G06Q20/3678

RISK MITIGATION FOR A CRYPTOASSET CUSTODIAL SYSTEM USING DATA POINTS FROM MULTIPLE MOBILE DEVICES

Methods, systems, and apparatus for risk mitigation for a cryptoasset custodial system include transmitting an endorsement request for a cryptoasset transaction to a user device configured to cause the user device to prompt a user to endorse the cryptoasset transaction. Multiple data points are collected from mobile devices associated with the user. The data points indicate an identity of the user. A cryptographic endorsement of the cryptoasset transaction is received from the user device. A graphical visualization including a risk metric is generated based on the data points. The risk metric indicates a risk of accepting the cryptographic endorsement from the user device. Generating the graphical visualization includes determining whether the plurality of data points matches expected values

Systems and Methods for Token Management in Social Media Environments

Systems and techniques to enable token-related functionality within social media platforms are illustrated. One embodiment include a method for accessing tokens. The method derives characteristics of one or more tokens owned by a first account on a platform. The method reviews one or more external accounts on the platform for compatible tokens that share at least one of the characteristics. The method confirms a compatible token is owned by a second account of the one or more external accounts. The method accesses the compatible token.

GRAPH-BASED ANALYSIS AND VISUALIZATION OF DIGITAL TOKENS
20230070625 · 2023-03-09 ·

An example operation may include one or more of identifying a digital token issued via a blockchain, determining an asset that is linked to the digital token, a current custodian of the asset that is linked to the digital token, and a risk value associated with the asset based on attributes of the asset, generating a graph that comprises a path between a user that owns the digital token and the current custodian of the asset, embedding the graph within a field of a template and embedding the risk value within a second field of the template to generate a filled-in template, and displaying the filled-in template within a user interface.

SERVICE PROVIDING METHOD PERFORMED BY SERVER OF MUSIC PLATFORM USING BLOCKCHAIN-BASED NFT
20230071913 · 2023-03-09 · ·

A service providing method of the present invention includes receiving sound source information on a sound source to be registered to the music platform and issuing a blockchain-based NFT that represents an ownership for the sound source; receiving a request for using a service related to the sound source registered to the music platform from at least one at least one service use terminal connected to the blockchain-based network; and in response to the received request, providing a service related to the sound source based on the blockchain-based NFT issued in advance for the sound source to the at least one service use terminal.

Systems And Methods for Monetization of Time and Activity on a Digital Ledger
20230128945 · 2023-04-27 ·

Systems and methods for creating an economic system and associated processes to enable earning of income in a local currency based on time invested in activities conducted on-line. This permits people in locations with few conventional ways to earn income to be compensated for the value they add to others by spending their time and devoting their attention to activities they can pursue from their location. These activities may include various forms of participating in gamified activities in which credits are earned for performing certain on-line tasks, assisting themself or others to achieve a goal, etc. The earned credits may be exchanged for a “token” whose value is determined by the economic system being disclosed, and which can be exchanged for local currency.

UNIVERSALLY TRUSTED BRIDGES FOR HETEROGENOUS BLOCKCHAIN NETWORKS

Different communication and software protocols may be used by different blockchain networks. Cross-chain communication is provided via a software bridge configured to enable specific operations. An event request may be sent from a first blockchain network to a second blockchain network. The event request may be processed using a first protocol of the first network to provide a first output. An offer of equivalent processing provided by the second network may be verified by: processing the event request using a second protocol of the second network to provide a second output, and confirming that the second output matches the offer of equivalent processing. A processing equivalence of the event request may be established between the first network and the second network based on the first output of the event request processed using the first protocol and the second output of the event request processed using the second protocol.

SYSTEMS AND METHODS FOR MANAGING CONTENT FROM CREATION TO CONSUMPTION
20230075182 · 2023-03-09 ·

The present disclosure relates to content management systems and methods that may support, among other things, content storage, content identification, content collaboration, online services, payment settlement, electronic contracts, reputation, recommendation, and/or steganography activities. Consistent with various embodiments disclosed herein, systems and methods are provided to facilitate creation of works of any type, to collaborate with co-creators, to make that work available in the marketplace, and to provide for an architecture where the identities of all the creators involved may be bound to associated objects and/or identifiers associated with them. Being securely bound to certain identities and the identifiers, creative works may be distributed, and the associated credits and contractual obligations may remain with them and the associated remunerations and obligations may be respected and fulfilled.

INITIATING A WORKFLOW IN A DIGITAL TOKEN TRANSACTION SYSTEM BASED ON A RECOGNIZED ACTIVITY IN A FOOD DELIVERY SYSTEM

Systems and methods for tokenizing real-world items for use in digital commerce are disclosed. In some embodiments, a recognized activity in a workflow of a food delivery system triggers a workflow for a set of digital tokens associated with the recognized activity in a digital token transaction system.

FEDERATED IDENTIFIERS FOR CROSS-PLATFORM INTEROPERABILITY
20230074653 · 2023-03-09 ·

In one embodiment, techniques include storing indications of unique identifiers used by users of service providers that are part of a federated system. Each of the unique identifiers is associated with only one user. A computing system of a first service provider receives an intent to register a unique identifier with the first service provider. The computing system determines availability of the unique identifier based on determining whether the unique identifier is associated with another user in the data store. Based at least in part on the determination that the unique identifier is available, the computing system maps, in the data store, the unique identifier with an account of the user associated with each service provider that is part of the federated system. Subsequent to the mapping, the unique identifier is usable as a proxy in lieu of personal data associated with the user on each service provider.

Methods for Evolution of Tokenized Artwork, Content Evolution Techniques, Non-Fungible Token Peeling, User-Specific Evolution Spawning and Peeling, and Graphical User Interface for Complex Token Development and Simulation

Non-fungible evolution platforms in accordance with various embodiments of the invention are described. In an embodiment, an NFT evolution platform, includes: a network interface; memory; and a processor, the processor configured to: generate an NFT that includes several layers, where each layer includes content, provide access to a first set of layers of the several layers of the NFT, detect a trigger event, and provide access to a different second set of layers of the several layers of the NFT.