G06Q20/3678

SYSTEM FOR VALIDATING TICKET TRANSACTIONS VIA TICKET NFTS AND METHODS FOR USE THEREWITH

A client device operates by: receiving a ticket transaction request for a ticket transaction having a ticket NFT associated therewith; generating, in response to the ticket transaction request, transaction metadata that includes user identification data; sending the transaction metadata to a wallet associated with a user of a client device, the wallet containing a private key associated with the ticket NFT; receiving, from the wallet, a transaction response that is generated based on the private key; generating, based on the transaction response, ownership check data; sending the ownership check data to a blockchain system that stores the ticket NFT; receiving, from the blockchain system, an ownership validation response; and indicating approval of the ticket transaction when ownership of the ticket NFT is verified.

INITIATING A WORKFLOW IN A FOOD DELIVERY SYSTEM BASED ON A RECOGNIZED ACTIVITY IN A DIGITAL TOKEN TRANSACTION SYSTEM

Systems and methods for tokenizing real-world items for use in digital commerce are disclosed. In some embodiments, a recognized activity in a workflow for a set of digital tokens of a digital token transaction system triggers a workflow associated with the recognized activity in a food delivery system.

CONFIGURING A SET OF DIGITAL TOKENS WITH A TEMPORAL ATTRIBUTE THAT DETERMINES A TIMING OF REDEMPTION OF THE SET OF DIGITAL TOKENS FOR A CORRESPONDING SET OF ITEMS

Systems and methods for tokenizing real-world items for use in digital commerce are disclosed. In some embodiments, a digital token transaction system configures a set of attributes for a set of digital tokens that are cryptographically linked to a set of virtual representations of a set of items. The set of attributes includes at least one temporal attribute that defines a time after which redemption rights of the set of tokens for the items expire.

SYSTEMS AND METHODS FOR TOKENIZATION, MANAGEMENT, TRADING, SETTLEMENT, AND RETIREMENT OF RENEWABLE ENERGY ATTRIBUTES

Systems and methods for tokenization, management, trading, settlement, and retirement of renewable energy attributes are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for tokenization, management, trading, settlement, and retirement of renewable energy attributes may include: (1) identifying renewable energy generation data associated with a seller to tokenize; (2) generating at least one renewable energy token for the identified renewable energy generation data; (3) writing the renewable energy token to a first distributed ledger; (4) adding the renewable energy token to a digital wallet for the seller; (5) exchanging the renewable energy token for a cash token owned by a buyer by associating the renewable energy token with the buyer and associating the cash token with the seller on the first distributed ledger; and (6) retiring the renewable energy token.

MULTI-MODAL ROUTING ENGINE AND PROCESSING ARCHITECTURE FOR ORCHESTRATION OF VARIABLE LENDING REPAYMENT TERMS USING CRYPTOCURRENCY COLLATERAL

An integration system for a system of platforms includes an orchestration platform, a blockchain transactional platform, a digital transactional platform, a merchant system, a user trust platform, and one or more user devices connected to each other and a distributed ledger and/or a secondary mesh network via one or more networks. The blockchain transactional platform performs accesses and performs actions on the distributed ledger and/or the secondary mesh network. The digital transactional platform maintains transactional data indicative of an amount of first-domain value correlated to a user. The blockchain transactional platform maintains blockchain transactional data indicative of an amount of second-domain value correlated to the user. The orchestration platform manages data exchange, synthesis, fusion, analysis, and transformation between the components of the system, including the orchestration of variable lending repayment terms using cryptocurrency collateral.

CRYPTOCURRENCY SYSTEM AND METHOD FOR PERFORMING FINANCIAL TRANSACTIONS
20230068597 · 2023-03-02 ·

A cryptocurrency system and method for performing financial transactions is disclosed. The method includes receiving a request for performing a financial transaction with respect to a decentralized account associated with a sender and first set of parties. Further, the method includes performing the financial transaction by transferring the secret share key associated with each of the sender and the first set of parties to at least one of a recipient and a second set of parties. Also, the method includes recovering the account private key at the recipient and the second set of parties' side using the secret share key associated with each of the sender and the first set of parties. Further, the method includes discarding the secret share key of the account private key at the sender and the first set of parties' side.

VERIFIED TRANSACTIONS THROUGH INTEGRATIONS
20230069223 · 2023-03-02 ·

Verified transactions through integrations of social network and payment service computing platforms are described. A payment service computing platform may generate a token associated with a first account associated with a payment service, the token being configured to facilitate a number of transfers of an amount from the first account to one or more second accounts. The payment service computing platform may further receive a first request, from an electronic device of a second user associated with the one or more second accounts, to redeem the amount associated with the token, facilitate acquisition of one or more assets for the second user, wherein the one or more assets are determined by the second user or based at least in part on a machine-learning model trained to infer a preference of the first or second user, and associate the one or more assets with a second account of the second user.

SYSTEMS AND METHODS FOR VULNERABLE COMPUTER SYSTEM EARLY WARNING DETECTION
20230064167 · 2023-03-02 ·

A system for detecting intrusions in secure networked computing systems is provided. Also provided are a method for detecting intrusions in secure networked computing systems and a computer-readable medium including instructions for detecting intrusions in secure networked computing systems. The method of detection includes placing cryptocurrency in plain site within the secure networked computing system to provide an incentive for an intruder to steal the cryptocurrency and thus provide a notification of the intrusion.

COMPUTING SYSTEM FOR DISTRIBUTING CRYPTOCURRENCY

A computing system receives a code that is generated based upon an image of an iris of a first user. The image of the iris of the first user is captured by way of an iris scanning device that is under control of a second user. The computing system executes a search over a plurality of codes stored in a data store based upon the code, where the plurality of codes are generated based upon images of irises of a plurality of users. The computing system determines whether the code is included in the plurality of codes based upon search results for the search. Based upon a determination that the code is not included in the plurality of codes, the computing system causes an amount of cryptocurrency to be transferred to a cryptocurrency wallet of the second user.

System for recurring auxiliary resource distribution

Systems, computer program products, and methods are described herein for recurring auxiliary resource distribution. The present invention may be configured to detect a trigger event associated with a plurality of sources, where the plurality of sources includes a standard source and an auxiliary source, and where the plurality of sources is associated with a user. The present invention may be configured to transform, using a resource transformation engine and based on the trigger event, a first amount of auxiliary resources in the auxiliary source to a second amount of standard resources, deduct the first amount of auxiliary resources from a first balance of the auxiliary source, and add the second amount of standard resources to a second balance of the standard source. The present invention may be configured to perform a resource distribution using the second amount of standard resources from the standard source.