Patent classifications
G06Q2220/12
SYSTEMS AND METHODS FOR FORWARD MARKET PRICE PREDICTION AND SALE OF ENERGY STORAGE CAPACITY
Systems and methods for forward market renewable energy credit prediction from business entity behavior data are disclosed. An example transaction-enabling system may include a forward market circuit to access a forward energy credit market and a market forecasting circuit to automatically generate a forecast for a forward market price of an energy credit in the forward energy credit market. The example system may include wherein the forecast is based at least in part on a business entity behavior collected from at least one business entity behavioral data source, and wherein the energy credit comprises a renewable energy credit associated a renewable energy system. The example system may further include a smart contract circuit to perform at least one of selling the renewable energy credit or purchasing the renewable energy credit on the forward energy credit market in response to the forecasted forward market price.
SYSTEMS AND METHODS FOR TRANSACTIONS RELATED TO ATTENTION-RELATED RESOURCES
Transaction-enabling systems and methods are disclosed. A system may include a controller with an attention market access circuit to interpret a plurality of attention-related resources available on an attention market and an intelligent agent circuit to determine an attention-related resource acquisition value based on a cost parameter of at least one of the plurality of attention-related resources. An attention acquisition circuit may then solicit an attention-related resource in response to the attention-related resource acquisition value
Aggregation of encrypted data
In some embodiments, an encryption system secures data using a homomorphic encryption. The encryption system encrypts a number by encrypting a number identifier of the number and combining the number and the encrypted number identifier using a mathematical operation to generate an encrypted number. The encrypted numbers may be stored at a server system along with their number identifiers. The server system can then generate an aggregation (e.g., sum) of the encrypted numbers and provide the aggregation, the encrypted numbers, and the number identifiers. The encryption system can then separate the aggregation of the numbers from the aggregation of the encrypted numbers using an inverse of the mathematical operation used in the encryption to effect removal of an aggregation of the encrypted number identifiers of the numbers from the aggregation of the encrypted numbers. The separated aggregation of the numbers is an aggregation of the plurality of the numbers.
System and method for authorized digital content distribution
A digital content distribution system uses a Digital Rights Management Controller that performs a set of arbitrary tests against the transfer request from one user to another such as user A to user B. Assuming these tests are successful, the DRM sends an encryption key to transferring user A. This encryption key E is taken from a table of encryption key/hash pairs which have been provided to the DRM Controller by an external authority such as the content rights holder. User A encrypts the content using they key provided by the DRM controller and then optionally calculates a hash over the encrypted form of the content E(X) and returns this value to the DRM Controller. On checking the returned hash against the hash from the table the DRM controller knows that user A does indeed have the digital content X in good condition. The DRM Controller then instructs both users A and B that the transfer may proceed. The encrypted form of the content E(X) is transferred from A to B. Once the content transfer has completed B ensures that the received content has been physically written to non-volatile storage (to account for crashes etc. during the next step). B then calculates a hash over the received content and returns this value to the DRM Controller. If this value matches the value previously given then the transfer has been successful and the DRM Controller updates whatever central records are appropriate, while also returning a decrypt key to B to allow it to decrypt the content.
System and method for authenticating the legitimacy of a request for a resource by a user
A method of authenticating the legitimacy of a request for a resource from a resource provider by a user, including providing an authentication process in which a resource provider message is received and de-assembled, the integrity of the user request message is confirmed, a result indicator as to the legitimacy of the resource provider message is created by performing two or more authenticity checks, and an authentication result is sent.
System and method for authorized digital content distribution
A digital content distribution system uses a Digital Rights Management Controller that performs a set of arbitrary tests against the transfer request from one user to another such as user A to user B. Assuming these tests are successful, the DRM sends an encryption key to transferring user A. This encryption key E is taken from a table of encryption key/hash pairs which have been provided to the DRM Controller by an external authority such as the content rights holder. User A encrypts the content using they key provided by the DRM controller and then optionally calculates a hash over the encrypted form of the content E(X) and returns this value to the DRM Controller. On checking the returned hash against the hash from the table the DRM controller knows that user A does indeed have the digital content X in good condition. The DRM Controller then instructs both users A and B that the transfer may proceed. The encrypted form of the content E(X) is transferred from A to B. Once the content transfer has completed B ensures that the received content has been physically written to non-volatile storage (to account for crashes etc. during the next step). B then calculates a hash over the received content and returns this value to the DRM Controller. If this value matches the value previously given then the transfer has been successful and the DRM Controller updates whatever central records are appropriate, while also returning a decrypt key to B to allow it to decrypt the content.
SYSTEM AND METHOD FOR A FAIR MARKETPLACE FOR TIME-SENSITIVE AND LOCATION-BASED DATA
Disclosed is a system and several associated methods providing a decentralized fair data marketplace wherein said system keeps time-sensitive (real-time) and location-based data. The system includes a decentralized blockchain for recording participants' registrations, storing transactions such as data production, and sell/buy activities, and ensuring authenticity and privacy of transferred data. Data is gathered through crowdsourcing (data pooling) and data generators are rewarded for willingly contributing datapoints using a dynamic pricing engine designed specifically for time-sensitive location-based datapoints. The set of novelties put together in this invention aims at stimulating a fair and participative data economy where individual contributions, valuation and reward sharing processes are conducted transparently, securely and in a tamperproof manner through use of blockchain, leading to an incentivized and quality data curation.
MANAGING CLOUD RESOURCE CONSUMPTION USING DISTRIBUTED LEDGERS
Systems and methods of the disclosure include: identifying, by a cloud resource management system, a cloud resource consumption model associated with one or more cloud resources; generating, by the cloud resource management system, a sequence of instructions implementing a smart contract based on the cloud resource consumption model; sending, to a distributed ledger network, the smart contract; receiving, by the cloud resource management system, cloud resource usage data associated with the one or more cloud resources; and causing, by transmitting a message reflecting the cloud resource usage data to the distributed ledger, the smart contract to be executed.
Secure tokens for controlling access to a resource in a resource distribution network
A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a time-based token based on a time duration specified for a meter. The time-based token indicates the time duration for the meter. The time-based token is further generated based on an identifier of the meter. The headend system transmits the time-based token to the meter via at least a mesh network. After receiving the time-based token, the meter validates the time-based token to determine that the time-based token is generated for the meter based on information related to the identifier of the meter. If the meter determines that the time-based token is valid, the meter connects premises associated with the meter to a resource distribution network for at least the time duration specified in the time-based token.
COLLABORATIVE NON-FUNGIBLE TOKEN ADVERTISING SYSTEM FOR TARGETED INFLUENCE ON SOCIAL NETWORK AND METHOD THEREOF
The Collaborative Non-Fungible Token Advertising System (100) for Targeted Influence on Social Network introduces a novel approach where brands collaborate with influencers (102) to co-create NFTs featuring brand-related contents (103). The NFTs are strategically displayed to influencer networks (104), leveraging credibility and engagement for effective advertising. Through secure blockchain technology (107) and interactive interfaces, the system (100) optimizes revenue generation (105) and revenue sharing (106), user interaction, and authenticity, thereby revolutionizing advertising dynamics within social networks.