US 12,244,688 B2
Computer-implemented systems and methods for using a blockchain to perform an atomic swap
Craig Steven Wright, London (GB)
Assigned to NCHAIN LICENSING AG, Zug (CH)
Filed by nChain Licensing AG, Zug (CH)
Filed on Oct. 25, 2023, as Appl. No. 18/383,864.
Application 18/383,864 is a continuation of application No. 17/898,158, filed on Aug. 29, 2022, granted, now 11,838,407.
Application 17/898,158 is a continuation of application No. 17/055,066, granted, now 11,431,477, issued on Aug. 30, 2022, previously published as PCT/IB2019/053772, filed on May 8, 2019.
Claims priority of application No. 1807807 (GB), filed on May 14, 2018; application No. 1807811 (GB), filed on May 14, 2018; application No. 1807813 (GB), filed on May 14, 2018; application No. 1807816 (GB), filed on May 14, 2018; application No. PCT/IB2018/053346 (WO), filed on May 14, 2018; application No. PCT/IB2018/053347 (WO), filed on May 14, 2018; application No. PCT/IB2018/053349 (WO), filed on May 14, 2018; and application No. PCT/IB2018/053350 (WO), filed on May 14, 2018.
Prior Publication US 2024/0187214 A1, Jun. 6, 2024
Int. Cl. H04L 29/06 (2006.01); H04L 9/06 (2006.01); H04L 9/08 (2006.01); H04L 9/14 (2006.01); H04L 9/30 (2006.01); H04L 9/32 (2006.01); H04L 9/00 (2022.01)
CPC H04L 9/0643 (2013.01) [H04L 9/0618 (2013.01); H04L 9/0656 (2013.01); H04L 9/0819 (2013.01); H04L 9/085 (2013.01); H04L 9/14 (2013.01); H04L 9/30 (2013.01); H04L 9/3213 (2013.01); H04L 9/3239 (2013.01); H04L 9/3297 (2013.01); H04L 9/50 (2022.05)] 17 Claims
OG exemplary drawing
 
1. A computer-implemented security method, the method comprising the steps of, at a first user:
(i) converting a first secret value accessible to a first user into a first masked secret value based on the first secret value and a shared secret value accessible by both the first user and a second user;
(ii) applying a one-way function to the first masked secret value to create a first veiled secret value;
(iii) communicating the first veiled secret value to the second user;
(iv) receiving a second veiled secret value from the second user, wherein the second veiled secret value is created by applying a one-way function to a second masked secret value, and wherein the second masked secret value is based on a second secret value accessible to the second user and on the shared secret value; and
(v) constructing a first blockchain transaction comprising the first veiled secret value and the second veiled secret value, the first blockchain transaction arranged to be unlockable to transfer control of a first resource upon provision of both the first masked secret value and the second masked secret value to the first transaction, wherein a second blockchain transaction comprising the first veiled secret value and the second veiled secret value is arranged to be unlockable to transfer control of a second resource upon provision of both the first masked secret value and the second masked secret value to the second transaction,
wherein unlocking of the first blockchain transaction causes the first secret value to be revealed to the second user, and unlocking of the second blockchain transaction causes the second secret value to be revealed to the first user.