Patent classifications
H04L9/32
NON-FUNGIBLE TOKEN AUTHENTICATION
Disclosed are systems and methods that authenticate non-fungible tokens (“NFT”) and/or digital data represented by or pointed to by an NFT. In some implementations, authentication may be with respect to an existing NFT. In other implementations, authentication may be with respect to an NFT that is being created. The disclosed implementations may compare a candidate and/or candidate NFT data with existing NFTs and/or existing NFT data to determine if the candidate NFT and/or candidate NFT data is similar to other NFTs and/or other NFT data of another NFT, which may exist on any of many different blockchains.
INTERACTIVE VIDEOGAME VERIFICATION USING CRYPTOGRAPHICALLY PROTECTED TRANSACTION RECORDS
An example method of performing interactive videogame verification using cryptographically protected transaction records includes: receiving, by a videogame server, from a first videogame client device, a first transaction record reflecting a first set of events associated with an interactive videogame session, wherein the first transaction record is cryptographically signed by a first private cryptographic key associated with the first videogame client device; receiving, from a second videogame client device, a second transaction record reflecting a second set of events associated with the interactive videogame session, wherein the second transaction record is cryptographically signed by a second private cryptographic key associated with the second videogame client device; and validating the first transaction record based on the second transaction record.
Methods for Securely Adding Data to a Blockchain Using Dynamic Time Quanta and Version Authentication
Devices can be configured to implement distributed ledgers capable of immutably recording ledger entries that have validated version identifiers. The devices can include network interfaces, memory and processors. Processors can be configured to obtain ledger entries including version identifiers and version authenticator values, determine software versions that correspond to version identifiers, determine that version identifiers are valid based on version authenticator values, obtain challenges using cryptographic systems, wherein challenges are based on ledger entries, and/or broadcast blocks that incorporate ledger entries to securely add blocks to distributed ledgers. Blocks can be capable of being validated by using cryptographic systems to obtain proofs based on challenges.
DISTRIBUTED VEHICLE COMPUTING
A vehicle identifier and a nonfungible token (NFT) associated with the vehicle identifier are stored on an electronic ledger. The electronic ledger is a distributed electronic ledger shared between at least a computer and a remote computer. Upon transitioning a vehicle to an on state, the electronic ledger is queried to identify programming instructions associated with the NFT. Upon retrieving the identified programming instructions from the electronic ledger, the vehicle is actuated based on the retrieved programming instructions.
KEY IDENTIFIER DERIVATION AND MANAGEMENT SYSTEMS AND METHODS
This disclosure relates to, among other things, systems and methods for deriving key identifiers and managing mapping between keys and key identifiers. Consistent with embodiments disclosed herein, the disclosed systems and methods may provide a mechanism that allows multiple parties to reconstruct unique identifiers given a set of known inputs that may be used to look up, identify, and/or otherwise access services and/or data objects. In some embodiments, this may allow for a service provider and a rights management service to independently derive key identification information based on information that both entities share (e.g., a content document such as a Content Protection Information Exchange Format document), thereby reducing requirements to maintain such mappings.
ELECTRONIC SYSTEM FOR DIVERGENT DISTRIBUTION OF ELECTRONIC DIGITAL CERTIFICATES
Systems, computer program products, and methods are described herein for the divergent distribution of electronic digital certificates. The present invention may be configured to generate an electronic digital certificate associated with an artifact, store the electronic digital certificate on a distributed ledger, and record, on the distributed ledger, an interest of the user in the electronic digital certificate. The present invention may be configured to receive a request from the user to divide ownership of the electronic digital certificate amongst a group of users. The present invention may be configured to determine shares in the electronic digital certificate by determining for each user of the group of users a share of the shares. The present invention may be configured to record, on the distributed ledger and based on the shares, interests of the group of users in the electronic digital certificate.
DECENTRALIZED HOME SENSOR NETWORK
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing sensor communications in a monitored environment. One of the methods includes receiving, by a server and from a device that is accepted to connect with a first network using acceptance data that includes a first key indicating the device is associated with the first network, a request a) to join a second network different from the first network b) that identifies the first key; determining, by the server and using the identification of the first key in the request, that the device that transmitted the request is associated with the first network; and providing, by the server, an notification i) to a user associated with the first network ii) indicating that the device has moved outside the first network.
DECENTRALIZED HOME SENSOR NETWORK
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing sensor communications in a monitored environment. One of the methods includes receiving, by a server and from a device that is accepted to connect with a first network using acceptance data that includes a first key indicating the device is associated with the first network, a request a) to join a second network different from the first network b) that identifies the first key; determining, by the server and using the identification of the first key in the request, that the device that transmitted the request is associated with the first network; and providing, by the server, an notification i) to a user associated with the first network ii) indicating that the device has moved outside the first network.
ESTABLISHING COLLABORATIVE BREEDING PARAMETERS AND OWNERSHIP RIGHTS VIA UNIQUE IDENTITY ASSET MARKERS, AND RELATED SOFTWARE, METHODS, AND SYSTEMS
A method of establishing collaborative breeding parameters using blockchain technology is provided. The method may include providing a first user and a second user. The first user may own a first UIAM (unique identity asset marker) token corresponding to a first genomic asset and the second user may own a second UIAM token corresponding to a second genomic asset. The method may further include providing the first and second UIAM tokens and receiving a Ricardian contract with terms governing ownership rights for offspring. The Ricardian contract may be digitally executed and published on at least one blockchain. The method may further include minting a third UIAM token corresponding to a first offspring of the first and second genomic assets to the at least one blockchain. The third UIAM token may reflect the terms of the Ricardian contract and may evidence lineage of both the first and the second UIAM tokens.
SYSTEM FOR AUTOMATICALLY DETERMINING AND CATEGORIZING AN EVENT FOR A FIREARM
Systems and methods for analyzing and categorizing firearm-related events are provided herein. A data collection device may be attached to a firearm. The data collection device may be outfitted with sensors to track the movements and forces of the firearm. The movement and force data may be analyzed to categorize the event. Machine learning techniques may be used to stores relationships between the data and the events. A profile for a user may be created that learns the firearm handling techniques of the user. The data collection device may interface with body cameras and other external equipment and may be used in law enforcement scenarios. The data collection device may also be used with civilians for shot analysis.