G06Q20/223

Computer systems and software for self-executing code and distributed database
11568495 · 2023-01-31 ·

A computer-implemented method includes creating a premiums escrow, with a zero balance, for a group of policyholders and managed using a distributed ledger and self-executing agreement. At a term beginning, the self-executing agreement receives premium payments using cryptocurrency from each policyholder and allocates the premium payments to the premiums escrow. During the term the self-executing agreement receives a notification of an incident claim associated with a claimant policyholder. At a term end, the self-executing agreement receives payment instructions from the policyholders; pays, using cryptocurrency from the premiums escrow, the claimant an incident claim payment larger than the premium payment and determined according to the payment instructions; and distributes to the policyholders a rebate payment equal to or lower than the premium payment from the premiums escrow, which returns to a zero balance. The self-executing agreement stores a record of the incident claim in a tamper-proof, publicly-available, non-repudiable distributed ledger.

Method for issuing and transacting non-fungible tokens based on time-context data to be used for supporting transactions of historical time slots, and server using the same
11568394 · 2023-01-31 · ·

A method for issuing non-fungible tokens based on time-context data to be used for supporting transactions of historical time slots includes steps of: (a) an NFT platform server, in response to acquiring a specific intention, determining whether at least one specific issuance condition for at least one specific token corresponding to at least one specific historical time slot is satisfied; and (b) the NFT platform server, in response to determining that the specific issuance condition is satisfied, transmitting a specific transaction indicating that an issuance of the specific token is valid to at least part of nodes included in the blockchain network, to thereby update the nodes in the blockchain network and thus enable the issuance of the specific token corresponding to the specific historical time slot.

Blockchain generation apparatus, blockchain verification apparatus, and program

The blockchain generation apparatus 1 includes: a parameter calculator 122 that identifies a parameter type to be used for linkage of the new block, based on block approval method data 114, and calculates a value for the identified parameter type based on transaction datasets which are related to an identifier of a generating party; a block generation condition checker 125 that determines whether the generating party is qualified to generate the new blockchain data, based on the value calculated by the parameter calculator 122; and a blockchain generator 126 that tries to generate the new blockchain by referring to the shared data when the block generation condition checker 125 determines that the generating party is qualified. An identifier of the blend pattern included in the block approval method data 114 specifies a combination of the plurality of parameter types that conflict with each other.

Systems and methods for linking physical items to virtual content
11565184 · 2023-01-31 · ·

Systems and methods for linking physical items to virtual content. Exemplary implementations may: receive a first request to verify whether a first activation of a first item has occurred; if not, transmit a notification in reply to the first request; receive, from a first user, a second request to effectuate the first activation of the first item and to make particular virtual content accessible to the first user; modify state of a smart contract on a decentralized database such that subsequent requests confirm the first activation has occurred; establish a link between the first item and the first user such that the particular virtual content is accessible to the first user; and responsive to the particular virtual content being accessible to the first user, transmit a second notification in reply to the second request.

WEB WALLET
20230025320 · 2023-01-26 ·

A digital identity wallet system includes a web wallet and Identity Cloud. The web wallet leverages browser APIs, platform authenticators, and secure device hardware to create, store, and use cryptographic keys. The Identity Cloud stores data encrypted on a per-user basis, so only a specific user can decrypt it, using the web wallet in a particular web browser, on a particular device. The web wallet, in conjunction with the browser and device, leverages cryptographic keys to perform all cryptographic operations locally. This allows the Identity Cloud to only handle sensitive data that's already been encrypted on a per-user basis before it receives it.

Processing a mobile payload

In one embodiment, a method includes receiving, by a payment server and from a messaging application executing on a first mobile device operated by a first user, a request to initiate a payment transaction using a payment application. The request includes a payment amount and an identifier associated with the first user. The method includes facilitating a first adjustment to a balance associated with the financial account of the first user in the data store identified based on the identifier. The method includes generating a link associated with the first adjustment and transmitting the link to the first mobile device. The method includes, upon receiving from a second user operating a messaging application, an indication that the second user has interacted with the link within the messaging application, facilitating a second adjustment of a balance of a financial account of the second user according to the payment amount.

Blockchain-based data verification method, apparatus, and electronic device
11562375 · 2023-01-24 · ·

The present application provides blockchain-based anti-counterfeiting methods, apparatuses, and systems. One method includes: obtaining an anti-counterfeiting verification request submitted by a user for a product; initiating anti-counterfeiting verification of the product in response to the anti-counterfeiting verification request, wherein the anti-counterfeiting verification comprises integrity verification of anti-counterfeiting information generated by a plurality of anti-counterfeiting participants on a blockchain, wherein the anti-counterfeiting information comprises a plurality of types of anti-counterfeiting identification information corresponding to the product; and returning an anti-counterfeiting verification result for the product to the user.

METHODS AND APPARATUS FOR DLT-ENABLED DIGITIZED TOKENS FOR BASELINE ENERGY USAGE

Disclosed embodiments include methods and computer-implemented distributed ledger technology (“DLT”) systems based at least in part upon electricity usage. Disclosed embodiments include instructions to cause at least one server device and related data processing and storage apparatus to operate over a peer-to-peer network to provide a system having an electricity tracker module that records a transaction comprising an amount of electricity incoming from a power grid and an amount of energy savings from energy savings equipment, along with the environmental and other attributes of such energy, wherein the transaction includes identifying data and the electricity tracker module functions as a node on a DLT network, and wherein the DLT network comprises a plurality of nodes that execute a software verification algorithm that includes a cryptographic hash value based at least in part upon transaction identifying data. Disclosed embodiments also include a predictive analytics module to compare the incoming electricity usage against the amount of energy savings from the energy savings equipment, a timer module to monitor the electricity tracker module through a defined term, and an invoice module for generating an invoice for the energy saved through the defined term.

Risk mitigation for a cryptoasset custodial system using data points from multiple mobile devices

Methods, systems, and apparatus for risk mitigation for a cryptoasset custodial system include transmitting an endorsement request for a cryptoasset transaction to a user device configured to cause the user device to prompt a user to endorse the cryptoasset transaction. Multiple data points are collected from mobile devices associated with the user. The data points indicate an identity of the user. A cryptographic endorsement of the cryptoasset transaction is received from the user device. A graphical visualization including a risk metric is generated based on the data points. The risk metric indicates a risk of accepting the cryptographic endorsement from the user device. Generating the graphical visualization includes determining whether the plurality of data points matches expected values.

Data storage and management and methods of thereof

Described herein are various methods of sharing data across multiple computers. The method of sharing data permits the pruning of data from the shared data.