Patent classifications
G06Q20/3678
Multi-approval system using M of N keys to generate a transaction address
A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with a customer device and a trusted third party. The at least one processor is configured to derive, using a hashing function, a multi-approval transaction address in a customer wallet from a first public key derived from a first parent public key, a second public key derived from a second parent public key, and a third public key derived from a third parent public key. The at least one network interface is also configured to transmit the multi-approval transaction address to the customer device.
KEY-VALUE MAP COMMITMENTS SYSTEM AND METHOD
A method includes a validation computer receiving an authorization request message comprising a user state and a user proof from a user device. The user state comprises first and second user state elements. The user proof comprises first, second, and third user proof elements. The validation computer computes a first verification value by multiplying the first user proof element raised to the power of the second user state element, and the second user proof element raised to the power of the first user state element. The computer computes a second verification value by raising the second user proof element to the power of the second user state element. The computer compares the first verification value to a first accumulated state element of an accumulated state. The compares the second verification value to a second accumulated state element. The validation computer authorizes the authorization request message based on the comparison steps.
Systems, methods, and storage media for managing digital liquidity tokens in a distributed ledger platform
An apparatus, computer-readable medium, and computer-implemented method for creating and managing a distributed ledger non-fungible token data structures that represent the liquidity function for any two distinct representations of assets. The representations may be different assets or a single asset type with different characteristics including ledger, network, jurisdiction, availability, etc. The liquidity function is the mechanism to transform or exchange the asset including the pricing function, fees, and delivery mechanism. The investment performance of the liquidity token can be proportional to the demand for liquidity for the pair of assets.
ELECTRONIC WALLET ALLOWING VIRTUAL CURRENCY EXPIRATION DATE
A computer-implemented system and method uses a processor of a device of an expiring virtual currency (EVC) wallet user. An EVC transaction is retrieved that is associated with a blockchain and addressed to an address associated with the EVC wallet. The EVC transaction comprises an expiration date for the EVCs, as part of virtual currency user rules (VCURs). If the expiration date of the EVCs has passed, the method automatically, and without user intervention, transfers the EVCs to a transferee designated in the VCURs.
Method for secure peer-to-peer communication on a blockchain
The invention comprises a computer-implemented method and system for controlling an exchange process, such as a loan, conducted between at least two parties via a blockchain such as the Bitcoin blockchain. A method according to the invention may comprise the step of generating a first blockchain transaction which includes a redeem script. The redeem script comprises a cryptographic public key associated with an initiating party and metadata which includes a hash of an exchange-related document; a redeem address; and an amount of digital currency. A second blockchain transaction is generated and published to the blockchain so as to spend the digital currency to the redeem address. This provides the advantage that the further transaction will be publically available and thus detectable by other parties once it has been published. The further transaction can provide the information necessary to trigger a response e.g. an offer from another (responding) party who publishes their response on the blockchain. Thus, the exchange process can be implemented via a multi-transaction mechanism on the blockchain rather than an alternative medium. The exchange related document may be an invitation (offer/request) which is stored off-block in a repository such as a Distributed Hash Table (DHT). The invitation may be an invitation to engage in a contract. A smart contract (and associated blockchain transaction) may be formed upon condition that a plurality of participants (e.g. lenders/borrowers) are matched with each other via one or more responses effected via transactions on the blockchain.
INFORMATION TRANSACTION INFRASTRUCTURE
A method of transferring information with verification from a first party to a second party using suitably programmed computing apparatus is described. Information from a first party private address to a first party public address. This information is then sent from the first party public address to a second party address. The information is also provided for public recordal on a block of a block chain for verification. The first party private address is not communicated to the second party but the first party public address is communicated to the second party. This approach is particularly suitable for transfer of cryptocurrency, as it allows for an effective refund mechanism. Computing apparatus and application software adapted to implement this approach is also described.
DIGITAL ASSET CONVERSION
A method of converting digital assets into a transaction currency is described that it suitable for use in a transaction system that is not adapted for transactions using the digital assets. The digital assets are stored so that they can be used with one or more exchanges adapted for conversion of the digital assets into the transaction currency. A balance in the transaction currency is established for use by a payment device. Rules are established for maintaining the transaction currency balance. When required by the rules for maintaining the transaction currency balance, digital assets are converted into the transaction currency at the one or more exchanges for maintaining the transaction currency balance in the transaction currency for use by the payment device. A suitable service is also described.
Secure crypto currency point-of-sale (POS) management
A Point-Of-Sale (POS) terminal is equipped to process crypto currencies for transactions. The POS terminal generates a transaction-based digital wallet for a given transaction to receive a crypto currency payment for that given transaction. The transaction-based digital wallet, funded with the crypto currency for the given transaction, is transferred to a retailer's server where the crypto currency is transferred from the transaction-based digital wallet to a retailer's digital wallet for eventual exchange to a government issued currency.
Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems
The Computationally Efficient Transfer Processing, Auditing, and Search Apparatuses, Methods and Systems (“SOCOACT”) transforms smart contract request, crypto currency deposit request, crypto collateral deposit request, crypto currency transfer request, crypto collateral transfer request inputs via SOCOACT components into transaction confirmation outputs. Also, SOCOACT transforms transaction record inputs via SOCOACT components into matrix and list tuple outputs for computationally efficient auditing. A blockchain transaction data auditing apparatus comprises a blockchain recordation component, a matrix Conversion component, and a bloom filter component. The blockchain recordation component receives a plurality of transaction records for each of a plurality of transactions, each transaction record comprising a source address, a destination address, a transaction amount and a timestamp of a transaction; the source address comprising a source wallet address corresponding to a source digital wallet, and the destination address comprising a destination wallet address corresponding to a destination virtual currency wallet; verifies that the transaction amount is available in the source virtual currency wallet; and when the transaction amount is available, cryptographically records the transaction in a blockchain comprising a plurality of hashes of transaction records. The Bloom Filter component receives the source address and the destination address, hashes the source address using a Bloom Filter to generate a source wallet address, and hashes the destination address using the Bloom Filter to generate a destination wallet address. The Matrix Conversion component adds the source wallet address as a first row and a column entry to a stored distance matrix representing the plurality of transactions, adds the destination wallet address as a second row and column entry to the stored distance matrix representing the plurality of transactions, adds the transaction amount and the timestamp as an entry to the row corresponding to the source wallet address and the column corresponding to the destination wallet address; and generate a list representation of the matrix, where each entry in the list comprises a tuple having the source wallet address, the destination wallet address, the transaction amount and the timestamp.
Vehicle control system for cybersecurity and financial transactions
A vehicle control system includes a controller that is configured to include a memory, a verification module, and a software control module. The memory includes a software version repository to store a public address and one or more software hashes associated with the public address. The verification module is configured to verify a software upload request that includes a recommended software program to be uploaded. The verification module is configured to determine whether a contingent software hash that is indicative of the recommended software program matches a current software hash. The software control module is configured to acquire the recommended software program in response to the contingent software hash matching the current software hash.