Patent classifications
G06Q20/38
METHOD, APPARATUS, ADAPTER AND SYSTEM FOR CROSS-CHAIN DATA ACCESS OF BLOCKCHAIN
Disclosed are a method and a system for cross-chain data access of blockchain. According to the technical solution, an adapter is added between a service blockchain and a witness blockchain, a cross-chain initiation event and a cross-chain response event on a local service blockchain are registered to the witness blockchain by using the adapter, so as to provide query and push services of cross-chain events to other nodes on the local service blockchain, and trigger related operations on the local service blockchain according to the cross-chain events of the witness blockchain.
MESSAGE EXCHANGE BETWEEN COMPUTING DEVICES OPERABLE TO IMPLEMENT COAP
An instructing computing device (210) is disclosed that is operable to implement a 5Constrained Application Protocol (CoAP). The computing device comprises processing circuitry configured to send a first message (211) to a target computing device (220), which comprises a first message identifier and store a record (212) of the first message in a memory. The processing circuitry is further configured to receive a second message (223) from the target computing device, the second message confirming that 0the target computing device has received the first message, wherein the first message is configured to cause the target computing device to store a record (222) of the first message.
Transaction Delegation Method, Transaction Delegation System, and Computer Readable Medium
Provided are a transaction delegation method, a transaction delegation system, and a computer readable medium storing a computer program. In this transaction delegation method: a second device that stores account data in a blockchain system receives, through communication outside the blockchain system, delegation data from a first device used by a user, the delegation data being for delegating execution of a desired transaction of the user in the blockchain system; a delegation transaction that causes an execution smart contract executing a transaction based on an account of the user in the blockchain system to execute the desired transaction is created on the basis of the delegation data transmitted from the first device; and the delegation transaction with payment of a fee token or a utility token required for executing a transaction is broadcast to the blockchain system on the basis of the account data.
SYSTEM AND METHOD FOR PREVENTING SUSPICIOUS TRANSACTIONS IN DISTRIBUTED LEDGER
A system and method for preventing hacking of blockchain is proposed. The system includes a cryptocurrency owner configured to own a cryptocurrency wallet storing a cryptocurrency, a public key, and a private key, and capable of setting monitoring-subjected data and monitoring-excluded data, a hacking countermeasure system configured to check status of the cryptocurrency wallet by being connected to the cryptocurrency owner to receive the cryptocurrency and the public key, invalidate a hacking transaction when the hacking transaction matching the monitoring-subjected data is received, and allow the cryptocurrency to be traded by opening the cryptocurrency wallet with the private key and process transaction details into a block file when a monitoring-excluded transaction matching the monitoring-excluded data is received, and a blockchain network configured to receive the block file from the hacking countermeasure system and duplicate the block file into a plurality of block files to distribute and store each block file.
SYSTEMS AND METHODS FOR COMPLIANCE CHECKS
Systems and methods for performing a compliance check on a proposed transfer of one or more digital assets between a user and a counterparty. In some embodiments, one or more attribute values of the counterparty may be received, the one or more attribute values comprises a first attribute value indicating a status of a distributed ledger address of the counterparty. One or more corresponding attribute attestations may be accessed from a distributed ledger, and may be checked against the one or more attribute values. For instance, it may be checked whether each attribute attestation includes a cryptographic proof of the corresponding attribute value, and/or whether the cryptographic proof is electronically signed by a trusted entity. Additionally, or alternatively, it may be determined, based on the first attribute value indicating the status of the distributed ledger address of the counterparty, whether one or more compliance requirements are triggered.
METHOD FOR TRACKING AND MANAGING A POWER SUPPLYING DEVICE VIA A BLOCKCHAIN-BASED SYSTEM
The present invention provides a method for tracking and managing power supplying devices and a blockchain-based system to perform such tracking and monitoring. The method comprises the steps of retrieving recorded characteristic data that is associated with an existing product identification from a blockchain, verifying such recorded characteristic data, generating a new product identification that is connected to the existing product identification and recording the new product identification and new characteristic data in the blockchain. The system comprises a blockchain and a middleware computer to perform the above-mentioned steps. Also provided herein is a blockchain-based system for monitoring and renting a power supplying device.
METHOD, COMPUTER, AND PROGRAM FOR ARTWORK MANAGEMENT
An artwork management method executed by one or more computers is provided. The artwork management method includes detecting, by a first computer included in the one or more computers, artwork included in a website, determining, by the first computer, whether or not a purchase transaction indicating purchase of the artwork detected is recorded in a blockchain network, and transmitting, by the first computer, a report indicating discovery of unauthorized use of the artwork, in a case where the first computer determines that the purchase transaction is not recorded. According to one aspect, the artwork management method suppresses illegal use of artwork while maintaining accessibility of the artwork.
METHOD AND APPARATUS FOR SUPPORTING TRANSACTIONS OF PRODUCTS
Methods and apparatuses for supporting transactions of products are provided. One of the methods comprises, receiving, by a second terminal, information of a seller that is selling the products, from a first terminal, requesting, by the second terminal, verification of the seller's information from a server, in response to successful verification of the seller's information, acquiring, by the second terminal, a transaction identifier for the products from the server, measuring, by the second terminal, a distance from the first terminal creating, by the second terminal, transaction data including the measured distance and the transaction identifier, requesting, by the second terminal, verification of the transaction data from the server and in response to receiving a message indicating successful verification of the transaction data from the server, performing, by the second terminal, a payment routine for the products.
SYSTEM AND METHOD FOR GENERATING A CONTENTION SCHEME
A system for generating a contention scheme includes a computing device, the computing device configured to obtain a solvency signature as a function of a solvency entity, determine a solvency grouping as a function of the solvency signature, identify a null element as a function of the solvency grouping, wherein identifying the null element further comprises receiving a regulation element as a function of a regulation database, and identifying the null element as a function of the regulation element and the solvency grouping, produce a weighted vector as a function of the null element, and generate a contention scheme as a function of the weighted vector.
TRUSTED, SECURE, AND DEFERRED REAL-TIME PAYMENTS IN A REAL-TIME PAYMENT NETWORK
The disclosure relates to a deferred real-time payment (RTP) in a trusted and secure system environment to pay for a deferred fulfillment order. The deferred fulfillment order includes products or services that may be fulfilled in part or in full after authorization of the deferred RTP. To facilitate trust and security, a deferred payment system may digitally sign certificates issued to various entities in the system environment. Devices in the system environment may transmit and receive messages to create and later settle deferred RTPs that are trusted based on authentication of the digitally signed certificates, which mitigate against security threats such as man-in-the-middle attacks in a communication network.