H04L9/06

Management of virtual goods in a blockchain-ledger based gaming architecture
11557174 · 2023-01-17 · ·

Various embodiments provide management of virtual goods. In some embodiments, a gaming platform can be used to provide a secure ledger system for recording money transfer, play action, bets, analytics, gaming statistics, and the like, which are associated with virtual goods. Non-limiting examples of virtual goods comprise: characters; badges/icons; gameplay attributes; virtual money; cryptocurrencies; tokens; digital gifts; gameplay levels/add-ons; and prizes, among other examples. In some examples, gaming systems can directly interact with the distributed multi-ledger architecture for secure and transparent transactions which can also be accessed by auditors, tax authorities, partners, and/or other entities. Some examples may use private and/or public blockchains as part of the distributed multi-ledger gaming architecture. For instance, multiple distributed network nodes may be utilized to manage transaction records.

Method and system for providing interoperability for rich communication suite (RCS) messaging with local and remote applications
11558320 · 2023-01-17 · ·

A method and system for providing interoperability for Rich Communications Suite/Systems (RCS) messaging with local and remote applications. If a target network device cannot directly receive RCS messages, electronic messages are modified on an RCS message application to include different types of electronic links to remote or local RCS interoperability applications. The local or remote RCS interoperability applications independently provides seamless, rich multi-media RCS functionality to the target network device when the electronic link is activated in the modified electronic message. The local or remote RCS interoperability applications provide two-way RCS message communications between target network devices without RCS functionality and target network devices with RCS functionality.

Transport data display cognition

An example operation includes one or more of displaying, on a transport display, first data from a device detachably attached to a transport and displaying, on the transport display, second data from a device affixed to the transport. The second data is overlaid on the display proximate to the first data.

Encryption method and apparatus based on homomorphic encryption using composition of functions

An encryption method and apparatus based on homomorphic encryption using a composition of functions. The encryption method includes generating a ciphertext by encrypting data, and bootstrapping the ciphertext by performing a modular reduction based on a composition of a function for a modulus corresponding to the ciphertext.

GRAPHIC-BLOCKCHAIN-ORIENTATED SHARDING STORAGE APPARATUS AND METHOD THEREOF
20230009961 · 2023-01-12 ·

The present invention relates to a graphic-blockchain-orientated sharding storage apparatus, at least comprising a first sharding module and a second sharding module, wherein the first sharding module shards nodes having different resource capacity levels based on ledger data organized using a DAG structure, and the second sharding module assigns transactions to the shards matching with execution difficulty levels of the transactions, so that each said transaction is processed and stored in the shard corresponding thereto. The present invention incorporates the sharding technology into a graphic blockchain to provide a graphic-blockchain-orientated sharding storage method, so as to reduce pressure in terms of data storage and transaction processing on nodes of the graphic blockchain system. In addition, nodes, transactions, and data are dynamically divided according to resource heterogeneity among nodes, so as to further enhance performance of the graphic blockchain system while achieving efficient use of resources.

SELECTIVE ENCRYPTION DELINEATION
20230011742 · 2023-01-12 ·

Decoding a partially encrypted data stream may include receiving and scanning the partially encrypted data stream. Scanning the partially encrypted data stream may include identifying an encrypted portion sentinel in the partially encrypted data stream subsequent to a first portion, identifying an encrypted portion in the partially encrypted data stream subsequent to the encrypted portion sentinel, and generating a decrypted data portion by decrypting the encrypted portion. Decrypting the encrypted portion may include identifying an encrypted data portion in the encrypted portion, the encrypted data portion omitting an end encrypted portion sentinel, decrypting the encrypted data portion, and identifying an end encrypted portion sentinel in the encrypted portion subsequent to the encrypted data portion. Decoding the partially encrypted data stream may include including the decrypted data portion in the decrypted output data stream, and outputting the decrypted output data stream to a client device in the second network domain.

SELECTIVE ENCRYPTION DELINEATION
20230011742 · 2023-01-12 ·

Decoding a partially encrypted data stream may include receiving and scanning the partially encrypted data stream. Scanning the partially encrypted data stream may include identifying an encrypted portion sentinel in the partially encrypted data stream subsequent to a first portion, identifying an encrypted portion in the partially encrypted data stream subsequent to the encrypted portion sentinel, and generating a decrypted data portion by decrypting the encrypted portion. Decrypting the encrypted portion may include identifying an encrypted data portion in the encrypted portion, the encrypted data portion omitting an end encrypted portion sentinel, decrypting the encrypted data portion, and identifying an end encrypted portion sentinel in the encrypted portion subsequent to the encrypted data portion. Decoding the partially encrypted data stream may include including the decrypted data portion in the decrypted output data stream, and outputting the decrypted output data stream to a client device in the second network domain.

Data certification system and process for centralized user file encapsulation, encryption, notarization, and verification using a blockchain

A process for centralized user file encapsulation, encryption, notarization and verification using a blockchain and a system that certifies data in a proprietary “capsule” file format, with tamper-proof blockchain are disclosed. By utilizing a hybridization of both cloud and blockchain storage mechanisms, the present invention allows for the performant and cost-effective certification of large amounts of data. Furthermore, the generation of the capsule allows for users to store both the data payload and its digital notarization. The system then allows for users to share the capsule with others (by way of permissions enforced by the notary system) and upload it for verification of authenticity at a later point in time.

Methods and systems for a synchronized distributed data structure for federated machine learning

A system for an artificial intelligence synchronized distributed ledger. The system includes a computing device containing a receiving module, the receiving module designed and configured to receive an input from a remote device, parse the input to identify protected and non-protected data contained within the input, transform the protected data into a digitally signed assertion and convert the non-protected into an encrypted datastore. The computing device containing a processing module, the processing module designed and configured to receive the digitally signed assertion from the receiving module, insert the digitally signed assertion into an immutable sequential data structure, receive the encrypted datastore, retrieve at least an input, generate a record utilizing the at least a retrieved input, and perform a first machine-learning process utilizing the at least a retrieved input.

Storage architecture providing improved modification of access rights for stored data
11552799 · 2023-01-10 · ·

A storage architecture and associated usage techniques are described for providing efficient modification and use of access rights for stored data. The access rights may be associated with data stored on blockchain storage, and a separate ledger storage system may be used to provide improvements for modifying access rights for such stored data. For example, groups of data may be created and stored on blockchain storage before access to the stored data groups is made available to end users, and additional information related to those stored data groups (e.g., about their access rights) may be stored in a separate ledger storage system. When a particular user later requests access rights for one of those previously stored data groups, corresponding modifications may be quickly made to the separate ledger storage system to provide the user with substantially immediate access to that stored data group.