G06Q20/38215

INFORMATION SHARING METHODS AND SYSTEMS

Examples in this application disclose information sharing methods, media, and systems. One example computer-implemented method includes receiving, by a trusted execution environment (TEE), a first sharing request from a first institution and a second sharing request from a second institution, where the first sharing request comprises a user identity of a first user and first anti-money laundering (AML) risk information and the second sharing request comprises a user identity of a second user and second AML risk information, comparing the user identity of the first user with the user identity of the second user, in response to that the user identity of the first user is the same as the user identity of the second user, combining the first AML risk information and the second AML risk information, and sending the combined first AML risk information and second AML risk information to the first institution and the second institution.

MANAGING TRANSACTIONS IN MULTIPLE BLOCKCHAIN NETWORKS

Disclosed are computer-implemented methods, non-transitory computer-readable media, and systems for managing transactions in blockchain networks. One computer-implemented method includes identifying a first Hash Time Locked Contract (HTLC) transaction in a first blockchain network that is associated with a second HTLC transaction in a second blockchain network different from the first blockchain network, identifying a third HTLC transaction in the second blockchain network that is associated with the second HTLC transaction, identifying a fourth HTLC transaction in the first blockchain network that is associated with the first, second, and third HTLC transactions, the first, second, third, and fourth HTLC transactions being related to a cross-chain transaction across the first and second blockchain networks, and deriving hidden information of the cross-chain transaction from information of the first, second, third, and fourth HTLC transactions based on associations of the first, second, third and fourth HTLC transactions.

INTELLIGENT ASSERTION TOKENS FOR AUTHENTICATING AND CONTROLLING NETWORK COMMUNICATIONS USING A DISTRIBUTED LEDGER

A method for generating and controlling intelligent assertion tokens includes generating a first assertion token, during a first step of a supply chain process. The first assertion token is inspected to determine validity. If the first assertion token is not valid, the receipt of the first assertion token is rejected. If the first assertion token is determined to be valid, the use of the first assertion token in further transmissions and/or transactions is authorized. The first assertion token can be passed to a second step of the supply chain process, and a second assertion token may be generated based on the first assertion token. Upon receipt of the second assertion token, it is inspected to determine validity. If not valid, the transmission and/or transfer of the second assertion token is rejected. If valid, the transmission and/or transfer of the second assertion token to a further step of the supply chain process or to a customer is authorized.

PROOF AGGREGATING SYSTEM FOR ASSET MANAGEMENT TRACEABILITY BASED ON BLOCKCHAIN AND METHOD THEREOF
20210326326 · 2021-10-21 ·

A proof aggregating system for asset management traceability based on blockchain and a method thereof are disclosed. In the system, a creator host deploys a smart contract associated with an asset on a blockchain network through, so as to aggregate a proof value of digital file associated with the asset for further verification and management; a holder host executes an authorization function to set a writer host to be permitted to access the smart contract, the writer host calculates a proof value based on the digital file associated with the asset, and executes a write function to write the proof value into a proof record of the smart contract, so as to provide a verification host to verify the aggregated proof record. As a result, the technical effect of improving authenticity and credibility of the asset management traceability can be achieved.

PROOF OF WORK BASED ON COMPRESSED VIDEO

An approach is provided that transmits a compressed video file and a work unit to various clients, receiving, from at least one of the clients. A proof of work submission is received from one of the clients with the proof of work being a result of one or more computations performed by the client on a rendered form of the compressed video file. The approach determines whether the proof of work submission is acceptable. If the proof of work submission is acceptable, then a block is added to a set of blocks included in a blockchain.

Method for providing payment service and electronic device therefor

Various examples of the present invention relate to a device and a method for providing a mobile payment service and a membership management service in an electronic device, wherein the electronic device comprises a touch screen and a processor configured to control the touch screen, and wherein the processor can control the touch screen such that: a first screen corresponding to at least one electronic card is displayed, when a touch input for at least a partial region of the touch screen is detected, and a second screen corresponding to the membership management service is displayed in at least a partial region of the first screen, when a touch input for a membership management service icon included in the partial region of the first screen is detected. Other examples are possible.

Methods for generating and validating gaming machine subscription keys and securing subscription parameter data and jurisdiction files

Generating and validating a subscription key based on subscription parameters associated with a jurisdiction file stored in a NVRAM, the subscription key having characters based on a subscription start date, a subscription term, a key generation date, and a cyclical redundancy check value. Parameters are extracted from the subscription key including the subscription start date, the subscription term, the key generation date, and the cyclical redundancy check value and are stored in a memory of the gaming machine. The key is checked by generating a local cyclical redundancy check value based on a MAC address of the gaming machine and one or more of the extracted parameters, and is validated when the local cyclical redundancy check value matches the cyclical redundancy check value extracted from the subscription key. The jurisdiction file may be updated during a RAM clear function during installation of the gaming machine.

Systems and methods for data certificate notarization utilizing bridging from private blockchain to public blockchain

One embodiment disclosed relates to a system for managing data for logistics, sourcing and/or production. The system includes: a private blockchain maintained by a first network of nodes; a trusted public blockchain maintained by a second network of nodes; a private agent system; and a bridge system connected to both the private blockchain and the public blockchain. The private agent system operates to extract blocks of metadata from the private blockchain and utilize a hash tree structure to generate a first root hash value from the blocks of metadata. The bridge system operates to verify the first root hash value and store the first root hash value as a notarized data certificate in the trusted public blockchain. Another embodiment disclosed relates to a method for data certificate notarization utilizing a bridging system from a private blockchain to a trusted public blockchain. Other embodiments and features are also disclosed.

Blockchain-based remittance method and apparatus

One or more embodiments of the present specification provide blockchain-based remittance methods and apparatuses. One method comprising: receiving, from an account of a remitter, a transaction for a remittance to an account of a remittee, wherein the transaction comprises a remittance amount of the remittance and at least one reserved amount corresponding to the remittance amount allocated by the remitter from a reserve fund list to the transaction; performing verification of the transaction, wherein the verification comprises determining whether a total amount of the at least one reserved amount comprised in the transaction is greater than or equal to the remittance amount; and in response to determining that the verification is successful: deducting the remittance amount from the balance of the account of the remitter, and adding the remittance amount to a balance of the account of the remittee.

TOKENIZATION PLATFORM

In embodiments of the present invention, methods are provided for receiving a request to collateralize a collateral item of a user seeking a loan, along with information and a photograph of the collateral item. A processing system may generate a virtual representation of the collateral item based on the information and photograph and generate a digital token based on the virtual representation. Ownership of the digital token may be assigned to the user seeking the loan and an instance of a smart contract governing the loan may be generated and deployed, the instance of the smart contract indicating an amount to be paid back by the user to the lender and one or more conditions that cause ownership of the digital token to be transferred to the lender.