H04L9/38

Computer network systems for cryptographically-secured, token-based operations and methods of use thereof

Systems and methods of the present disclosure enable reversible blockchain operations. An operation-reverse operation pair specifies an operation for exchange of a first token for a second token, and a reverse operation for return of the second token for the first token upon at least one condition being satisfied. A self-executing software container (SESC) executes the operation-reverse operation pair according to the condition by detecting a transfer of the first token into a first segregated data structure, and a transfer of the second token from a second token storage to a first token storage. The SESC initiates a transfer of the first token from the first segregated data structure to a second segregated data structure in response to the transfer of the second token. Upon detecting a reverse operation matching the condition, the SESC initiates a transfer of the first token back to the first segregated data structure.

ELECTRONIC DEVICE FOR ENCODING IMAGE

An electronic device for encoding image information, according to the present specification, comprises: a camera module including at least one lens configured to capture an image; and an optical element movably coupled to a front area of the at least one lens so that an object in the image is unidentifiably encoded.

ELECTRONIC DEVICE FOR ENCODING IMAGE

An electronic device for encoding image information, according to the present specification, comprises: a camera module including at least one lens configured to capture an image; and an optical element movably coupled to a front area of the at least one lens so that an object in the image is unidentifiably encoded.

COMPUTER NETWORK SYSTEMS FOR CRYPTOGRAPHICALLY-SECURED, TOKEN-BASED OPERATIONS AND METHODS OF USE THEREOF

Systems and methods of the present disclosure enable reversible blockchain operations. An operation-reverse operation pair specifies an operation for exchange of a first token for a second token, and a reverse operation for return of the second token for the first token upon at least one condition being satisfied. A self-executing software container (SESC) executes the operation-reverse operation pair according to the condition by detecting a transfer of the first token into a first segregated data structure, and a transfer of the second token from a second token storage to a first token storage. The SESC initiates a transfer of the first token from the first segregated data structure to a second segregated data structure in response to the transfer of the second token. Upon detecting a reverse operation matching the condition, the SESC initiates a transfer of the first token back to the first segregated data structure.

Blockchain rideshare data aggregator solution

Systems and methods are described for generating transactions based upon rideshare data and updating a distributed ledger. The method may include (1) identifying one or more rideshare companies for which a user offers driving services during a time period; (2) for each of the one or more rideshare companies, identifying a phase of a rideshare trip in which the user is providing driving services for the identified one or more rideshare companies during the time period; (3) determining rideshare data; (4) generating a transaction including a representation of the rideshare data; and/or (5) transmitting the transaction to at least one other participant of the plurality of participants maintaining the distributed ledger. The rideshare data from the distributed ledger for the user may be used to calculate a level of risk when the user is providing ride services.

Securing authentication flows using a decentralized identifier

A digital wallet generates an identification value associated with a DID of a DID owner. The digital wallet generates a first request including the identification value for an authentication token from an identification provider. The first request is provided to the identification provider. The digital wallet receives, in response to the identification provider validating the first request, the authentication token that authenticates the digital wallet with a verifiable claim issuer including the identification value from the identification provider. The digital wallet generates a second request for one or more verifiable claims from the verifiable claim issuer. The second request includes the DID and authentication token including the identification value. In response to the verifiable claim issuer validating the authentication token and the identification value, one or more verifiable claims from the verifiable claim issuer are received by the digital wallet.

Computer system and control method for distributed transaction

A computer system comprises a plurality of service execution systems each configured to execute a service for implementing an application that executes a distributed transaction. At least one of the plurality of service execution systems is configured to generate determination information for determining whether rollback of the distributed transaction is required and to transmit the determination information to another one of the plurality of service execution systems, and the another one of the plurality of service execution systems that has received the determination information is configured to determine, through use of the determination information, whether the rollback of the distributed transaction is required.