G06Q2220/00

SYSTEMS AND METHODS FOR FACILITATING PREDICTING A FUTURE VALUE OF REAL ESTATE ASSETS

Disclosed herein is a method for facilitating predicting a future value of real estate assets. The method may include receiving at least one real estate asset indication of a real estate asset from at least one user device, identifying an asset location of the real estate asset, retrieving price information of the real estate asset from a distributed ledger, retrieving one or more indexes associated with the asset location from the distributed ledger, analyzing price trend and the one or more indexes, establishing a correlation between the price trend and the one or more indexes, generating the future value for the real estate asset at a future time, transmitting the future value of the real estate asset to the at least one user device and storing one or more datasets to the distributed ledger.

Creation and validation of a secure list of security certificates
11593780 · 2023-02-28 · ·

Disclosed is a technique for verifying the validity of security certificates received by a mobile device. The technique can involve diverting a security certificate into a secure environment, such as a payment application, by modifying an import address table (e.g., implementing a “hook”) that is accessed by the security layer of the mobile device. Once diverted, the payment application can create a copy of the security certificate. The copy may be stored in a list of security certificates that is subsequently uploaded to a payment processing system for authentication. In some embodiments, a checksum is generated for the import address table using a cryptographic hash function. The checksum allows the payment application or the payment processing system to determine whether an unauthorized modification of the import address table is present.

Distributed database methods and systems
11593792 · 2023-02-28 · ·

Data representing ownership of a traditional asset of a first party having a predefined monetary value stored at a first party network node is replicated to a plurality of other party network nodes, including a second party network node, communicably coupled to the first party network node and to one another. Entry of data is received at the first party network node that represents a partition by the first party of the asset of the first party on a non-value axis into at least two non-overlapping assets and a transfer of ownership of one of those two assets to the second party. The data representing the partition of the non-value axis and transfer of ownership of one of the two non-overlapping assets to the second party is replicated to the plurality of other party nodes, including the second party network node.

System and method employing virtual ledger

A system, method and computer program product for open innovation including an asset valuation device receiving asset information about tangible or non-tangible assets, and generating a valuation signal, based on the asset information; a self-executing code device receiving the valuation signal, and generating a self-executing code signal, based on the valuation signal; an air router device having both a low band radio channel, and an internet router channel for redundant internet communications, and a malicious code removal device for scrubbing malicious code from data received, receiving the valuation signal, and generating a node voting request signal, based on the valuation signal; and a mesh network having a plurality of node devices receiving the node voting request signal, and generating vote confirmation signals, based on the node voting request signal. Computing devices are connected to the node devices to perform problem solving, smart contract processing, and/or cryptocurrency mining.

Message-less B2B transaction processing

A method is provided for recording purchase transactions, including: receiving a purchase order request that is associated with a purchase order, the purchase order request being received from a purchaser-side system, the purchase order request including purchase information identifying a product, a product quantity, and a first order identifier that is assigned to the purchase order by the purchaser-side system; generating a transaction document in response to the purchase order request, including the purchase information into the transaction document, and recording the transaction document in a document sharing platform or shared cryptographically protected ledger; and progressively updating the transaction document with information provided by the purchaser-side system and a seller-side system as the purchase order is being fulfilled, wherein each update to the transaction document is recorded in the cryptographically protected ledger.

System and method for using unique device identifiers to enhance security

A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user.

Systems and methods for hybrid blockchain control
11595406 · 2023-02-28 · ·

Various embodiments of the present application are directed towards systems and methods for hybrid blockchain control. According to some embodiments a method for hybrid blockchain control, an update to a distributed blockchain is received from a blockchain system. The blockchain system includes multiple nodes individually storing copies of the distributed blockchain and individually updating the copies by a consensus process. A determination is made as to whether the distributed blockchain has been fraudulently modified based on the received update. In response to determining the distributed blockchain has been fraudulently modified: 1) a corrective block is disseminated to the blockchain system to trigger the consensus process on the nodes; and 2) a predefined override in the consensus process is invoked to update the copies of the distributed blockchain in a manner that bypasses an illegitimate block. Further, the predefined override is invoked while the consensus process processes the corrective block.

Two level crux chain platform for protecting and verifying blockchain data
11593803 · 2023-02-28 ·

The present invention relates to a two level crux chain platform with a Proof of History (PoH) for increasing security, robustness and/or verifiability of a blockchain includes a first initial block with a node assigned to an address of a shard, a plurality of following blocks comprising a new address for each of the following blocks generated using previous address and previous block head by a ladder swapping protocol, a record stream with a plurality of stream value and each stream value is a current record value hashed with a previous stream value and a blockchain server for storing a plurality of modules.

SYSTEM AND METHOD FOR PROVIDING SECURE IDENTIFICATION SOLUTIONS

The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader.

SYSTEMS AND METHODS FOR PREVENTION OF UNAUTHORIZED ACCESS TO RESOURCES OF AN INFORMATION SYSTEM
20180005232 · 2018-01-04 ·

An information security system prevents unauthorized access to resources of an information system. The information security system includes a fingerprint scanner that provides fingerprint data, a radio transceiver that stores encrypted data including fingerprint data from authorized users in a first portion and second data in a second portion, and a hub device that receives the encrypted data and the fingerprint data associated with the scanned fingerprint of a user, decrypts the first portion of the encrypted data to provide decrypted fingerprint data, compares the decrypted fingerprint data with the fingerprint data associated with the scanned fingerprint of the user, identifies the user as an authorized user when the decrypted fingerprint data matches the fingerprint data associated with the scanned fingerprint of the user, and provides the second data to the third party device via the second data interface when the user is identified as the authorized user.