampering or forgery, has become more and more important. To that effect, we provide technology targeted to web pages, which can encrypt and verify data's digital fingerprints. In addition, before producing any digital data, it can detect whether changing data or source code replacement function is enabled, and thus enforces restart of the browser, in order to prevent tampering with the on-screen information.
3. Contract Signature Verification System (based on Blockchain)
This complete online contract signing and verification system, through its verification process, ensures that the original contract's Hash value has not been tampered with. After the contract is signed, its Hash value can be uploaded to the blockchain for permanent preservation. In addition, utilizing a second security mechanism, such as matching the company seal's size, personal handwritten signature or biometrics, results in signifiacant rerduction of time in complicated paper printing, sigining and scanning process. The completion of this digitized process then results in a contractual process that is very much non-repudiable. Future patented technologies will also be used in future enterprise solutions.
4. Email Anti-Fraud System (based on Blockchain)
EMail frauds are quite prevalent these days. It is thus vital to be able to prevent the modification or replacement of emails by Man-in-the-Email intermediaries, so to protect both the sender's and the recipient's rights. When sending a message, the sender can take a screenshot capturing the content of the email, the sender, recipient, attachment file name, etc. All the information, including but not limited to above, can then be used to produce a hash value before uploading and saving it to the blockchain; the recipient, after receiving the message, can then verify whether the hash value of the above email is consistent with the original email by comparing and noting the difference. Using this feature allows for preventing any disputes when sending invoices, wire transfers or transactions. This patented technology can be applied to the blockchain platform powering signing of company contracts and email anti-counterfeiting.