G06Q20/3678

MULTI-MODAL ROUTING ENGINE AND PROCESSING ARCHITECTURE FOR AUTOMATED CURRENCY ORCHESTRATION BASED ON STORED RULES

An integration system for a system of platforms includes an orchestration platform, a blockchain transactional platform, a digital transactional platform, a merchant system, a user trust platform, and one or more user devices connected to each other and a distributed ledger and/or a secondary mesh network via one or more networks. The blockchain transactional platform performs accesses and performs actions on the distributed ledger and/or the secondary mesh network. The digital transactional platform maintains transactional data indicative of an amount of first-domain value correlated to a user. The blockchain transactional platform maintains blockchain transactional data indicative of an amount of second-domain value correlated to the user. The orchestration platform manages data exchange, synthesis, fusion, analysis, and transformation between the components of the system, including automated currency orchestration based on stored rules.

SYSTEMS AND METHODS FOR CRYPTOCURRENCY ADMINISTRATION
20230140461 · 2023-05-04 ·

Technologies are described herein for the administration of cryptocurrency. A currency transfer server is used to support the administration of a user wallet using a device capable of communicating via a cellular network. A coin transfer application receives instructions on how much cryptocurrency to send and the cellular number to which the cryptocurrency is to be sent. A temporary wallet is instantiated to receive the transfer, whereby the recipient receives a withdrawal code using a messaging application from the sender. Once received, the recipient can transfer the cryptocurrency from the temporary wallet to the recipient's wallet or use the temporary wallet as the permanent wallet.

SECURING CRYPTOGRAPHIC DATA ONTO A PHYSICAL MEDIUM

The present invention relates to a method and a system for inscribing and securely storing cryptographic keys on a physical medium, and to a corresponding physical medium, comprising the following steps: from a first management entity (31), generating (1) a first pair of asymmetric cryptographic keys comprising a first user public key (pub1) and a first user private key (priv1), inscribing (2) the first user private key (priv1) onto a physical medium, and affixing (4) a first tamper-evident concealing element (hol1) to the physical medium in order to conceal the first user private key (priv1) and seal same, said first user private key (priv1) being accessible only by visibly breaking said first tamper-evident concealing element (hol1); from the second management entity (32), generating (6) a second pair of asymmetric cryptographic keys comprising a second user public key (pub2) and a second user private key (priv2), inscribing (7) the second user private key (priv2) onto the physical medium and affixing (9) a second tamper-evident concealing element (hol2) to the physical medium in order to conceal the second user private key (priv2) and seal same, said second user private key (priv2) being accessible only by visibly breaking said second tamper-evident concealing element (hol2); generating (10) at least one last user public key (pub0) and/or at least one cryptographic address (adr, adr-mult) from the first user public key (pub1) and the second user public key (pub2), inscribing (11) said at least one last public user key (pub0) and/or said at least one cryptographic address (adr, adr-mult) onto the physical medium, and verifying (12, 13) same, and finally recovering the private keys (priv1, priv2) comprising the generation of a last user private key (priv0) corresponding to the last user public key (pub0) and/or to said at least one cryptographic address (adr, adr-mult).

Transferring a domain name on a secondary blockchain market and in the DNS
11797655 · 2023-10-24 · ·

Techniques for transferring registration of a domain name from a first registrant to a second registrant for cryptocurrency in a blockchain network and in the Domain Name System (DNS) are disclosed. The techniques can include receiving a purchase request message comprising the domain name, at least one purchase parameter, and a second registrant network identifier, and sending a purchase instruction message to an executable program on a blockchain for the blockchain network, the purchase instruction message including the domain name and the second registrant network identifier, such that the executable program writes at least the domain name, the second registrant network identifier, and an identifier of a gaining registrar to a deed contract for the domain name and emits an event representing a request to transfer registration of the domain name.

SYSTEMS AND METHODS FOR DISTRIBUTED-LEDGER BASED INTRADAY TRADING
20220398661 · 2022-12-15 ·

Systems and methods for distributed ledger-based intraday trading are disclosed. In one embodiment, a method may include: receiving a digital representation of an amount of collateral for a cash borrower; receiving a digital representation of an amount of cash for a cash provider; receiving agreement from the cash borrower and the cash provider to terms of an intraday trade comprising a duration of the intraday trade, a collateral trade amount of the collateral, and a cash trade amount of cash; a smart contract executing the intraday trade by providing the trade amount of the digital collateral to the cash provider and the cash trade amount of the digital cash to the cash borrower; and the smart contract returning the trade amount of the digital collateral to the cash borrower and the cash trade amount of the digital cash to the cash provider at the completion of the intraday trade.

SYSTEM AND METHOD FOR COMPOSITE CRYPTOGRAPHIC TRANSACTIONS

A composite cryptographic data structure is described, and corresponding methods, systems, and computer readable media. The composite cryptographic data structure is instantiated based on an underlying set of cryptographic tokens (e.g., blockchain/distributed ledger tokens) that, in some embodiments, are transferrable through on-chain transactions established on one or more distributed ledger networks. Identity validation, in some embodiments, may occur at one of composite cryptographic data structure instantiation or composite cryptographic data structure redemption, or both, through the use of a whitelist or a blacklist data structure.

PEER-TO-PEER CRYPTOCURRENCY AND CRYPTO ASSET TRADING PLATFORM
20230015219 · 2023-01-19 · ·

A method for cryptocurrency exchange between multiple parties using threshold signature cryptocurrency wallets includes steps for creating threshold signature cryptocurrency wallets shared between a set of parties and a mediator for trading cryptocurrencies. The method may include steps for dividing a threshold private key, corresponding to each of the threshold signature cryptocurrency wallets, into n shares based on (t, n)-threshold signature scheme and sharing masked shares, corresponding to the threshold private key for each of the threshold signature cryptocurrency wallets, by the set of parties and the mediator. The method may include steps for validating correctness of all masked shares of the threshold private keys by the set of parties and the mediator. The method may include steps for signing a withdrawal cryptocurrency transaction jointly by the set of parties or signing a withdraw deposit transaction jointly by the at least one party and the mediator.

Multi-approval system using M of N keys to generate a sweeping transaction at a customer device
11531985 · 2022-12-20 · ·

A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of N private keys or key components associated with a customer. The at least one processor is configured to generate, at the customer device, a sweeping transaction that transfers all funds from at least one input transaction address in a customer wallet to a new transaction address. The at least one processor is also configured to sign the sweeping transaction using at least M of N private keys or key components.

UNIVERSAL SUBSCRIPTION AND CRYPTOCURRENCY PAYMENT MANAGEMENT PLATFORMS AND METHODS OF USE

Universal blockchain and other management platforms and methods of use are provided herein. A blockchain subscription pay manager app is configured determine which users are associated with which merchants and which subscription plans by way of a blockchain subscription plan invoicing and payment processing capability which enables collection of user and merchant information, subscription plan set up and payment information and gives the user and merchant a “look and feel” of a universal centralized payment system despite interactions with the subscription smart contracts/wallets over the blockchain decentralized network.

Digital ledger authentication using address encoding

Disclosed techniques enable digital ledger authentication using address encoding. A digital ledger is accessed. A wallet address is determined for a user, where the wallet address is associated with a cryptocurrency in the digital ledger. The wallet address is hashed and signed, where the signing is performed using a private key from a digital purveyor. A digitally mapped value is encoded based on the wallet address. A transaction is authenticated based on reverifying the digitally mapped value with a re-encoding or re-signing the wallet address. The reverified digitally mapped value is used to enable a smart contract. An entry is appended to the digital ledger, where the entry includes the digitally mapped value. A transaction is rejected due to the re-encoding of the wallet address not having a correct private key signature, based on non-authentication.