G06Q20/38215

TRANSACTION AUDIT SYSTEM

Provided is a transaction audit system that ensures authenticity of data and allows performing an audit work in a short period at low cost. The transaction audit system of this disclosure includes a terminal that constitute a blockchain server, a database that stores master data including automated deployment rule data, and an audit engine. First transaction data is input to the audit engine by the terminal, the audit engine refers to the master data to generate second transaction data, and the first and the second transaction data are each decomposed into a data item and a value of the data item to generate first table information. The data item includes at least a data model name, a version number, an application name, a user name, and an operation date and time. A block for a blockchain is generated based on the first table information and recorded in the blockchain database by the terminal.

COMPUTER SYSTEM FOR HANDLING SECURITIZED TOKEN AND VOTING CONTRACTS AND DISTRIBUTION AND VOTING TRANSACTIONS

Methods and systems are provided for efficient distribution of digital assets according to a token contract defined by a rule set governing token ownership, transactions, and entitlements. A token contract audit system analyzes a ledger from a token contract to determine a balance for each of a plurality of users for the contract. A token distribution contract management system generates a distribution contract and publishes the contract to a distributed blockchain system to allow a subset of the plurality of users of the token contract to interact with the distribution contract.

TOKEN STATE SYNCHRONIZATION

Techniques for managing an application token may include providing, by a first service provider application on a communication device to a first service provider computer, a first request for a first application token, receiving, by an account management application on the communication device from a token service computer in communication with the first service provider computer, the first application token, and storing the first application token in a token container in the account management application.

Cryptobionic system and associated devices and methods
11108769 · 2021-08-31 · ·

Introduced here are cryptobionic implants designed for implantation within a human body that are capable of facilitating an identity authentication and/or an intent validation process. These cryptobionic implants can be designed to be cryptographically secure. For example, a cryptobionic implant may include a processor configured to encrypt data residing in an internal storage and a transponder configured to transmit the encrypted data to a reader device located outside of the human body for decryption. The reader device (or some other electronic device) may be able to verify the identity of the individual in whom the cryptobionic implant is implanted based on the decrypted data.

METHOD AND APPARATUS FOR PROCESSING RESOURCE OF BLOCK CHAIN, DEVICE AND MEDIUM
20210264417 · 2021-08-26 ·

A method for processing a resource of a block chain may include: issuing a stake certificate in a block chain based on a set stake certificate issuing mechanism, allocating the stake certificate to a stake account according to a stake proportion, and storing operation data of the issuing and allocating the stake certificate into the block chain, the stake account referring to a block chain account; issuing a circulation resource in the block chain based on a set circulation resource issuing mechanism, allocating the circulation resource to the block chain account according to a circulation resource allocation strategy, and storing the operations of the issuing and allocating the circulation resource into the block chain; and ascertaining, during operation of the block chain, a block-producing node according to a delegated proof of stake consensus algorithm, by using the stake certificate of each stake account as a consensus certificate.

Performing Authenticated Actions Without Internet Connectivity

Disclosed are various embodiments for performing authenticated actions when Internet connectivity is not available. An application executed in a first computing device determines that an authenticated action is requested to be performed. The application determines that Internet connectivity is unavailable to the first computing device. The application initiates the authenticated action using a communication channel that connects the first computing device to a second computing device. The Internet is inaccessible through the communication channel.

AUTOMATIC RENEWAL OF A VERIFIABLE CLAIM

Updating a verifiable claim so that a duration of the verifiable claim can be modified without direct user input. A plurality of verifiable claims that have previously been issued to a user are accessed by a computing system. The plurality of verifiable claims include duration metadata that defines a duration of each of the plurality of verifiable claims. The duration metadata of each of the plurality of verifiable claims is monitored to determine those of the plurality of verifiable claims that are set to expire based on the defined duration. For those verifiable claims that are set to expire, a request is made to a party that issued each verifiable claim for update information that is configured to modify the duration of each verifiable claim. In response to receiving the update information, the duration of each verifiable claim is automatically updated without the need for any direct user input.

AUTOMATIC BARGAINING METHOD AND RELATED DEVICE BASED ON SMART CONTRACT AND SECURE MULTI-PARTY COMPUTATION

Disclosed is a smart contract and an automatic bargaining method for secure multi-party computation and a device embodies same. A first public key and a first private key are generated based on a homomorphic encryption algorithm in the smart contract, the first public key is sent to a demander and a supplier so that the demander and the supplier encrypt the purchase price and the sale price through the first public key, respectively; after receiving a second public key and an encrypted purchase price sent by the demander and a third public key and an encrypted sale price sent by the supplier, the encrypted sale price and the encrypted purchase price that meet the preset transaction conditions are decrypted.

Network of computing nodes and a method of operating the computing nodes to effectuate real-time bank account-to-bank account money transfer

A network of computing nodes and a method of operating the computing nodes effectuate, in real-time, an international, money transfer from the bank account of a first person (the payer) in a first country to the bank account of a second person (the beneficiary) in a second, different, country.

METHOD AND APPARATUS OF PROCESSING DEPOSIT, AND STORAGE MEDIUM
20210272108 · 2021-09-02 ·

The embodiments of the disclosure provide a method of processing deposit, an apparatus of processing deposit, and a storage medium. The method includes: receiving a data deposit transaction request initiated by a deposit requester based on deposit data, a credible timestamp of the deposit data obtained in advance and a digital signature of a timestamp provider that provides the credible timestamp, wherein the credible timestamp is obtained by the timestamp provider from a timestamp server of the deposit requester; and determining that the credible timestamp of the deposit data is valid when the digital signature matches the deposit data, executing the data deposit transaction request, and storing the deposit data and the credible timestamp of the deposit data in a block-chain network.