G06Q20/3827

UPDATING A SECURE TOKEN OF A CONTINGENT ASSET
20230026112 · 2023-01-26 · ·

A method executed by a computing entity includes obtaining, in accordance with a securely passing process, control over a secure first token representing a first pending transaction associated with a transaction item. The method further includes obtaining a selection of a first subset of instant assets of a set of candidate instant assets that may be utilized to subsequently provide conversion of the selected contingent asset to complete the first pending transaction. The method further includes generating an updated secure first token in accordance with the securely passing process to represent the selection of the first subset of instant assets of the set of candidate instant assets to subsequently provide the conversion of the selected contingent asset to complete the first pending transaction.

AGREEMENTS ON THE BLOCKCHAIN
20230230076 · 2023-07-20 ·

A computer-implemented method of recording an agreement between a requesting party and a confirming party on a blockchain, wherein the method is performed by the requesting party and comprises: generating a request transaction, wherein the request transaction comprises an input signed by the requesting party, and at least a first output comprising a cryptographic puzzle based on a first data item known to both the requesting and confirming parties, wherein the first data item represents the agreement; and causing the request transaction to be transmitted to one or more blockchain nodes.

WEB WALLET
20230025320 · 2023-01-26 ·

A digital identity wallet system includes a web wallet and Identity Cloud. The web wallet leverages browser APIs, platform authenticators, and secure device hardware to create, store, and use cryptographic keys. The Identity Cloud stores data encrypted on a per-user basis, so only a specific user can decrypt it, using the web wallet in a particular web browser, on a particular device. The web wallet, in conjunction with the browser and device, leverages cryptographic keys to perform all cryptographic operations locally. This allows the Identity Cloud to only handle sensitive data that's already been encrypted on a per-user basis before it receives it.

Method and system for gross settlement by use of an opaque blockchain

A method for confirmation of an electronic transaction using a blockchain includes: receiving transaction data, the transaction data including a transaction amount and currency code; generating a transaction message formatted based on one or more standards including a first data element configured to store the transaction amount, a second data element configured to store the currency code, and a third data element configured to store an invoice identifier; transmitting the transaction message to a financial institution via a payment network; receiving a return message from the financial institution via the payment network formatted based on the one or more standards and including a data element configured to store the transaction amount, currency code, and invoice identifier; and generating a hash value based on application of hashing algorithms to the transaction amount, currency code, and invoice identifier stored in the data element included in the received return message.

METHODS AND APPARATUS FOR DLT-ENABLED DIGITIZED TOKENS FOR BASELINE ENERGY USAGE

Disclosed embodiments include methods and computer-implemented distributed ledger technology (“DLT”) systems based at least in part upon electricity usage. Disclosed embodiments include instructions to cause at least one server device and related data processing and storage apparatus to operate over a peer-to-peer network to provide a system having an electricity tracker module that records a transaction comprising an amount of electricity incoming from a power grid and an amount of energy savings from energy savings equipment, along with the environmental and other attributes of such energy, wherein the transaction includes identifying data and the electricity tracker module functions as a node on a DLT network, and wherein the DLT network comprises a plurality of nodes that execute a software verification algorithm that includes a cryptographic hash value based at least in part upon transaction identifying data. Disclosed embodiments also include a predictive analytics module to compare the incoming electricity usage against the amount of energy savings from the energy savings equipment, a timer module to monitor the electricity tracker module through a defined term, and an invoice module for generating an invoice for the energy saved through the defined term.

Risk mitigation for a cryptoasset custodial system using data points from multiple mobile devices

Methods, systems, and apparatus for risk mitigation for a cryptoasset custodial system include transmitting an endorsement request for a cryptoasset transaction to a user device configured to cause the user device to prompt a user to endorse the cryptoasset transaction. Multiple data points are collected from mobile devices associated with the user. The data points indicate an identity of the user. A cryptographic endorsement of the cryptoasset transaction is received from the user device. A graphical visualization including a risk metric is generated based on the data points. The risk metric indicates a risk of accepting the cryptographic endorsement from the user device. Generating the graphical visualization includes determining whether the plurality of data points matches expected values.

Security authentication system for membership login of online website and method thereof
11706031 · 2023-07-18 · ·

A security authentication system for a website provides a safe login without having to directly enter an ID and a password on a user device requesting login to the website. A first user device receives one-time use authentication information from a second user device after the second user device received the one-time use authentication information from an authentication server without the authentication server receiving user login authentication information from the second user device. A request is transmitted to the authentication server based on the one-time use authentication information and the user login authentication information. In response to the request, one-time password (OTP) information is received from the authentication server. The OTP information is presented by the first user device, such that the OTP information can be entered into the second user device and used in a request to log in to the website.

Data storage and management and methods of thereof

Described herein are various methods of sharing data across multiple computers. The method of sharing data permits the pruning of data from the shared data.

Methods and systems for generating, subscribing to and processing action plans using a blockchain
11563571 · 2023-01-24 ·

A method and system and computer program product for subscribing to action plans including a processing device for receiving an action plan transaction message having one or more data fields from an analyst node in a blockchain network and generating an action plan transaction in a blockchain including the one or more data fields of the action plan transaction message and a newly generated plan identification. The processing device may transmit an action plan notice to the blockchain network alerting the nodes of the blockchain network of the action plan transaction. The processing device may receive one or more client bids for the action plan transaction, determine a winning client bid of the one or more client bids, generate a winning bid transaction in the blockchain and transmit a winning bid notification to the client node of the winning client bid.

OFFLINE COIN PROTOCOL
20230230071 · 2023-07-20 ·

Methods, apparatus and systems for verifying coin ownership are disclosed. In an embodiment, a coin service provider identifies an online session initiated by a wallet application and a next coin to verify, receives information associated with the next coin from a wallet application, determines that ownership of the next coin was transferred out of the wallet application since the last time coins in the wallet application were verified and that ownership of the next coin has not been updated in a coin data store. The coin service provider then transmits a prompt to the user device for the user to confirm that a transaction involving the next coin completed successfully, receives a confirmation message from the user device, confirms that the next coin was received by a recipient, and next updates ownership information of the next coin in the coin data store.