G06Q2220/00

Systems and methods for encrypting data and algorithms

Systems, methods, and computer-readable media for achieving privacy for both data and an algorithm that operates on the data. A system can involve receiving an algorithm from an algorithm provider and receiving data from a data provider, dividing the algorithm into a first algorithm subset and a second algorithm subset and dividing the data into a first data subset and a second data subset, sending the first algorithm subset and the first data subset to the algorithm provider and sending the second algorithm subset and the second data subset to the data provider, receiving a first partial result from the algorithm provider based on the first algorithm subset and first data subset and receiving a second partial result from the data provider based on the second algorithm subset and the second data subset, and determining a combined result based on the first partial result and the second partial result.

Transaction-enabled systems and methods for royalty apportionment and stacking

Transaction-enabled systems and methods for royalty apportionment and stacking are disclosed. An example system may include a plurality of royalty generating elements (a royalty stack) each related to a corresponding one or more of a plurality of intellectual property (IP) assets (an aggregate stack of IP). The system may further include a royalty apportionment wrapper to interpret IP licensing terms and apportion royalties to a plurality of owning entities corresponding to the aggregate stack of IP in response to the IP licensing terms and a smart contract wrapper. The smart contract wrapper is configured to access a distributed ledger, interpret an IP description value and IP addition request, to add an IP asset to the aggregate stack of IP, and to adjust the royalty stack.

SYSTEM AND METHOD FOR MANAGING TRANSACTIONS IN DYNAMIC DIGITAL DOCUMENTS
20230045774 · 2023-02-09 · ·

A system software and method which relates to the field of computing technology or business process models or computer systems or distributed computer systems or computer networks relating to general purpose devices that can be programmed to carry out a set of data table or hash table updates, validations or modifications supporting, enabling or executing public and private services, financial transactions and commercial applications. More specifically, the present invention is directed to distributed and decentralized computing in which said distributed network is supported and encrypted by cryptographic technology, hash functions and distributed public or private keys or other related technology. System and methods for managing dynamic electronic documents on a private distributed ledger comprise establishing a dynamic electronic document comprising a first state object, wherein the state object references a prior approved first transaction; proposing a second transaction comprising as an input the first state object and as an output a transaction command to alter the state object as well as what parameters are required to validate the second transaction; validating the proposed second transaction; and updating the state object on a private distributed ledger to reference the second transaction.

METHOD, APPARATUS, ADAPTER AND SYSTEM FOR CROSS-CHAIN DATA ACCESS OF BLOCKCHAIN

Disclosed are a method and a system for cross-chain data access of blockchain. According to the technical solution, an adapter is added between a service blockchain and a witness blockchain, a cross-chain initiation event and a cross-chain response event on a local service blockchain are registered to the witness blockchain by using the adapter, so as to provide query and push services of cross-chain events to other nodes on the local service blockchain, and trigger related operations on the local service blockchain according to the cross-chain events of the witness blockchain.

Transaction Delegation Method, Transaction Delegation System, and Computer Readable Medium
20230041182 · 2023-02-09 ·

Provided are a transaction delegation method, a transaction delegation system, and a computer readable medium storing a computer program. In this transaction delegation method: a second device that stores account data in a blockchain system receives, through communication outside the blockchain system, delegation data from a first device used by a user, the delegation data being for delegating execution of a desired transaction of the user in the blockchain system; a delegation transaction that causes an execution smart contract executing a transaction based on an account of the user in the blockchain system to execute the desired transaction is created on the basis of the delegation data transmitted from the first device; and the delegation transaction with payment of a fee token or a utility token required for executing a transaction is broadcast to the blockchain system on the basis of the account data.

SYSTEM AND METHOD FOR SECURE PEER-TO-PEER TRANSMISSION OF CONTENT IN DISTRIBUTED LEDGER NEWORKS
20230042916 · 2023-02-09 ·

Different aspects of the invention implement an enhanced DLT system, and corresponding method, that allows the peer-to-peer transmission of huge amounts of data packets of content between users, and to be stored in the DLT network, in a secure, trustworthy and efficient manner. By allowing the interface between any type of existing layer 1 DLT network, it does not require the complex, slow, costly and highly risk process involved in the generation of a new layer 1 DLT network. It opens up the range of possible applications of the DLT network to applications in Big Data, IOT, Web 3, MMOG, or any other environment that needs the trust provided by the immutability of data stored in the DLT network.

SYSTEM AND METHOD FOR PREVENTING SUSPICIOUS TRANSACTIONS IN DISTRIBUTED LEDGER

A system and method for preventing hacking of blockchain is proposed. The system includes a cryptocurrency owner configured to own a cryptocurrency wallet storing a cryptocurrency, a public key, and a private key, and capable of setting monitoring-subjected data and monitoring-excluded data, a hacking countermeasure system configured to check status of the cryptocurrency wallet by being connected to the cryptocurrency owner to receive the cryptocurrency and the public key, invalidate a hacking transaction when the hacking transaction matching the monitoring-subjected data is received, and allow the cryptocurrency to be traded by opening the cryptocurrency wallet with the private key and process transaction details into a block file when a monitoring-excluded transaction matching the monitoring-excluded data is received, and a blockchain network configured to receive the block file from the hacking countermeasure system and duplicate the block file into a plurality of block files to distribute and store each block file.

SYSTEMS AND METHODS FOR COMPLIANCE CHECKS

Systems and methods for performing a compliance check on a proposed transfer of one or more digital assets between a user and a counterparty. In some embodiments, one or more attribute values of the counterparty may be received, the one or more attribute values comprises a first attribute value indicating a status of a distributed ledger address of the counterparty. One or more corresponding attribute attestations may be accessed from a distributed ledger, and may be checked against the one or more attribute values. For instance, it may be checked whether each attribute attestation includes a cryptographic proof of the corresponding attribute value, and/or whether the cryptographic proof is electronically signed by a trusted entity. Additionally, or alternatively, it may be determined, based on the first attribute value indicating the status of the distributed ledger address of the counterparty, whether one or more compliance requirements are triggered.

METHOD OF CONTROLLING AUTONOMOUS VEHICLE AND ELECTRONIC DEVICE
20230044125 · 2023-02-09 ·

A method of controlling an autonomous vehicle and an electronic device are provided, which relate to a field of artificial intelligence technology, and in particular to a field of autonomous driving technology. The method includes: acquiring a vehicle state configuration information from a cloud; enabling a task receiving function of the vehicle, in response to the vehicle state configuration information indicating that the vehicle is in an automatic operation state; acquiring a task information from the cloud in response to the task receiving function being enabled; and controlling the vehicle according to the task information.

Fully Collateralized Stablecoins that Pay a Fixed Rate of Interest
20230044461 · 2023-02-09 ·

Methods and apparatus provide improved stablecoins on a blockchain. The stablecoins are collateralized to fiat-based stablecoins that are loaned to borrowers from a lending pool. Loan payments received from the borrowers are divided into a first portion that buys fiat currency that over-collateralizes the stablecoins and a second portion that pays owners of the stablecoins a fixed rate of interest that does not vary over time.