发明名称 |
SYSTEM AND METHOD FOR MONITORING THIRD PARTY ACCESS TO A RESTRICTED ITEM |
摘要 |
A system and method for monitoring third party access to a restricted item is provided. Key data is embedded in the restricted item, the key data being associated with a store of value and usable to conduct a transaction against the store of value. A record of the transaction becomes visible in a transaction ledger. The transaction ledger is monitored to determine whether a transaction against the store of value has occurred, and the restricted item is designated as accessed by a third party in the event that a transaction against the store of value has occurred. |
申请公布号 |
US2015120567(A1) |
申请公布日期 |
2015.04.30 |
申请号 |
US201414285567 |
申请日期 |
2014.05.22 |
申请人 |
Stellenbosch University |
发明人 |
VAN ROOYEN Gert-Jan;LUTZ Frederick Johannes;ENGELBRECHT Herman Arnold |
分类号 |
G06Q20/38;G06Q20/06 |
主分类号 |
G06Q20/38 |
代理机构 |
|
代理人 |
|
主权项 |
1. A method of monitoring third party access to a restricted item, the restricted item having key data embedded therein, the key data being associated with a store of value and usable to conduct a transaction against the store of value, wherein a record of the transaction becomes visible in a transaction ledger, the method including the steps of:
monitoring the transaction ledger to determine whether a transaction against the store of value has occurred; and designating the restricted item as accessed by a third party in the event that a transaction against the store of value has occurred. |
地址 |
Stellenbosch ZA |