G06Q20/3678

Token mining consensus mechanisms
11700183 · 2023-07-11 · ·

Systems and techniques to facilitate the token mining procedures are illustrated. One embodiment includes a method for reaching consensus in token mining. The method receives a challenge and a computed graph, wherein the computed graph comprises a plurality of nodes. The method stores a portion of the computed graph, wherein the portion comprises a subset of the plurality of nodes. The method generates a Merkle tree based on the computed graph, wherein a root of the Merkle tree is registered. The method determines a challenge value based on the challenge. The method obtains a first node and a second node from the portion of the computed graph, wherein the first and second nodes are based on the challenge value. The method transmits a portion of the Merkle tree corresponding to the first node and the second node.

METHOD AND COMPUTER SYSTEM ADAPTED FOR PERFORMING DIGITAL ASSET DONATION TRANSACTIONS FOR NONPROFIT ORGANIZATIONS
20230011577 · 2023-01-12 ·

In a method and computer system adapted for performing digital asset donation transactions for nonprofit organizations (NPOs), at least one of one or more computing devices ingests digital donation assets from one or more donors intended for a NPO, and then tokenizes the ingested digital donation assets using stablecoin to provide tokenized assets. The tokenized assets are then processed for transfer via ACH to the NPO.

NETWORK COMPUTING SYSTEM EXECUTING PROGRAMMATIC ADAPTERS TO IMPLEMENT ASYNCHRONOUS COMMUNICATIONS
20230214799 · 2023-07-06 ·

A computing system can establish asynchronous network communications with exchanges to facilitate cross-medium transactions between originating and recipient clients. Such communications can result in filtering out errant responses that would otherwise cause an open transaction to fail.

KEY-VALUE MAP COMMITMENTS SYSTEM AND METHOD

A method includes a validation computer receiving an authorization request message comprising a user state and a user proof from a user device. The user state comprises first and second user state elements. The user proof comprises first, second, and third user proof elements. The validation computer computes a first verification value by multiplying the first user proof element raised to the power of the second user state element, and the second user proof element raised to the power of the first user state element. The computer computes a second verification value by raising the second user proof element to the power of the second user state element. The computer compares the first verification value to a first accumulated state element of an accumulated state. The compares the second verification value to a second accumulated state element. The validation computer authorizes the authorization request message based on the comparison steps.

COMPUTER IMPLEMENTED SYSTEMS AND METHODS
20230214792 · 2023-07-06 ·

The invention resides in a blockchain-implemented method of operating a system having a device, the method comprising: using, processing and/or generating a blockchain transaction (MTx) having: one or more token-related outputs (T-UTXO), each of which represents a respective token (T) issued by a Token Issuer (TI) and specifies a) at least one of the operation, status and data that determines the configuration of the device; b) a quantity of token-related cryptocurrency (TRC) associated with the respective token (T). The operation, status and data that determines the configuration and/or status of the device can be determined from instructions on the output of a respective token's blockchain transaction. Generally, assets or resources can be tracked and/or managed using one or more blockchain transactions in which token-related outputs, representing tokens, function to determine the status of an asset.

Methods and systems for management of a blockchain-based computer-enabled networked ecosystem
11551212 · 2023-01-10 ·

In an example, an ecosystem is disclosed that may facilitate digital exchange of a digital asset stored as a computer executable file. The ecosystem may include a plurality of participant systems, wherein the plurality of participant systems may include at least one of an asset user system, an asset holder system, and an asset mining system. The ecosystem may include an asset wrapper associated with the digital asset and configured in the form of a multi-layered structure and computer-executable document. The ecosystem may include a codec configured as a computer executable file and associated with the asset wrapper, wherein the codec may be executed when an external request for the asset exchange is initiated. The ecosystem may include a blockchain device to execute a blockchain smart contract for the asset exchange, wherein the smart contract is executed against a pre-defined number of right tokens characterizing a specific cryptocurrency-value.

Leading-party-initiated cryptologic coordinated symmetric conditional key release

A system supports symmetric release of cryptologically-locked asset transactions. A leading exchange party and a reciprocal exchange party establish, at least in part, a peer challenge in a pre-exchange proposal. The reciprocal party uses the peer challenge to lock a cryptologically-locked asset transaction. The solution to the peer challenge corresponds to an exchange key controlled by the leading exchange party. After establishment of the cryptologically-locked asset transaction, the leading party may request that exchange logic initiate release of the cryptologically-locked asset transaction. In response to the request, the exchange logic may execute a symmetric release of the exchange key and/or signature to the reciprocal exchange party and cryptologically-locked asset transaction (such that the asset is transferred to the leading exchange party).

DEEP LEARNING BASED METHOD AND SYSTEM FOR DETECTING ABNORMAL CRYPTOCURRENCY TRANSACTION BETWEEN COMPUTING DEVICES IN A BLOCKCHAIN NETWORK
20230214845 · 2023-07-06 ·

The described technology relates to a deep learning based method and system for detecting abnormal cryptocurrency transaction between computing devices in a blockchain network. In once aspect, the method includes generating, at a server, a first data set, a second data set, and a third data set from the transactions of a user wallet address with at least one other user wallet address. The method may also include running a pre-learned deep learning module to extract a first feature vector, a second feature vector, and a third feature vector from the first data set, the second data set, and the third data set. The method may further include converting the first feature vector, the second feature vector, and the third feature vector into an intermediate value and comparing the intermediate value to a predetermined reference value to determine if a fraudulent transaction associated with the user wallet address has occurred.

Network computing system executing programmatic adapters to implement asynchronous communications

A computing system can establish asynchronous network communications with exchanges to facilitate cross-medium transactions between originating and recipient clients. Such communications can result in filtering out errant responses that would otherwise cause an open transaction to fail.

System and method for rendering virtual currency related services
11694169 · 2023-07-04 · ·

Technique introduced here relates to virtual currency related services, and more specifically, to tools for providing crypto or other digital currency (e.g. bitcoin) related services, including bitcoin DNS service, sending bitcoins over social media communication networks, a bitcoin trading platform and secure storage services for bitcoin.