G06Q2230/00

SYSTEM AND METHOD FOR CRYPTOGRAPHIC CHOICE MECHANISMS
20210343101 · 2021-11-04 · ·

The present invention provides an improved system and method for using cryptography to secure computer-implemented choice mechanisms. In several preferred embodiments, a process is provided for securing participants' submissions while simultaneously providing the capability of validating their submissions. This is referred to as a random permutation. In several other preferred embodiments, a process is provided for securing participants' advance instructions while simultaneously providing the capability of validating their advance instructions. This is referred to as a secure advance instruction. Applications include voting mechanisms, school choice mechanisms, and auction mechanisms.

Computer implemented method and system for transferring control of a digital asset
11791992 · 2023-10-17 · ·

A method of transferring control of a digital asset (2) is disclosed. The method comprises distributing shares d.sub.Ai of a first private key d.sub.A of an elliptic curve cryptography (ECC) system among a plurality of first participants (4). The first private key is accessible by means of a first threshold number (6) of shares d.sub.Ai of the first private key, and is inaccessible in the absence of the first threshold number of shares, and access to the digital asset (2) is provided by digital signature of a first encrypted message with the first private key. Shares of a deterministic key D.sub.k of the cryptography system are distributed among the either the first participants or a plurality of second participants, wherein the deterministic key is accessible by means of a second threshold number of shares of the deterministic key, and is inaccessible in the absence of the second threshold number of shares. A second encrypted message is provided wherein access to the digital asset (2) is provided by digital signature of the second encrypted message with a second private key d.sub.A+D.sub.k of the cryptography system, wherein the second private key is related to said first private key by the deterministic key D.sub.k. Shares S (of the second encrypted message signed with the second private key are generated, wherein the second encrypted message can be signed with the second private key by means of a third threshold number (12) of shares of the signed message, and cannot be signed in the absence of the third threshold number of shares.

CURBSIDE VOTING CART
20210343100 · 2021-11-04 ·

A curbside voter cart for transporting a voting terminal to a parked motorist, comprising a pair of opposing side-rails defined by contiguous tubing, a horizontal long-axle strut spanning the side-rails, a pair of wheels mounted on an axle supported in the long-axle strut, a forwardly-disposed stabilizer spanning the side-rails beneath the axle strut and projecting forward to a horizontal short-axle strut, and a pair of castors mounted on each side of the short-axle strut. In addition, a terminal support platform is adjustably mounted on the side-rails above the wheels and is repositionable anywhere along an upper extent of said side rails for adjustably positioning the voting terminal relative to a voter seated in a car.

Secure real-time product ownership tracking using distributed electronic ledgers

A processor receives a signal representing data including event information detailing an event involving an entity having a registered ownership interest in a product and loads a portion of a distributed electronic ledger for tracking ownership information associated with the product. The distributed electronic ledger includes, within a block thereof and associated with the product, an event trigger list including entity data associated with each entity having a registered ownership interest in the product and a rules engine including rules associated with event triggers in the event trigger list. The processor determines whether a triggering event corresponding to the event is stored in the event trigger list and, when the event has a corresponding triggering event, determines the associated rule within the rules engine. The processor updates and saves the distributed electronic ledger by performing an action specified by the determined associated rule.

System and method of counting votes in an electronic voting system

Disclosed herein are systems and methods for counting a ballot in an electronic voting system. In one aspect, an exemplary method comprises, generating, by a token generator of the system, a number of tokens, wherein every token unambiguously identify actions of a user during an electronic voting, when the user is identified and authenticated successfully, enabling the user to select a token from the number of tokens, activating, by a ballot activator of the system, a ballot for the user, wherein activating includes generating the ballot, unambiguously relating the token selected by the user to the ballot, and enabling the user to access the ballot, and counting, by a ballot counter of the system, the ballot filled out by the user.

SYSTEM AND METHOD OF SOCIAL CONTROL-AND-USE OF IoT DEVICE, CONTROL SERVER SUPPORTING SOCIAL CONTROL-AND-USE OF IoT DEVICE AND MOBILE DEVICE USED FOR SOCIAL CONTROL-AND-USE OF IoT DEVICE

Disclosed herein is a system for social control and use of an Internet of Things (IoT) device, comprising an actuator, one or more mobile devices, and a control server. The actuator is arranged or disposed in a public or common space. The one or more mobile devices comprises a social control user interface (UI), which includes a voting function. The control server comprises a preference aggregation engine for deriving a consensus by aggregating vote(d) values from the one or more mobile devices, and a device control command generating unit for generating a device control command based on the consensus. Other embodiments are described and shown.

Methods and apparatus for electronic voting

Aspects of the present disclosure relate to an apparatus comprising: a substrate; communication circuitry deposited on said substrate; and ballot circuitry deposited on said substrate. The ballot circuitry comprises: a plurality of voting circuitry elements, each voting circuitry element being responsive to a voting operation to change a conductive state of that voting circuitry element; and logic circuitry communicatively coupled with each of the plurality of voting circuitry elements and with the communication circuitry. The logic circuitry is configured to: detect the conductive state of each of the plurality of voting circuitry elements; and transmit, via the communication circuitry and based on the conductive state of each of the plurality of voting circuitry elements, a voting result.

System and method for cryptographic choice mechanisms
11532195 · 2022-12-20 · ·

The present invention provides an improved system and method for using cryptography to secure computer-implemented choice mechanisms. In several preferred embodiments, a process is provided for securing participants' submissions while simultaneously providing the capability of validating their submissions. This is referred to as a random permutation. In several other preferred embodiments, a process is provided for securing participants' advance instructions while simultaneously providing the capability of validating their advance instructions. This is referred to as a secure advance instruction. Applications include voting mechanisms, school choice mechanisms, and auction mechanisms.

Systems and methods for tracking subdivided ownership of connected devices using block-chain ledgers

The disclosed embodiments include computerized systems and methods for generating secured block-chain-based ledger data structures that track subdivide ownership and usage of one or more assets, such as Internet-connected devices. In one instance, an apparatus associated with a rules authority of the secured block-chain-based ledger may detect an occurrence of a triggering event related to at least one of partial ownership interests in the assets, and may access and decrypt a set of rules hashed into the secured block-chain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule, including a generation of additional data blocks reflecting a change in at least one of the partial ownership interests, and additionally or alternatively, processes that adaptively monitor a compliance of one or more partial owners with an imposed usage restriction.

Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers

The disclosed embodiments include computerized systems and methods for generating secured blockchain-based ledger data structures that track occurrences of events across fragmented and geographically dispersed lines-of-business of an enterprise. In one instance, an apparatus associated with a rules authority of the secured blockchain-based ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule, including a disbursement of various rewards to employees in response to customer-specific interactions with the enterprise. The disclosed embodiments provide a rules process for aggregating mutually incompatible enterprise data that specifies the events, and for tracking the events in uniform data structures accessible across the enterprise.