Patent classifications
G06Q20/3678
METHODS AND SYSTEMS FOR DYNAMIC ROUTING OF ELECTRONIC TRANSACTION MESSAGES WHILE MAINTAINING TOKEN COMPATIBILITY
Systems and methods are disclosed for dynamic routing of electronic transactions while maintaining token compatibility. One method comprises receiving a request message from a merchant system and determining a final destination payment processor based on a routing directive. Upon determining the final destination payment processor, the request message may be updated by updating a message destination to the final destination payment processor and replacing an initial token with a token that is compatible with the final destination payment processor. The updated request message may then be transmitted to a downstream entity for further processing.
Open system for parking of vehicles using incentives.
A method for ensuring verifiable parking of micro-mobility vehicles in designated locations through centralized or decentralized systems. The invention seeks to solve situations of scattered and disorderly parking of micro-mobility vehicles. Through sensing devices, the main system receives information of a parked vehicle within a designated space, which may include vehicle features or alphanumeric code, and processes the data for verification via machine learning or other techniques. Upon verification of the proper parking of a vehicle, a ledger logs the corresponding user with the parking event. Cryptocurrency tokens may be distributed to users or operators upon verification of proper parking, depending on whether the vehicle is owned by the user or part of a shared fleet.
Blockchain instrument for transferable equity
Systems and methods for offering and purchasing tokenized securities on a blockchain platform meeting current and future federal, state, and offering and holding entity rules and regulations. Tokenized securities purchased during or after the tokenized securities offering are tradable on a secondary market. The server computer of the tokenized securities provides an automated transfer capability for tokenized securities holders.
Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.
Monitoring process for intermittent and temporary transfers
Provided are systems and methods for auto-performing short-term investments on an intermittent basis via a crypto-network and returning the principal and interest before the cash is needed. As an example, the method may include installing a blockchain smart contract on a blockchain ledger with read access to content stored on the blockchain ledger, establishing a communication channel between a monitoring engine and the blockchain smart contract, configuring the monitoring engine to identify stop conditions from content stored on the blockchain ledger, monitoring the blockchain ledger for updates to content stored on the blockchain ledger via the communication channel and detecting a stop condition based on an update to the blockchain ledger via the monitoring engine, and in response the detected stop condition, transmitting a request to the crypto-exchange server to return the funds to the external data source.
Method and system for trustworthiness using digital certificates
A method for generating digital certificates for anonymous users in blockchain transactions includes: storing a blockchain comprised of a plurality of blocks, each block including a block header and transaction values, where each transaction value includes data related to a blockchain transaction including a sending address, recipient address, and transaction amount; receiving a certificate request from a computing device, the request including a user public key of a cryptographic key pair; identifying a subset of transaction values in the blockchain where the sending address or recipient address was generated using the user public key; determining a confidence level based on the data included in each transaction value included in the subset; generating a digital certificate based on the determined confidence level; and transmitting the generated digital certificate to the computing device.
Platform for temporary and intermittent transfers
Provided are systems and methods for auto-performing short-term investments on an intermittent basis via a crypto-network and returning the principal and any interest before the account holder needs the money back. For example, a method may include executing a machine learning model on ingested data records to identify a temporary value that is idle in an account and a period of time that the temporary value is idle, displaying the determined temporary value, the period of time, and one or more recommendations of one or more blockchain networks, receiving authorization and a selection of a blockchain network from a user interface, installing a pre-programmed blockchain wallet on a blockchain ledger of the selected blockchain network, and triggering a transfer of funds from the account of the user to the pre-programmed blockchain wallet via a crypto-exchange server which converts the funds to cryptocurrency prior to the transfer.
System level function based access control for smart contract execution on a blockchain
Technologies are shown for system level function based access control for smart contract execution on a blockchain. Access control rules control function calls at a system level by utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for execution of a smart contract. The access control rules are applied to the function call stack to allow or prohibit specific functions or function call chains. Access control rules can also define allowed or prohibited parameter data in the function call chain. If the function call chain or parameters do not meet the requirements defined in the access control rules, then the function call can be blocked from executing or completing execution. The access control rules can produce sophisticated access control policies based on complex function call chains.
Systems and methods for domestic and/or cross border blockchain transaction solutions involving central bank digital currency
Systems and methods are provided for processing global CBDC transactions in a blockchain supported network, where domestic and foreign banking institutions may provide mutual hosting of a consortium blockchain to allow more seamless and direct CBDC supported transactions, and CBDC exchanges in real-time or near-real time.
System for linking and partitioning non-fungible tokens
Systems, computer program products, and methods for linking and partitioning non-fungible tokens by receiving, from a computing device of a first user, a first request to transfer ownership of a resource from a first user to a second user; retrieving, from the computing device of the first user, a first non-fungible token (NFT) for the resource; determining, using an NFT valuation engine, a first value of the first NFT; initiating an NFT generator on the resource based on at least receiving the first request; generating, using the NFT generator, a second NFT for the resource, wherein the second NFT comprises at least an indication of transfer of ownership of the resource from the first user to the second user and the first value of the NFT; and recording the second NFT on a distributed ledger.