Patent classifications
G06Q20/3678
SYSTEMS AND METHODS FOR SUBSTITUTE LOW-VALUE TOKENS IN SECURE NETWORK TRANSACTIONS
Methods and systems are disclosed for enabling the creation of substitute low-value token creation, comprising providing software content to a content delivery network wherein, when transmitted to a user browser, the software content is configured to enable the user browser to create a substitute low-value token if a token service is unavailable, wherein the content delivery network is configured to provide the software content to at least one user browser, and receiving the substitute low-value token from a merchant system, the substitute low-value token having been generated by the user browser in response to the user browser being unable to obtain a low-value token from the token service.
MULTI-APPROVAL SYSTEM USING M OF N KEYS TO RESTORE A CUSTOMER WALLET
A customer device that includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one memory stores a customer private key of N private keys associated with a customer. The customer device also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of the N private keys. The at least one processor is configured to receive at least one private key of the N private keys from the at least one vault system. The at least one processor is also configured to perform at least one cryptographic action based on the at least one private key and the customer private key.
COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR IMPLEMENTING TRANSFERS OVER A BLOCKCHAIN NETWORK
The invention provides improved Simplified Payment Verification (SPV) solutions for blockchain-implemented transfers. It is suited for, but not limited to, implementation in one or more SPV wallets, or on smart cards etc. In accordance with one embodiment, a method, system or resource(s) is provided which enables Alice to transfer an asset to Bob. Bob sends Alice a payment transaction template (template Tx3) and requests: the full transaction data for all input transactions (Tx1, Tx2) comprising at least one output that Alice wants to spend as inputs to a transfer (Tx3); the Merkle path for all input transactions (Tx1, Tx2) linking them to their respective Merkle roots associated with their respective block headers; the completed transfer transaction (Tx3). Alice provides this information plus her signature and optionally a change address. Bob can then perform local SPV checks on the input transactions Tx1, Tx2 using transactions Tx1 and Tx2, their corresponding Merkle paths Path 1, Path 2, and Bob's local list of block headers. Bob broadcasts the transfer transaction (Tx3) to the P2P network.
COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR IMPLEMENTING TRANSFERS OVER A BLOCKCHAIN NETWORK
The invention provides improved verification solutions for blockchain-implemented transfers. It is suited for, but not limited to, implementation in an SPV wallet. In accordance with one embodiment, a method, system or resource is provided in which Bob verifies a Merkle proof for a first transaction and, upon successful verification, submits a second transaction to the blockchain. The second transaction has an input that spends an output (UTXO) from the first transaction. Generally, the invention provides an arrangement in which Bob sends Alice a payment transaction template (template Tx3) and requests: the full transaction data for all input transactions (Tx1, Tx2) comprising at least one output that Alice wants to spend as inputs to a transfer (Tx3); the Merkle path for all input transactions (Tx1, Tx2) linking them to their respective Merkle roots associated with their respective block headers; the completed transfer transaction (Tx3). Alice provides this information plus her signature and optionally a change address. Bob can then perform local SPV checks on the input transactions Tx1, Tx2 using transactions Tx1 and Tx2, their corresponding Merkle paths Path 1, Path 2, and Bob's local list of block headers. Bob broadcasts the transfer transaction (Tx3) to the P2P network.
GLOBAL LIQUIDITY AND SETTLEMENT SYSTEM
A method for performing a token escrow swap on a network of nodes is disclosed. The method includes sending a signed buy order transaction with a first cryptocurrency wallet from a buyer node to a token escrow swap node and filling a buy order of the signed buy order transaction with currency tokens for the token escrow swap node via the buyer node. For each matching sell order, security tokens are transferred to the token escrow swap node via a seller node. The method further includes sending the security tokens to the buyer node and sending the currency tokens to the seller node for each matching sell order.
GLOBAL LIQUIDITY AND SETTLEMENT SYSTEM
A computer-implemented method for performing a digital currency escrow swap on a network of nodes is disclosed. The method includes placing transfer orders through an intermediate node and sending signed transfer order transactions with digital wallets to an escrow swap node. The method further includes performing a transfer-in order finishing operation by requesting a transfer of digital currency to the escrow swap node and receiving the digital currency via the transfer-in node. For each sell order, digital securities are transferred to the escrow swap node via the transfer-out node. The digital securities are sent from the escrow swap node. For each transfer-out order, the digital currency is sent to the transfer-out node. The method includes an analogous operation to finish a transfer-out order.
SELF-ENFORCING SECURITY TOKEN IMPLEMENTING SMART-CONTRACT-BASED COMPLIANCE RULES CONSULTING SMART-CONTRACT-BASED GLOBAL REGISTRY OF INVESTORS
A network node in a peer-to-peer network of nodes includes at least one processor, at least one memory, and at least one network interface. The at least one processor is configured to receive a request to transfer a security token and execute a plurality of compliance rules associated with the security token. At least one of the compliance rules is implemented using at least one smart contract. The at least one smart contract references a global registry. The at least one processor is also configured to transfer the security token based on the execution of the compliance rules. The global registry includes personally identifiable information (PII) hash(es) for each of at least one investor associated with the transfer of the security token. The hashes are committed to the distributed ledger and updated when PII of a respective one of the at least one investor changes.
WATCH SKINS SELECTION APPLICATION WITH BLOCKCHAIN TOKEN
Electronic watch faces can be created in customized and associated with a block chain system. More particularly, the block chain's system uses non-fungible tokens which are in general unique, to represent the ownership of a specific watch face. Users own the token and can display the watch face only while they own the token. After selling the watch face, the token is changed to represent the new owner of the token and the original owner can no longer display the watch face at that point.
METHODS, SYSTEMS, AND DEVICES FOR SECURE CROSS-BORDER PAYMENTS WITH HIGH TRANSACTION THROUGHPUT
Disclosed herein are methods, systems, and devices for providing secure national and/or cross-border payments with high transaction throughput using a hybrid of centralized payment system and cryptographically secure distributed ledger technologies? The system combines the benefits of a centralized system, including the ability to deposit and withdraw fiat currency following bank regulations, “Know Your Customer”/“Know Your Business” (KYC/KYB), “Anti-Money Laundering” (AML), with high security of cryptographically secure distributed ledger technology to solve security issues. A multi-chain structure is used to implement the methods with instant settlement, high security, integrity and scalability.
COIN-MIXING SERVICE ANALYSIS METHOD BASED ON HEURISTIC TRANSACTION ANALYSIS
Disclosed is a coin-mixing service analysis method based on heuristic transaction analysis, including: selecting a target service to be analyzed; firstly, performing security analysis on the target service, and determining whether an API provided thereby contains vulnerability; if the API of the target service contains vulnerability, then obtaining sample transactions directly by means of the API containing the vulnerability; if the API of the target service contains no vulnerability, then obtaining sample transactions by using a small amount of Bitcoin for interaction with the service; using a heuristic transaction analysis method and determination standard to analyze the target service and the sample transaction thereof, and determine a service category to which the target service belongs; and for an obfuscated coin-mixing service, by means of a heuristic method, further using structural defects contained in transactions generated by the coin-mixing service to identify all coin-mixing transactions of the obfuscated coin-mixing service.