G06Q20/3678

Method of electronic payment by means of a uniform resource identifier (URI)
11455625 · 2022-09-27 · ·

A method of generating electronic monetary tokens (tokens) on a server that supports transmission of the tokens between third parties by means of a Uniform Resource Identifier (URI) and also prevents double spending of the tokens. The tokens are represented by a substring of a Uniform Resource Identifier (URI), which identifies a resource in a network. As a payment request the substring comprises an indicator of price. As a payment for a resource the substring comprises a set of tokens and a buyer's unique identifier. On receipt of the tokens and before releasing the resource to the buyer the seller requests an indication from the server that the buyer owns the tokens thus preventing double spending of the tokens. Preferably, the URI is a Uniform Resource Locator (URL).

TRANSACTION TOKEN ISSUING AUTHORITIES
20220051231 · 2022-02-17 ·

Systems, methods, apparatus, processes, computer program code and means for conducting transactions are described which allow a first party to a transaction to identify a second party to a transaction.

Generating and linking private transaction identifiers to distributed data repositories

Techniques are described for generating semi-random private transaction identifiers for users that are meaningful to data providers and can be used by data providers to perform internal queries for user data. A user provides input to an identity management service indicating the user's consent to link their user account at the identity management service to one or more data providers. The identity management service stores a group blinded transaction identifier (GBTI) based on transaction identifiers generated by one or more data providers. When the user desires to obtain a service from a service provider, the user obtains GBTI-derived value from the identity management service and sends it to the service provider. The service provider sends the GBTI-derived value (and possibly other information) to the data provider to prove that it has the user's consent to obtain desired data or insights about the user but without infringing the user's privacy.

Watch skins selection application with blockchain token
11250399 · 2022-02-15 · ·

Electronic watch faces can be created in customized and associated with a block chain system. More particularly, the block chain's system uses non-fungible tokens which are in general unique, to represent the ownership of a specific watch face. Users own the token and can display the watch face only while they own the token. After selling the watch face, the token is changed to represent the new owner of the token and the original owner can no longer display the watch face at that point.

Highly scalable permissioned block chains

Technologies are shown for function level permissions control for smart contract execution to implement permissions policy on a blockchain. Permissions control rules control function calls at a system level utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for a smart contract. The permissions control rules are applied to the call stack to implement permissions control policy. Permissions control rules can use dynamic state data in the function call chain. If the dynamic state data observed in function call chains does not meet the requirements defined in the permissions control rules, then the function call can be blocked from executing or completing execution. The permissions control rules can be generated for a variety of different entities, such as a domain, user or resource.

SYSTEMS AND METHODS FOR PEER-TO-PEER TRANSMISSION OF DIGITAL ASSETS
20220044229 · 2022-02-10 ·

This disclosure relates to transaction systems and particularly to transaction systems of a peer-to-peer nature for digital assets. The asset transfer system may store user, user accounts, and transaction information in associated logic tables within a memory of a server hosting the asset transfer system. Through the use of, but limited to, curl functions, the asset transfer system may communicate with remote servers housing user wallets and user wallet information to perform transactions of digital assets between users. Before verification and proof of work can be established to complete the transfer of digital assets, the asset transfer system may report to the users of a transaction the details of the transaction. Users of the asset transfer system need not know encrypted or random keys to perform such digital asset transactions and may transfer digital assets only by identification of a username stored within the asset transfer system.

SYSTEM AND METHOD FOR A DIGITAL COIN EXCHANGE
20220044273 · 2022-02-10 ·

Systems and methods for digital coin exchange. A digital coin platform receives a distribution request from an entity server comprising digital multimedia content associated with an entity. Digital coins are created responsive to the request. Each digital coin comprises a first coin associated with the entity and a second coin associated with consumers. The first and second coins are linked via linking information. The first coins are transferred to the entity server. A consumption request including the digital multimedia content is transmitted to a consumer device. Responsive to an indication that the content is at least partially consumed via the consumer device, one or more second coins are transferred to the consumer device. The digital coins and the transferred first and second coins are recorded. The transferred second coins permit the consumer device to perform transactions associated with the entity.

Transactional Sharding of Blockchain Transactions
20220043831 · 2022-02-10 · ·

A complex cryptographic coinage transaction is transactionally sharded into multiple simple cryptographic coinage transactions. The complex cryptographic coinage transaction specifies cryptographic debits and/or deposits to/from multiple input accounts and/or multiple output accounts. The simple cryptographic coinage transactions, however, only specify a single one of the input accounts and/or a single one of the output accounts. A single server within a blockchain environment may thus process one of the simple cryptographic coinage transactions without requiring calls for data from other servers responsible for other accounts.

CRYPTOCURRENCY KEY MANAGEMENT
20220237595 · 2022-07-28 · ·

A method of managing cryptocurrency keys. The method comprises: generating one or more cryptocurrency keys; encrypting the cryptocurrency keys with a password and communicating the encrypted cryptocurrency keys to remote storage. The method further comprises, subsequently, retrieving the encrypted cryptocurrency keys from the remote storage; decrypting the encrypted cryptocurrency keys with the password, and storing temporarily the decrypted cryptocurrency keys for use in one or more cryptocurrency transactions.

CONTROL METHOD, NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, INFORMATION PROCESSING APPARATUS, AND CONTROL SYSTEM
20220237576 · 2022-07-28 · ·

A control method executed by an information processing apparatus that controls a link between a first blockchain handling a first currency and a second blockchain handling a second currency, the control method includes determining, when an issuance request of the second currency is received from a user, an allowable payment amount of the second currency based on credit information of the user, transmitting, to the first blockchain, a first instruction to notify the second blockchain of the allowable payment amount, and transmitting, when a payment transaction in the second currency by the user is recorded in the second blockchain, a second instruction to collect the first currency that has a value that corresponds to the second currency from an account of the user on the first blockchain, to the first blockchain.