Patent classifications
G06Q20/3678
TRANSFERRING OWNERSHIP OF PHYSICAL OBJECTS AND DIGITAL COUNTERPARTS USING A DISTRIBUTED LEDGER AND DIGITAL TOKENS ON PHYSICAL OBJECTS
Embodiments provide for managing ownership of physical objects and digital counterparts using a distributed ledger and tokens stored on the physical objects. An example method generally includes reading, via a wireless data connection between a physical object and a mobile device, a token stored on the physical object. The token may include at least a unique identifier of the physical object. A request to transfer ownership of the physical object to an owner of the mobile device is generated, and the request may include at least the unique identifier of the physical object. The generated request is transmitted to a distributed ledger system, and a response is received from the distributed ledger system indicating whether the transfer was successful. The indication of whether the transfer was successful is displayed on the mobile device.
ELECTRONIC ESCROW SYSTEM
The invention relates to an escrow system that can be between any number of parties to sell and purchase goods or services or online downloads. The system utilizes secure one-time passwords to verify that all parties have completed the terms of the contract.
System to enable utilization and movement of digital assets without access to the private key for enabling complex operations
A system to enable change in state and/or configuration of digital assets without access to the private key for enabling complex operations includes one or more user computer based device and one or more server computer based device having an operably associated digital asset custody layer application engine, rules basket, protocol adapter and MPC/Self-Custody integration enabling complex actions or transaction to occur between user computer based device and server without surrendering private digital key access to a particular entity or individual.
Advanced Security System for Implementation in an Internet of Things (IOT) Blockchain Network
Methods and systems for use in a IOT blockchain network are presented. An exemplary method comprises providing a transactional digital facilitator, wherein the transactional digital facilitator establishes rules for a computing operation initiated by a device in the blockchain IOT network, wherein the device is associated with an identifier; tracking, using the identifier associated with the device, a computing operation initiated by the device in the blockchain IOT network; analyzing the computing operation; determining the computing operation is an approved or unapproved computing operation; and in response to determining the computing operation is the unapproved computing operation, performing a first exchange associated with an account or container associated with the device, wherein the first exchange causes a first state to be assigned to the device or maintained for the device.
METHOD AND SYSTEM FOR COMMUNICATION BETWEEN BLOCKCHAINS ON HETEROGENEOUS BLOCKCHAIN NETWORKS
A system for communicating between blockchains on heterogeneous blockchain networks. The system can include a sending blockchain configured to transmit a first message via a sending blockchain protocol, wherein the sending blockchain forms a part of a sending blockchain network. The system can include a sending adapter node configured to receive the first message from the sending blockchain and translate the first message from the sending blockchain protocol to an adapter protocol. The system can include a receiving adapter node configured to receive the first message from the sending adapter node and translate the first message from the adapter protocol to a receiving blockchain protocol. The system can include a receiving blockchain configured to receive the first message from the receiving adapter node, and validate the first message, wherein the receiving blockchain forms a part of a receiving blockchain network.
METHOD AND SYSTEM FOR CRYPTOCURRENCY MINING CENTER
A cryptocurrency mining system and a cryptocurrency mining method are provided. The system includes a plurality of mining modules. Each mining module includes: a plurality of AntBoxes, each AntBox being a computational unit that houses a plurality of miners for cryptocurrency farming; a transformer configured to convert an input voltage to a working voltage to supply electric power to the plurality of AntBoxes; and a switchgear and a plurality of panelboards configured to connect the AntBoxes with the transformer. The plurality of mining modules has substantially same structure arrangement. The structure arrangement includes: configurations of the AntBoxes, the transformer, the switchgear, and the panelboards, and relative locations among the AntBoxes, the transformer, the switchgear, and the panelboards.
METHOD AND SYSTEM FOR CRYPTOCURRENCY MINING CENTER
A cryptocurrency mining method and a cryptocurrency mining controller device are provided. The method includes: obtaining electricity price information and cryptocurrency price information; determining operation control parameters of the cryptocurrency mining system according to the electricity price information and the cryptocurrency price information; and controlling an operation of a target group of cryptocurrency miners according to the operation control parameters. The operation includes switching between operation states, and the operation states includes at least a running state and an off state.
System and Method of Providing and Recording Context-Specific Advice in the Form of an Artificial Intelligence View of a Hierarchical Portfolio
In an intelligent system for providing and recording personalized context-specific financial advice, a method may comprise receiving, from a client device, a request for advice regarding a hierarchical portfolio of assets owned by an investor. The method may further comprise generating, based on the output of a neural network machine learning model, artificial intelligence suggestions for changing the hierarchical portfolio, assembling the AI suggestions and suggestion locations into an actionable artificial intelligence view of the hierarchical portfolio, and transmitting the AI view to the client device. The method may further comprise making a cryptocurrency payment related to service fees associated with the AI view via a blockchain network. The method may further comprise submitting placed transactions associated with the AI suggestions to an electronic trading platform, generating a revised hierarchical portfolio, and recording the AI view on a blockchain, thereby establishing or maintaining a portable financial record for the investor.
ACCOUNT OWNER FUNDING OF KNOW YOUR CUSTOMER AND ACCREDITED INVESTOR VERIFICATION RENEWAL AND MONITORING CHARGES THROUGH COIN PAYMENT
A computerized method includes receiving payment of an amount of cryptocurrency from a transaction account to another account. The computerized method also includes, when the payment of the amount of cryptocurrency is received at the another account from the transaction account, causing at least one of KYC, AML, and accredited investor review to be performed for an owner of the account. The computerized method also includes, when the at least one of the KYC, AML, and accredited investor review causes a status of the owner of the account to change, at least one of adding or removing at least one indication of the owner's status to a distributed ledger.
Cryptographically assured zero-knowledge cloud service for composable atomic transactions
A trusted network based service running on a server, for example as a cloud server, includes receiving a request from a first user device and a second user device. The request includes one or more inputs to perform a transaction. Based upon the request, selecting one or more computational resources from a set of a plurality of computational resources using zero-knowledge verifiable computing. In response to receiving authorization from each of the computational resources that they are capable of performing the zero-knowledge verifiable computing transactions to carry out at least a portion of the request, executing the program using zero-knowledge verifiable computing to carry out the request using a zero-knowledge protocol to ensure privacy of the first user device and the second user device. Sending to the first user device and the second user device an output of the request.