G06Q20/38215

COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR IMPLEMENTING TRANSFERS OVER A BLOCKCHAIN NETWORK

The invention provides improved Simplified Payment Verification (SPV) solutions for blockchain-implemented transfers. It is suited for, but not limited to, implementation in one or more SPV wallets, or on smart cards etc. In accordance with one embodiment, a method, system or resource(s) is provided which enables Alice to transfer an asset to Bob. Bob sends Alice a payment transaction template (template Tx3) and requests: the full transaction data for all input transactions (Tx1, Tx2) comprising at least one output that Alice wants to spend as inputs to a transfer (Tx3); the Merkle path for all input transactions (Tx1, Tx2) linking them to their respective Merkle roots associated with their respective block headers; the completed transfer transaction (Tx3). Alice provides this information plus her signature and optionally a change address. Bob can then perform local SPV checks on the input transactions Tx1, Tx2 using transactions Tx1 and Tx2, their corresponding Merkle paths Path 1, Path 2, and Bob's local list of block headers. Bob broadcasts the transfer transaction (Tx3) to the P2P network.

COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR IMPLEMENTING TRANSFERS OVER A BLOCKCHAIN NETWORK

The invention provides improved verification solutions for blockchain-implemented transfers. It is suited for, but not limited to, implementation in an SPV wallet. In accordance with one embodiment, a method, system or resource is provided in which Bob verifies a Merkle proof for a first transaction and, upon successful verification, submits a second transaction to the blockchain. The second transaction has an input that spends an output (UTXO) from the first transaction. Generally, the invention provides an arrangement in which Bob sends Alice a payment transaction template (template Tx3) and requests: the full transaction data for all input transactions (Tx1, Tx2) comprising at least one output that Alice wants to spend as inputs to a transfer (Tx3); the Merkle path for all input transactions (Tx1, Tx2) linking them to their respective Merkle roots associated with their respective block headers; the completed transfer transaction (Tx3). Alice provides this information plus her signature and optionally a change address. Bob can then perform local SPV checks on the input transactions Tx1, Tx2 using transactions Tx1 and Tx2, their corresponding Merkle paths Path 1, Path 2, and Bob's local list of block headers. Bob broadcasts the transfer transaction (Tx3) to the P2P network.

Digital certificate management method, apparatus, and system
11290287 · 2022-03-29 · ·

Techniques for providing a digital certificate management for blockchain technologies are described. One example method includes a transaction request including a digital certificate is received from a certificate authority at a node in a blockchain network, and the transaction request is a request to write the digital certificate into a blockchain associated with the blockchain network, and the digital certificate is issued to a node in the blockchain network. A consensus verification result is determined for the transaction request, and the consensus verification result is produced by nodes in the blockchain network. The consensus verification result is compared to a predetermined threshold value. In response to determining the consensus verification result is greater than or equal to the predetermined threshold value, the digital certificate is stored in the blockchain associated with the blockchain network.

Transaction Assignment Method and Apparatus Based on Structured Directed Acyclic Graph
20220101318 · 2022-03-31 · ·

Transaction assignment method and apparatus based on a structured directed acyclic graph (DAG) executed by node devices in a peer-to-peer network are provided including: obtaining data structure of a local database; calculating relative hashing power of each node device by connection information between blocks in the structured DAG; partitioning transactions in the local transaction pool according to the relative hashing power of each node device; based on partitioning result, selecting a first transaction, creating a first new block, establishing connection(s) between the first new block and other blocks in the structured DAG, and removing the first transaction from the local transaction pool; broadcasting the first new block to other node devices in the peer-to-peer network. The invention effectively eliminates waste of hashing power caused by processing transactions with high fees by multiple nodes and increases the chance of processing transactions with low or no fees without sacrificing security and decentralization.

METHOD IN BLOCKCHAIN SYSTEMS FOR FAST STABILIZATION AND INCREASED RESPONSIVENESS
20220108313 · 2022-04-07 ·

The present invention provides a computer implemented method in a blockchain system, wherein said method comprising: plurality of anchors, wherein said anchors includes a bitstring comprising (i) hash of a block in a main chain, and (ii) a Proof Of Work (PoW). The plurality of anchors generated, propagated and thereby accepted by plurality of peer nodes in a network on said blockchain system so as to increase the responsiveness and stability of a blockchain.

METHODS, SYSTEMS, AND DEVICES FOR SECURE CROSS-BORDER PAYMENTS WITH HIGH TRANSACTION THROUGHPUT
20220108312 · 2022-04-07 ·

Disclosed herein are methods, systems, and devices for providing secure national and/or cross-border payments with high transaction throughput using a hybrid of centralized payment system and cryptographically secure distributed ledger technologies? The system combines the benefits of a centralized system, including the ability to deposit and withdraw fiat currency following bank regulations, “Know Your Customer”/“Know Your Business” (KYC/KYB), “Anti-Money Laundering” (AML), with high security of cryptographically secure distributed ledger technology to solve security issues. A multi-chain structure is used to implement the methods with instant settlement, high security, integrity and scalability.

USER INTERFACES FOR MANAGING AN ACCOUNT

In some embodiments, exemplary user interfaces for provisioning an electronic device with an account are described. In some embodiments, exemplary user interfaces for providing usage information of an account are described. In some embodiments, exemplary user interfaces for providing visual feedback on a representation of an account are described. In some embodiments, exemplary user interfaces for managing the tracking of a category are described. In some embodiments, exemplary user interfaces for managing a transfer of items are described. In some embodiments, exemplary user interfaces for managing an authentication credential connected with an account are described. In some embodiments, exemplary user interfaces for activating a physical account object are described. In some embodiments, exemplary user interfaces for managing balance transfers are described.

Temporarily provisioning functionality in a multi-device point-of-sale system

Temporarily provisioning functionality to a personal device in a multi-device point-of-sale (POS) system is described. In an example, a personal device can be determined to be within a range of a POS system of a merchant. The POS system can include a merchant-facing device and a customer-facing device that is coupled to the merchant-facing device. Functionality can be provisioned to the personal device that (i) configures the personal device to present a customer user interface (UI) via a display of the personal device to enable a customer operating the personal device to interact with the merchant and (ii) enables the personal device to interact with at least one of the merchant-facing device or the customer-facing device. Responsive to determining an occurrence of an event, the functionality can be de-provisioned from the personal device.

Secure visual transactions for mobile devices

In one embodiment, an apparatus comprises a display interface to communicate with a display device and a processor. The processor is to: identify a mobile transaction associated with a user, wherein the mobile transaction comprises a potential transaction to be completed using a mobile device of the user; access transaction data associated with the mobile transaction; encrypt the transaction data based on an encryption key associated with the user; generate a visual code associated with the encrypted transaction data, wherein the visual code comprises visually encoded data, and wherein the visual code is generated within a protected execution environment of the processor; establish a protected datapath between the processor and the display device via the display interface; and transmit the visual code to the display device via the protected datapath, wherein the visual code is to be displayed on the display device.

Systems and methods for preserving privacy and incentivizing third-party data sharing

Methods and systems relating incentivizing a data provider to participate in a match making protocol between a business (second entity) to a user (first entity) are shown. Encryption techniques maintain the secrecy of the data providers data such as proprietary analytics of user information such that the data is need not be shared with users or businesses. Businesses can verify that the user has desired properties without learning the actual raw data owned by the data provider. Users initiate data sharing by explicit request but do not learn the actual raw data known to the data provider, only whether or not they satisfy the properties of interest. The data provider is incentivized because the business compensates the data provider for access to proofs of properties about user data.