Patent classifications
G06F21/108
METHOD FOR PERFORMING SEGMENTING LOCKING AND MERGING CONTROL OF ENCRYPTED DIGITAL ASSETS BASED ON TIME DIMENSION
A method for performing segmenting locking and merging control of encrypted digital assets based on time dimension is provided. The method being mainly provided to achieve segmenting locking and merging control of encrypted digital assets by adding a time attribute to encrypted digital asset. Using the method for performing segmenting locking and merging control of encrypted digital assets based on time dimension of the present invention, through the processing of encrypted digital assets in the time dimension, which not only can use smart contracts or hash locking to realize the automated transfer of encrypted digital assets in the future, and the transferred encrypted digital asset before the set time, also can transfer and transaction; meanwhile, since the segmentation object is based on the assets currently held by the user, therefore the deterministic payment of future value rights also can be ensured, has a wider range of applications.
SYSTEM AND METHOD FOR LICENSE MANAGEMENT OF VIRTUAL APPLIANCES IN A COMPUTING SYSTEM
System and computer-implemented method for license management of virtual appliances in a computing system uses an activated virtual appliance in the computing system to forward an activation license from a license server on behalf of an unactivated virtual appliance in the computing system.
APPARATUS SETUP SYSTEM, APPARATUS SETUP METHOD, AND ELECTRONIC APPARATUS
An apparatus setup system includes: a first electronic apparatus; and a second electronic apparatus, the first electronic apparatus including a first controller module configured to generate a package file where an export instruction is input, the export instruction instructing to export an application, the package file at least including the application identifier and an electronic apparatus identifier of one different electronic apparatus, the second electronic apparatus including a second controller module configured to where the package file is input, check the electronic apparatus identifier included in the input package file against the electronic apparatus identifier stored in the second storage device, and where it is determined that the electronic apparatus identifier included in the input package file matches the electronic apparatus identifier stored in the second storage device, activate the application identified by the application identifier included in the package file.
SYSTEM AND METHOD FOR IMPLEMENTING TRANSFER AND ACCESS RESTRICTIONS ON ELECTRONIC DIGITAL RESOURCES
A system is provided for implementing transfer and access restrictions on electronic digital resources. In particular, the system may generate a digital resource on a distributed electronic data register using a custom set of executable code. Using the custom set of code, the generated digital resource may in some embodiments be an access restricted resource that may be controlled by one or more access and/or transfer restrictions. Accordingly, the system may require a user to provide valid authentication credentials in order to access and/or transfer the digital resource. In this way, the system may prevent the misuse of digital resource stored within the network environment.
Systems and methods to provide sharing of benefits amongst a group of users based on gains from distribution rights pertaining to digital assets
Systems and methods to provide sharing of benefits amongst a group of users are disclosed. Exemplary implementations may: effectuate a presentation of an agreement interface for the users to define and/or join group agreements; generate, based on the group agreements, sets of instructions for implementation of the group agreements; transmit the sets of instructions to a decentralized ledger server; receive and executing the transmitted sets of instructions to record the group agreements on the blockchain as smart contracts; record transactions pertaining to the digital assets; responsive to recording the transactions, increase the group account balances by a portion of the earned gains resultant from the recorded transactions; and responsive to an occurrence of at least one of the trigger events specified for the first group agreement, allocate a portion of the group account balance to the group of users.
ASSET-CLASS BACKED TOKENIZATION PLATFORM
Systems, methods and apparatus relating to asset-class based tokens are described. An example apparatus may include a tokenization controller to implement a tokenization user interface where the tokenization controller includes a token definition circuit to interpret a token description in response to user operations. The example apparatus may further include an asset definition circuit to interpret an asset-class description in response to user operations and an asset backing circuit to interpret a token link description including a token performance representation corresponding to a beneficial characteristic of at least one asset of the asset-class description, and to generate at least one asset-class linked token in response to the token link description and the asset-class description. The example apparatus may further include a token deployment circuit to expose the at least one asset-class linked token to a token marketplace system.
Method for performing segmenting locking and merging control of encrypted digital assets based on time dimension
A method for performing segmenting locking and merging control of encrypted digital assets based on time dimension is provided. The method being mainly provided to achieve segmenting locking and merging control of encrypted digital assets by adding a time attribute to encrypted digital asset. Using the method for performing segmenting locking and merging control of encrypted digital assets based on time dimension of the present invention, through the processing of encrypted digital assets in the time dimension, which not only can use smart contracts or hash locking to realize the automated transfer of encrypted digital assets in the future, and the transferred encrypted digital asset before the set time, also can transfer and transaction; meanwhile, since the segmentation object is based on the assets currently held by the user, therefore the deterministic payment of future value rights also can be ensured, has a wider range of applications.
Key identifier derivation and management systems and methods
This disclosure relates to, among other things, systems and methods for deriving key identifiers and managing mapping between keys and key identifiers. Consistent with embodiments disclosed herein, the disclosed systems and methods may provide a mechanism that allows multiple parties to reconstruct unique identifiers given a set of known inputs that may be used to look up, identify, and/or otherwise access services and/or data objects. In some embodiments, this may allow for a service provider and a rights management service to independently derive key identification information based on information that both entities share (e.g., a content document such as a Content Protection Information Exchange Format document), thereby reducing requirements to maintain such mappings.
SECURE WORKFLOWS FOR GENERATING AND APPLYING DIGITAL COMPONENT DISTRIBUTION DIRECTIVES
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for securely executing customized computing workflows for selecting digital components are described. In one aspect, a method includes receiving a request for a digital component for presentation by a client device. In response to receiving the request, a pool of candidate digital components is retrieved from a repository of digital components, and each stage of a multi-stage workflow for selecting a digital component from the pool of digital components is executed in a sequence defined by the multi-stage workflow, including a filtering stage, a selection stage, and a rendering stage. After the rendering stage has been executed, a selected and packaged digital component is transmitted for receipt by the client device.
SYSTEMS AND METHODS FOR PHYSICAL ASSET VERIFICATION
In one aspect, a system for physical asset verification is presented. The system includes a computing device configured to receive asset data of a physical asset. The asset data includes a unique object identifier. The computing device is configured to generate a digital twin database based on the asset data. The digital twin database includes a digital twin of the physical asset. The digital twin is stored in an immutable sequential listing. The computing device is configured to receive an asset transfer code at a transfer point of the physical asset. The computing device is configured to authenticate, at the transfer point, the physical asset based on the unique object identifier and the asset transfer code. The computing device is configured to assign an ownership of the digital twin to a user at the transfer point based on the authentication.