G06Q20/38215

COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR IMPLEMENTING TRANSFERS OVER A BLOCKCHAIN NETWORK

The invention provides improved verification solutions for blockchain-implemented transfers. It is suited for, but not limited to, implementation in an SPV wallet. In accordance with one embodiment, a method, system or resource is provided which enables Alice to transfer an asset eg cryptocurrency or token to Bob across a blockchain. Alice stores complete transaction data relating to at least one blockchain transaction; and the complete Merkle path of the at least one blockchain transaction. This enables her to send Bob the full transaction data for all input transactions (eg Tx1, Tx2) comprising at least one output that she wants to spend as inputs to a transfer (eg Tx3); the Merkle path for all input transactions (Tx1, Tx2) linking them to their respective Merkle roots associated with their respective block headers; a transfer transaction (Tx3). Alice also provides her signature. Bob is then able to perform local SPV checks on the input transactions Tx1, Tx2 using transactions Tx1 and Tx2, their corresponding Merkle paths Path 1, Path 2, and his local list of block headers. Bob broadcasts the transfer transaction (Tx3) to the P2P network.

SYSTEMS AND METHODS FOR PROVISIONING CRYPTOGRAPHIC DIGITAL ASSETS FOR BLOCKCHAIN-SECURED RETAIL PRODUCTS
20220188839 · 2022-06-16 · ·

Presented are cryptographic digital assets for retail products, methods for making/using such cryptographic digital assets, and computing systems for generating, intermingling, and exchanging blockchain-protected products. A method for provisioning cryptographic digital assets associated with retail product transfers includes broadcasting notifications of a future transaction of a retail product, and receiving, over a distributed computing network from the computing devices of multiple users, requests to participate in the transaction. A select number of users is added to a virtual line associated with the retail product transaction; from the virtual line, a first user is selected to receive the retail product and a second user is selected to receive a cryptographic digital asset containing a digital retail product and a unique digital asset code. The cryptographic digital asset is transferred to the second user's digital wallet, and the unique digital asset code is recorded on a record block of a blockchain ledger.

ENFORCING SECURITY PARAMETERS SPECIFIED BY AN OWNER ON A BLOCKCHAIN PLATFORM
20220182415 · 2022-06-09 ·

An approach is disclosed on a blockchain platform for one or more intermediaries for receiving an encrypted file from a user for storage on the blockchain platform. Mapping the user to be the owner of the encrypted file. Receiving one or more security policy parameters for the encrypted file from the owner. Enforcing the security policy parameters for all access requests to the file on the blockchain platform. Optionally providing audit report of the encrypted file storage and access. The owner may be established using past read or write transactions. The encrypted file may be divided into two or more parts before sending for storage on the blockchain platform.

SYSTEMS AND METHODS FOR CONTROLLING AN AUTOMATED ELECTRONIC NETWORKED CENTRAL CLEARINGHOUSE FOR NON-FUNGIBLE DIGITAL ASSETS
20220188930 · 2022-06-16 ·

Systems and methods for controlling an automated electronic networked central clearinghouse for clearing and reversing reversible exchanges of digital assets are disclosed. Exemplary implementations may: execute an instance of a game; receive an exchange request that indicates a first user offers a first digital asset for a reversible exchange on a fiat-currency-based online exchange platform; access a decentralized database to obtain asset-specific distribution rights for the first digital asset; generate publication information of the first digital asset for publication on the online exchange platform; receive exchange information regarding the reversible exchange; temporarily transferring the ownership of the first digital asset; determine whether to reverse the reversible exchange, and either (i) transfer the ownership of the first digital asset to the first user, or (ii) clear the reversible exchange by non-temporarily transferring the ownership to the exchanging user, and by distributing benefits in accordance with the asset-specific distribution rights.

Storing information within a zero-knowledge data management network

The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.

Techniques for authenticating and tokenizing real-world items

In embodiments of the present invention, methods are provided for receiving a photograph of, and information relating to, an item, and generating a virtual representation of the item. The item may be authenticated by making an authentication request via a portal to subject-matter authentication experts, wherein the portal displays the virtual representation of the item in the portal. An authentication report may be received from the experts, and a non-fungible digital token having a unique token identifier may be generated. The non-fungible token may be cryptographically linked to the virtual representation of the item on a cryptographic ledger and ownership data of the non-fungible token associated with an account of an owner of the item on the cryptographic ledger.

User interfaces for managing an account

In some embodiments, exemplary user interfaces for provisioning an electronic device with an account are described. In some embodiments, exemplary user interfaces for providing usage information of an account are described. In some embodiments, exemplary user interfaces for providing visual feedback on a representation of an account are described. In some embodiments, exemplary user interfaces for managing the tracking of a category are described. In some embodiments, exemplary user interfaces for managing a transfer of items are described. In some embodiments, exemplary user interfaces for managing an authentication credential connected with an account are described. In some embodiments, exemplary user interfaces for activating a physical account object are described. In some embodiments, exemplary user interfaces for managing balance transfers are described.

SYSTEM AND METHOD FOR UNIFIED MULTI-CHANNEL MESSAGING WITH BLOCK-BASED DATASTORE
20220158968 · 2022-05-19 ·

Aspects of the present disclosure involve systems, methods, devices, and the like for communicating with a unified messaging center using multi-channel messaging with block-based datastore. In one embodiment, a system is introduced that can provide a unified experience and capability for messaging with one or more entities across platforms. The messaging capability includes the ability to provide user interaction using a single architecture with data store in a centralized form. In one embodiment, the data store include the use of blockchain technology wherein each interaction with the user and across platforms is recorded and stored on a crystographed block.

Systems and Methods for Improved Hot Wallet Security
20220164790 · 2022-05-26 ·

Aspects of the disclosure relate to processing cryptocurrency transactions. A computing platform may receive a transaction request. The computing platform may request SEKs from operator devices, and may receive requests to download encrypted SEKs accordingly. The computing platform may send the encrypted SEKs, and may receive corresponding decrypted SEKs from the operator devices in response. The computing platform may decrypt encrypted shares using the SEKs, and may use the decrypted shares to reconstruct a cryptographic signing key. The computing platform may validate the cryptographic signing key, and based on successful validation of the cryptographic signing key, may transfer authorize the requested transaction.

Blockchain-issued verifiable credentials for portable trusted asset claims

A processor may register one or more verifiable asset credential schemas. A verifiable asset credential schema may prescribe the format and content of asserting blockchain-backed asset state. The processor may register an issuer policy for the verifiable asset credentials. The issuer policy may be associated with a schema and intended credential holder(s). The processor may subscribe the asset credential issuer to one or more peers on the blockchain. The processor may issue commit notifications to a subscribing asset credential issuer in the form of schema-compliant committing-peer verifiable credentials. The processor may collect the committing-peer verifiable credentials from one or more peers. The processor may validate the committing-peer verifiable credentials satisfy the security policy and schema for a designated intended credential holder. The processor may issue a schema-compliant verifiable asset credential to the policy-designated credential holder(s).