G06Q20/3678

Methods and systems for tracking and recovering assets stolen on distributed ledger-based networks
11502838 · 2022-11-15 ·

The instant disclosure illustrates how the privacy and security of activities occurring on distributed ledger-based networks (DLNs) can be enhanced with the use of zero-knowledge proofs (ZKPs) that can be used to verify the validity of at least some aspects of the activities without private information related to the activities necessarily being revealed publicly. Methods and systems that are directed at facilitating the tracking and recovery of assets stolen on ZKP-enabled DLNs while preserving the confidentiality of the tokens are presented herein.

Cryptoasset custodial system using encrypted and distributed client keys

A hardware security module (HSM) generates a client key for an account holder of a cryptoasset custodial system. The HSM encrypts the client key to generate an encrypted client key using a hardware-based cryptographic key within a secure storage device. The encrypted client key is transmitted to client devices. The HSM deletes the encrypted client key from the secure storage device. Each client device stores the encrypted client key in an offline secure enclave. A request to authorize a cryptoasset transaction is received. The HSM determines that signed messages endorsing the cryptoasset transaction have been received from at least some client devices in satisfaction of a quorum. The encrypted client key is received from at least one client device. The HSM decrypts the encrypted client key. The HSM signs an approval message for the cryptoasset transaction using a cryptoasset key based at least in part on the client key.

CRYPTOCURRENCY SYSTEM HAVING INTEGRATED ELECTRONIC DELIVERY FEATURES
20230049792 · 2023-02-16 ·

A method includes conveying a cryptocurrency transaction to a peer-to-peer network, wherein said cryptocurrency transaction having encoded therein an email address and to convey goods or services embodied in an electronic form to the email address in response to receipt of said cryptocurrency transaction on said peer-to-peer network. The conveying of goods or services includes transmitting over the Internet in conformance with an email protocol. The goods or services includes event admission tickets, music recordings, video, text, game content, live event broadcast, software, encryption keys or passwords.

CRYPTOCURRENCY SWAP PROTOCOL PROVIDING PAYMENT FUNCTION BASED ON LIQUIDITY POOL OVER DIFFERENT BLOCKCHAIN NETWORKS
20220358490 · 2022-11-10 ·

In accordance with an exemplary embodiment of the present invention, a method for providing a liquidity pool-based cryptocurrency transaction brokerage service, the method being performed by a processor executing instructions stored in a memory, includes a code providing step of providing payment codes for service supported cryptocurrencies to an account of a buyer in response to a purchase request of the buyer for a transaction target product registered by a seller, a payment confirmation step of confirming whether a payment stablecoin for which a payment cryptocurrency corresponding to the payment code selected by the buyer is exchanged through a payment liquidity pool is paid from the account of the buyer, a coin delivery step of delivering the payment stablecoin to an account of a service provider, and a cryptocurrency settlement step of delivering a settlement cryptocurrency for which a settlement stablecoin paid from the account of the service provider is exchanged through a settlement liquidity pool to an account of the seller.

Methods And Systems For Transferring Unspent Transaction Output (Utxo) Tokens In A Blockchain Network

Mechanisms for efficiently transferring multiple unspent transaction output (UTXO) tokens in a blockchain network operating a UTXO-based token transaction model are disclosed herein. These methods allow for the use of less computer processing and network bandwidth resources in the transfer of blockchain items, particularly in blockchain schemes with lineage tracking mechanisms (e.g. as may allow for clawback of tokens). Some embodiments comprise generating a delegated account and transferring the UTXO tokens into the delegated account. The ownership of the delegated account can then be transferred to another use of the blockchain network in a single transaction, thereby avoiding the need to individually transfer the UTXO tokens and incur the memory and computational resource burden and costs associated with therewith.

SYSTEM AND METHOD FOR PROVIDING PATENT TITLE INSURANCE WITH CENTRALIZED AND DISTRIBUTED DATA ARCHITECTURES

The present invention discloses a method by which a secure ledger network is deployed to provide assurance related to title of IP assets. Specifically, the invention seeks to improve the risk associated with IP based transactions and reduce the time related to researching color of title related to the same.

REPEAT TRANSACTION VERIFICATION METHOD, APPARATUS, AND DEVICE, AND MEDIUM
20230102617 · 2023-03-30 ·

This application discloses a repeat transaction verification method and apparatus, a device, and a medium. The method includes a repeat transaction verifier being deployed in a first node, and the method includes acquiring a pending transaction to be stored on a blockchain; acquiring a bit array and K hash functions of the repeat transaction verifier, the bit array comprising M array elements and comprising first array elements; based on the K hash functions, mapping the pending transaction to K target identification locations of the bit array, identifying array elements on the K target identification locations as transaction mapping values on the K target identification locations; and obtaining a first repeat transaction verification result of the first repeat transaction verification based on an association between the first array elements and the transaction mapping values on the K target identification locations.

ELECTRONIC DEVICE USING BLOCKCHAIN AND OPERATING METHOD THEREOF

An electronic device includes a communication circuit and a processor connected to the communication circuit. The processor may be configured to generate first transaction data comprising a first piece of transaction data for transferring a part of unused transaction output values of a first address from the first address to a second address, transmit the first transaction data to a server, receive status information indicating a transmission delay status of the first transaction data in a blockchain network from the server, receive recommendation fee information on transmission of the first transaction data, from the server, and generate second transaction data comprising a second piece of transaction data for transferring the part of the unused transaction output values of the first address from the first address to the second address, based on the recommendation fee information.

SYSTEMS AND METHODS FOR CREATING A CUSTOMIZED WATCH FACE AND RETRIEVING THE WATCH FACE TO BE DISPLAYED
20230101814 · 2023-03-30 ·

Systems and methods to create a customized watch face and retrieve the watch face to be displayed are disclosed. Exemplary implementations may effectuate presentation of a selection interface; receive a mint request to mint the watch face in accordance with a watch face design; effectuate a transfer of consideration from a user wallet to an administrative wallet; mint the watch face; transfer a non-fungible token to the user wallet; receive a display request to display the watch face on a watch screen; determine whether the user wallet holds a non-fungible token associated with the watch face; responsive to the user wallet holding the non-fungible token, facilitate display of the watch face on the watch screen; responsive to the user wallet not holding the non-fungible token, take no action to facilitate display of the watch face on the watch screen; and/or perform other operations.

DIGITAL EXCHANGE AUDITING SYSTEM
20220351189 · 2022-11-03 ·

A method and system for computing a trust score for a digital exchange is disclosed. A first counter value associated with a digital exchange is requested from a counter data store. The first counter is calculated using a first algorithm based on a set of transactions monitored in real-time at the digital exchange. Historical transaction data is accessed from the digital exchange. The historical transaction data corresponds to the set of transactions used to calculate the first counter value. A second counter value is determined using the first algorithm based on the historical transaction data. A trust score associated with the digital exchange is determined based on a comparison of the first counter value and the second counter value.