Patent classifications
G06F16/1837
Sharing information between nexuses that use different classification schemes for information access control
Systems and methods for sharing information between distributed computer systems connected to one or more data networks. In particular, a replication system implements methodologies for sharing database information between computer systems where the databases use different classification schemes for information access control.
System and method for document transformation and accountability
A system and method for document transformation and recordation is provided. Documents for a transaction of real property are identified based on a jurisdiction in which the real property is located. Each document includes a plurality of data fields and each data field is associated with a data field identifier. A data value is received in at least one of the data fields of one or more of the documents. The data fields in the documents associated with the data field identifiers that match the data field identifiers of the data fields in which the data values are received are identified. The identified data fields are automatically populated with the data values based on the data field identifiers associated with the data values. A completeness rule is applied to the documents by verifying whether all required documents for completing the transaction in the jurisdiction are satisfied by the documents.
DISTRIBUTED LEDGER SYSTEMS AND METHODS FOR IMPORTING, ACCESSING, VERIFYING, AND COMPARING DOCUMENTS
Some implementations of the disclosure are directed to a method, comprising: retrieving, using a device associated with an entity, a document from a system of record; uploading the document for storage in an off-chain system accessible by entities having access to a distributed ledger of a distributed ledger network, the entities comprising the entity; hashing, using the device, one or more fields contained in the document to generate a hash representing a unique reference to the document; generating, using the device, a message comprising a plurality of fields contained in the document and the hash; digitally signing, by the device, using a private key associated with the entity, the message to endorse the hash and the fields contained in the document; and after digitally signing the message, transmitting, by the device, the message to the distributed ledger network to store the hash and the fields in the distributed ledger.
Blockchain implementing reliability database
An example operation may include one or more of receiving a request for trust information of an off-chain data source from a client, determining a category type of the off-chain data source from among a plurality of category types based on the request, retrieving a reliability value of the off-chain data source linked to one or more of an identity of the off-chain data source and the determined category type from a reliability database implemented via a distributed ledger shared among a plurality of peer nodes, and transmitting the retrieved reliability value linked to the category type to the client.
DAMPENING TOKEN ALLOCATIONS BASED ON NON-ORGANIC SUBSCRIBER BEHAVIORS
Described processes include: determining portions of instances of a cryptographic token to be allocated to record providers, like providers of an asset indicated by a record, wherein: the portions are determined based on network effects associated with the records the record provider supplied on performance of a computer-implemented network in which both record providers and record consumers participate, patterns indicative of inorganic consumption may be determined from one or more of interactions of individual consumers, interactions of collections of consumers, or consumer interactions in the aggregate for a given provider or record; and the effects on network performance are adjusted responsive to designation of one or more entities as exhibiting inauthentic behavior; and appending to a distributed ledger, records indicating the respective portions, and adjustments, are allocated to record providers.
Computer-implemented system and method for determining the state of a machine executable contract implemented using a blockchain
Computer-implemented systems and methods are detailed for establishing information on states of a machine executable contract, for instance in the context of unspent transactions (UTXOs), blockchain and deterministic finite automaton (DFA) implementation of contracts and the determination of states within those. The stages can include determining the information of interest and the codes or tags identifying that information, constructing the metadata associated with those codes or tags, combining that with a public key for an agent that will be associated with the information. The scriptPubKey values of each script may be used to provide the keys for use in constructing an external database and more specifically mapping the keys from the scriptPubKey values, linked to the information of interest. To obtain the other half of the combination, there is a derivation of the script hash addresses from the scriptPubKey values, with those being used to populate a digital wallet. A search and match algorithm is then used to find UTXO's with matching script hash addresses on the blockchain. These then populate the aforementioned database with UTXO's that match to the script hash addresses and hence to the keys to complete the combinations. A match indicates in a definitive manner the state.
SYSTEM AND METHOD FOR INFORMATION STORAGE USING BLOCKCHAIN DATABASES COMBINED WITH POINTER DATABASES
A system and method for information storage using blockchain and pointer databases, comprising a computer with a blockchain manager and datastore manager, and blockchain data input, which connects over a network to a distributed blockchain ledger containing information such as personally-identifying data and a datastore system containing searchable information such as a DNS system on the persons entered into the blockchain, the datastore system also containing reference numbers for each searchable block in the blockchain, such that verification or identification can both be accomplished swiftly and securely of data in the blockchain such as for data verification to verify or identify persons submitting data to such a system.
Validating received sensor data using computer cryptographic processing
Media capture and verification originally-captured media files, the nature of modifications made to captured media files, and the authenticity of various versions of files related to the captured media are discussed. A computer identifies capture device output that represents an aspect of a recorded event. The computer cryptographically processes the capture device output to produce a validatable master file which includes master media data from the capture device output, master metadata of said master media data, and master file blockchain data. The master file blockchain data includes a master file block history portion, a master file signature key portion, a master file change indication portion, and a master file signed data hash portion. The computer also modifies the master media data to produce reference file media data. reference files and distributable files. The computer verifies the authenticity of each of these files.
System and method for document transformation and compliance
A system and method for document transformation and compliance are provided. Document templates are maintained and each template includes data fields each associated with a data field identifier. Data values are received in one or more of the data fields of at least one document template. The data values are associated with the data fields into which the data values are received via the data field identifiers for those data fields. A property address is received and a set of compliance rules is identified. A subset of the document templates are retrieved as active documents for a transaction of the property based on the identified rules. The active documents are populated with those data fields that are associated with the linked data values via the data field identifiers. Compliance checking of the populated data values in the active documents is performed using a compliance rule set.
Searchable and secure decentralized P2P filesystem
A first user saving a file f is detected. The file f is intercepted. A filename and one or more text strings entered as searchable metadata are also intercepted. An identifier id(f) is generated for the file f. The filename, the one or more text strings, and id(f) are stored together on a content address server. A symmetric encryption key KF is generated. File f is divided into n segments. An identifier id(s.sub.i) is generated for each segment s.sub.i. Each s.sub.i is encrypted using KF, producing n encrypted segments es.sub.i=ES.sub.KF(S.sub.i). Each es.sub.i is stored with its id(s.sub.i) on a peer device. For each es.sub.i, id(s.sub.i) is stored on the content address server with id(f). A public key KU2 of a second user is retrieved, KF is encrypted with KU2, producing wrapped key KW2 EA.sub.KU2(KF), and KW2 is stored on the content address server with id(f).