Patent classifications
G06Q20/3827
TRACING FLOW OF TAGGED FUNDS ON A BLOCKCHAIN
A system for “tagging” funds identified on a blockchain and associating a weight value therewith. The tagging profile is developed into a propagation profile wherein weight values are inherited from the tagging profile s. Propagation profile funds may be diluted by combining with non-tagged funds, similar to how ink dilutes through water. A spending history of funds of interest is developed based on replaying the funds of interest against the global transaction history of the blockchain. It is determined whether the spending history intersects with the propagation profile, thus determining how closely the two sources of funds are economically to one another. Intersection triggers actions including alert notifications or transfer of funds on the blockchain.
GENERATION AND IMPLEMENTATION OF 3D GRAPHIC OBJECT ON SOCIAL MEDIA PAGES
Disclosed herein is digital object generator that builds unique digital objects based on the user specific input. The unique digital objects are part of a graphic presentation to users. The user specific input is positioned on pre-configured regions of a 3D object such as a polygon. Examples of the pre-configured regions include faces of the 3D object, orbits around the 3D object, or identifiable regions associated with the 3D object. The 3D object is rendered as a part of a social media page and enables social interactions between users. In the social media page, the 3D object rotates displaying regions/faces to page visitors. In some embodiments, the 3D object is implemented as a pet or companion of a user avatar in a virtual, augmented, or extended reality space.
SYSTEM AND TECHNIQUES FOR UTILIZING A SMART CONTRACTS LIBRARY
Disclosed are techniques and an apparatus for accessing a smart contract library that may include a number of templates of different legal contracts implementable as a smart contract between respective parties. Each template may include a number of sections having different contractual terms and conditions and fillable fields for specific contract terms. Each respective section of the number of sections includes programming code operable to enforce conformance with specific section-related contractual terms and conditions of the respective section and with any specific contract terms input to a fillable field of the respective section. A first user address generated based on cryptographic keys may be associated with a contract-creating computing device in a private blockchain. The first user address may be associated with the first user in the private blockchain. A finalized smart contract may have a smart contract address generated from the first user address and a nonce value.
CONTROL METHOD, CONTROL DEVICE, AND RECORDING MEDIUM
A control method is executed by a first node holding a first distributed ledger in which a first blockchain is managed, and includes: obtaining, from a second node, a second blockchain managed by a second distributed ledger held by the second node, and comparing the second blockchain with the first blockchain; updating the first blockchain by adding the greater of at least one first different block contained in the first blockchain but not the second blockchain and at least one second different block contained in the second blockchain but not the first blockchain, after at least one common block, and adding at least one additional block containing at least one instance of transaction data contained in the lesser; and determining whether at least two instances of transaction data each containing at least two instances of contract information that conflict with each other are contained in the updated first blockchain.
Quantumproof blockchain
Bitcoins and the underlying blockchain technology are one of the main innovations in building decentralized applications. The effects of quantum computing on this technology are analyzed in general. Provided herein are effective solutions to address security vulnerabilities in a blockchain-based system that can be exploited by a quantum attacker.
Method for high-performance traceability query oriented to multi-chain data association
The present invention relates a method for high-performance traceability query oriented to multi-chain data association, comprising: identifying a target transaction needing the traceability query; searching out all corresponding target chains based on cross-chain transaction data association; making query requests parallelly; and executing the query among the target chains according to a key value of the target transaction and returning query results. The blockchain traceability query method proposed by the present invention is different from serialized block data query conducted in the chain-type structure, and the disclosed cross-chain query operation can be parallelly executed, leading to improved efficiency of traceability query. Opposite to the conventional blockchain where blocks are used as nodes of chains, the present invention directly uses sub blockchains as nodes of the SRB. Since sub blockchains can be dynamically added or removed, the present invention enhances the scalability of the entire system.
Computer systems and software for self-executing code and distributed database
A computer-implemented method includes creating a premiums escrow, with a zero balance, for a group of policyholders and managed using a distributed ledger and self-executing agreement. At a term beginning, the self-executing agreement receives premium payments using cryptocurrency from each policyholder and allocates the premium payments to the premiums escrow. During the term the self-executing agreement receives a notification of an incident claim associated with a claimant policyholder. At a term end, the self-executing agreement receives payment instructions from the policyholders; pays, using cryptocurrency from the premiums escrow, the claimant an incident claim payment larger than the premium payment and determined according to the payment instructions; and distributes to the policyholders a rebate payment equal to or lower than the premium payment from the premiums escrow, which returns to a zero balance. The self-executing agreement stores a record of the incident claim in a tamper-proof, publicly-available, non-repudiable distributed ledger.
Method for issuing and transacting non-fungible tokens based on time-context data to be used for supporting transactions of historical time slots, and server using the same
A method for issuing non-fungible tokens based on time-context data to be used for supporting transactions of historical time slots includes steps of: (a) an NFT platform server, in response to acquiring a specific intention, determining whether at least one specific issuance condition for at least one specific token corresponding to at least one specific historical time slot is satisfied; and (b) the NFT platform server, in response to determining that the specific issuance condition is satisfied, transmitting a specific transaction indicating that an issuance of the specific token is valid to at least part of nodes included in the blockchain network, to thereby update the nodes in the blockchain network and thus enable the issuance of the specific token corresponding to the specific historical time slot.
SYSTEM AND METHOD FOR DEVICE MANAGEMENT OF INFORMATION HANDLING SYSTEMS USING CRYPTOGRAPHIC BLOCKCHAIN TECHNOLOGY
According to one embodiment, a computing environment having multiple Information Handling Systems (IHSs), each having one or more field replaceable units (FRUs) and a ledger of a blockchain. Each IHS includes computer-executable instructions to receive a signal indicating that one of the FRUs has been removed, obtain unique identifying information about the removed FRU, and generate a new block to the blockchain indicating that the one FRU has been removed from the IHS. Additionally, the instructions may receive a signal indicating that another FRU has been added, obtain unique identifying information about the added FRU, and generate a new block to the blockchain indicating that the one FRU has been added to the IHS.
SYSTEMS AND METHODS FOR PRIVACY PRESERVING FRAUD DETECTION DURING ELECTRONIC TRANSACTIONS
A method and apparatus for performing privacy preserving fraud detection in network based transactions are described. The method may include receiving a fraud detection message during a transaction between a user system and a merchant system, the message having a set of cryptographically transformed universal resource locator (URL) components generated from a URL of a web page of the merchant system on which the transaction is to occur. The method may also include generating one or more secure and anonymous fraud detection features, each fraud detection feature comprising a select subset of the cryptographically transformed URL components. The method may also include performing fraud detection for the web page using the one or more secure and anonymous fraud detection features to determine a likelihood that fraud is occurring in the transaction.