G06Q20/389

SYSTEMS AND METHODS FOR A SEARCH ENGINE OF BUYERS IN A BLOCKCHAIN
20230237549 · 2023-07-27 ·

An example apparatus includes an account information circuit structured to interpret identifying information for a seller blockchain account and for each one of at least one buyer blockchain account, the identifying information for each one of the at least one buyer blockchain account including an attribute interest value. An apparatus further includes an asset attribute circuit structured to interpret an asset attribute value for an asset associated with the seller blockchain account. An apparatus further includes a buyer interest circuit structured to determine a buyer interest value for each one of the at least one buyer blockchain account in response to each corresponding attribute interest value and the asset attribute value. An apparatus includes a buyer identification execution circuit structured to perform a buyer identification operation in response to the buyer interest value.

Computer systems and software for self-executing code and distributed database
11568495 · 2023-01-31 ·

A computer-implemented method includes creating a premiums escrow, with a zero balance, for a group of policyholders and managed using a distributed ledger and self-executing agreement. At a term beginning, the self-executing agreement receives premium payments using cryptocurrency from each policyholder and allocates the premium payments to the premiums escrow. During the term the self-executing agreement receives a notification of an incident claim associated with a claimant policyholder. At a term end, the self-executing agreement receives payment instructions from the policyholders; pays, using cryptocurrency from the premiums escrow, the claimant an incident claim payment larger than the premium payment and determined according to the payment instructions; and distributes to the policyholders a rebate payment equal to or lower than the premium payment from the premiums escrow, which returns to a zero balance. The self-executing agreement stores a record of the incident claim in a tamper-proof, publicly-available, non-repudiable distributed ledger.

Method for issuing and transacting non-fungible tokens based on time-context data to be used for supporting transactions of historical time slots, and server using the same
11568394 · 2023-01-31 · ·

A method for issuing non-fungible tokens based on time-context data to be used for supporting transactions of historical time slots includes steps of: (a) an NFT platform server, in response to acquiring a specific intention, determining whether at least one specific issuance condition for at least one specific token corresponding to at least one specific historical time slot is satisfied; and (b) the NFT platform server, in response to determining that the specific issuance condition is satisfied, transmitting a specific transaction indicating that an issuance of the specific token is valid to at least part of nodes included in the blockchain network, to thereby update the nodes in the blockchain network and thus enable the issuance of the specific token corresponding to the specific historical time slot.

Voice Payment Method and Electronic Device
20230021413 · 2023-01-26 ·

A voice payment method and an electronic device are provided. The method includes: A first electronic device receives voice information of a user, where the voice information is used to indicate a payment operation performed by the user; when a voiceprint feature of the voice information meets a preset condition, the first electronic device requests a second electronic device to authenticate the user; the second electronic device prompts the user to perform an authentication process, where the authentication process includes one or more of fingerprint authentication, facial recognition, password authentication, verification code authentication, and near field communication NFC authentication; when authentication performed by the second electronic device on the user succeeds, the second electronic device indicates to the first electronic device that authentication performed by the second electronic device on the user succeeds; and the first electronic device completes the payment operation with a payment platform.

UTILITIES LINKED TO DIGITAL NON-FUNGIBLE ASSETS

A technique for linking utilities with non-fungible tokens (NFTs) is disclosed. The utilities are not necessarily physical assets. For example, the utilities can be services or functions that depend on who and when the NFT is owned. The utilities can be enabled on or through a device or computer system. The utilities can have levels or be of different types and vary by time. For example, a utility can change, aggregate, or expire over time.

SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA FOR MANAGING NON-FUNGIBLE TOKEN
20230237471 · 2023-07-27 ·

A networked computer system for storing promotional awards associated with non-fungible tokens (NFTs) is described herein. The networked computer system includes a master engagement record blockchain system including a plurality of master engagement records associated with NFTs, an engagement computer server system, and a plurality of kiosk terminals. A kiosk processor is programmed to capture a dynamic NFT verification (DNV) displayed on a user's mobile device via a kiosk camera and display the plurality of engagement activities via the display touchscreen. The processor of the engagement computer server system performs algorithm steps including determining a promotional award associated with the user selected engagement activity upon receiving the engagement activity completion message from the kiosk processor, and recording a master engagement record to the master engagement record blockchain system associating the determined promotional award with the user owned NFT.

DIGITAL NON-FUNGIBLE ASSETS IN PERSISTENT VIRTUAL ENVIRONMENTS LINKED TO REAL ASSETS

The technology relates to linking virtual assets and physical assets through non-fungible tokens (NFTs) in a metaverse. As such, the invention anchors a metaverse to the real world. The metaverse can limit ownership or rendering of certain virtual assets in the metaverse to only those who actually own physical assets. For example, the metaverse can limit a virtual representation of a car in the metaverse to those who own the real car. The linkage between the virtual and real assets can be verified in the metaverse based on NFTs stored on a blockchain. As such, only those who actually own a physical asset in the real world are associated with the virtual asset (or related representation) in the metaverse.

Unsupervised machine learning system to automate functions on a graph structure

Machine learning models, semantic networks, adaptive systems, artificial neural networks, convolutional neural networks, and other forms of knowledge processing systems are disclosed. An ensemble machine learning system is coupled to a graph module storing a graph structure, wherein a collection of entities and the relationships between those entities forms nodes and connection arcs between the various nodes. A hotfile module and hotfile propagation engine coordinate with the graph module or may be subsumed within the graph module, and implement the various hot file functionality generated by the machine learning systems.

Machine learning telecommunication network service fraud detection

A processing system may obtain a customer identifier at a first retail location of a telecommunication network service provider, determine a recency factor of the identifier, obtain an identification of items of interest to the customer, and determine whether the customer has visited a second retail location of the provider within a time period prior to the customer being at the first retail location. The processing system may then apply, to a fraud detection machine learning model, a plurality of factors comprising: a quantity of items of interest, a value of the items, a factor associated with whether the customer has visited the second retail location within the time period, and the recency factor, where the fraud detection machine learning model outputs a fraud indicator value, determine that the fraud indicator value meets a warning threshold and present a warning to a device at the first retail location.

UPDATING A SECURE TOKEN OF A CONTINGENT ASSET
20230026112 · 2023-01-26 · ·

A method executed by a computing entity includes obtaining, in accordance with a securely passing process, control over a secure first token representing a first pending transaction associated with a transaction item. The method further includes obtaining a selection of a first subset of instant assets of a set of candidate instant assets that may be utilized to subsequently provide conversion of the selected contingent asset to complete the first pending transaction. The method further includes generating an updated secure first token in accordance with the securely passing process to represent the selection of the first subset of instant assets of the set of candidate instant assets to subsequently provide the conversion of the selected contingent asset to complete the first pending transaction.