Patent classifications
G06Q20/3678
Method for granting access to a communications network in exchange for performing tasks associated with the communications network
Token exchange systems, methods and apparatus are disclosed that allow a user to get access to a wired, wireless, or virtual network or the like by earning tokens to be used for said access, in which the user may earn tokens by making purchases or completing tasks in a token exchange system. In an exemplary embodiment, the user connects to a network, interacts with the network in order to earn tokens by making purchases through said network or completing tasks assigned by said network, and exchanges tokens for access time, whereby said user will be connected to the network or the internet for an amount of time commensurate with the amount of tokens exchanged for the access time.
METHOD AND DEVICE FOR OPERATING A DISTRIBUTED APPLICATION
A method for operating an application distributed between a first system, a second system, and a third system on a transaction channel shared by the systems. In the method, the third system consents to a state transition of the application under particular conditions, the first system and the second system initiate by mutual agreement the state transition via the transaction channel, and the application carries out the state transition automatically if the conditions are present.
HIGHLY SCALABLE PERMISSIONED BLOCK CHAINS
Technologies are shown for function level permissions control for smart contract execution to implement permissions policy on a blockchain. Permissions control rules control function calls at a system level utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for a smart contract. The permissions control rules are applied to the call stack to implement permissions control policy. Permissions control rules can use dynamic state data in the function call chain. If the dynamic state data observed in function call chains does not meet the requirements defined in the permissions control rules, then the function call can be blocked from executing or completing execution. The permissions control rules can be generated for a variety of different entities, such as a domain, user or resource.
SYSTEM AND METHOD FOR IMPLEMENTING DISTRIBUTED MULTIPLE BLOCKCHAIN BASED DIGITAL INDEX TOKEN / UTILITY SMART CONTRACT ON A BLOCKCHAIN AND DISTRIBUTED/ALLOCATION ON MULTIPLE BLOCKCHAIN NETWORKS
A method, architecture, and blockchain-enabled system for implementing blockchain-based index token as a digital asset within the Decentralized Finance industry using a parameterized public smart contract on one blockchain and distributed on multiple using an autonomous algorithmic network implemented the program, updated real-time to Index smart contract and set index ratio/distribution of multiple digital assets/blockchains from oracle blockchain real-time using circulating supply, network activity, weightage, and valuation. The mesh network service program allows interested parties to do a transaction on Index token and allocate Index token as synthetic transaction recorded real-time into respective blockchain network based on collating distribution ratio comprising Index smart contract at the time of transaction submitted, a network program that is embodied as program code integrated with blockchain-based services/application that is stored and synchronized by the respective smart contract logic, the network program defining permissible network defined digital asset types and corresponding functions.
Methods for User Authentication using Non-Fungible Digital Assets
The present disclosure involves a method for grouping non-fungible digital tokens. The method includes generating a first transaction on a blockchain having an output of a fungible digital token, with the fungible digital token having a first transaction hash identifier. The method further includes assigning the first transaction hash identifier associated with the fungible digital token with a cryptographic public key, and generating a second transaction on the blockchain having an output of a non-fungible digital token and an input. The fungible digital token is spent as the input into the second transaction, with the non-fungible digital token comprising a second transaction hash identifier and a group identifier associated with the first transaction hash identifier.
METHODS AND SYSTEMS FOR ETHICAL CRYPTOCURRENCY MANAGEMENT
Some embodiments are directed to methods and systems for a cause-based eco-system that includes a platform supporting cryptocurrency transactions between users and organizations, the embedding of ethical constraints in the cryptocurrency as part of the transactions, and a marketplace to facilitate and manage the transactions. The eco-system also includes a lending and investment marketplace platform that allows users to invest in ethically or socially conscious organizations, and to borrow/lend against those investments.
METHOD AND SYSTEM FOR PAYMENT FOR CENTRAL BANK DIGITAL CURRENCY
Payment methods and systems for processing a payment using a Central Bank Digital Currency (CBDC) without a double payment in an offline situation (e.g., in a situation in which a terminal of a user is unable to be connected) to a server through a network may be provided.
BitMint*LeVeL: Decentralized Mathematics Digital Coin * Quantum Safe, Robust Anonymity
Extracting the beneficial elements from Bitcoin, discarding the negative aspects of this ground breaking currency, BitMint*LeVeL replaces the single public/private key formula with coin-owner selected surprise formulas to shift security responsibility to the trader, and create a quantum safe currency with robust anonymity while maintaining a smooth extension of legacy currency, and relying on a community of mints (an InterMint) to keep the community in control.
Systems and methods for selling virtual items on multiple online sales platforms simultaneously, the virtual items being useable within an online game
Systems and methods for selling virtual items on multiple online sales platforms simultaneously are disclosed. Exemplary implementations may: receive a sales request that indicates the selling user will be offering for sale a particular virtual item through at least two online sales platforms simultaneously; assign ownership of the particular virtual item temporarily to a holding account; generate sales listings of the particular virtual item for publications on the at least two online sales platforms; effectuate the publications of the sales listings; receive indications of offers to purchase the particular virtual item; determine an accepted offer that is accepted; notify the at least two online sales platforms of whether the offers have been accepted or denied; identify a buyer's account of the buying user; effectuate assignment of the ownership of the particular virtual item to the buyer's account.
SYSTEM AND METHOD OF PERFORMING SECURED TRANSACTIONS IN A COMMUNICATION NETWORK
A system and a method of data communication between a first computing device, associated with a first user, and at least one second computing device associated with a second user may include: receiving, by the first computing device, one or more data elements pertaining to details of a transaction request from the second computing device, via a voice channel; extracting said transaction request details by the first computing device; transmitting, by the first computing device, one or more authentication data elements of an electronic wallet module, comprised in the first computing device, to the second computing device, via the voice channel; and carrying out the requested transaction by the first computing device, based on the extracted transaction request details and the electronic wallet authentication data.