H04L63/12

SELF-TESTING AUTOMATION SYSTEM

A self-testing automation system includes a decentralized distributed ledger-type database comprising a plurality of subscriber nodes, wherein the subscriber nodes exchange data with one another per transaction, and the database stores the transactions in data blocks which are linked together; a regulating mechanism which is implemented into each of the subscriber nodes, said regulating mechanism comprising information on the number and identity of all of the subscriber nodes as well as rules relating to actions, properties, and states of each of the subscriber nodes; and a plurality of automation components which are subscriber nodes of the decentralized database. Each of the subscriber nodes is designed to test or validate transactions between the subscriber nodes at all times using the regulating mechanism, and each of the subscriber nodes is designed to carry out at least one measure if a violation of the regulating mechanism is detected.

HEADER FOR CONVEYING TRUSTFUL CLIENT ADDRESS
20220376924 · 2022-11-24 ·

Described are techniques including a computer-implemented method comprising appending a HyperText Transfer Protocol (HTTP) header to a HTTP request, wherein the HTTP header includes a source Internet Protocol (IP) address of a client generating the HTTP request, a universally unique identifier (UUID) of the HTTP request, a timestamp, a lifetime, a Universal Resource Locator (URL) of the HTTP request, and a signature. The method further comprises transmitting the HTTP request with the HTTP header to a web server.

Concurrent Token Authentication
20220376913 · 2022-11-24 ·

The concurrent token authentication method, operating within a cryptographically secured context, enables a service account to be authenticated continuously by means of a set of three distinct tokens: primary, secondary, and reserved. A token is an immutable secret key. Through a lifecycle, a token is registered manually or programmatically to become the reserved token, thereafter upon first authentication said token is promoted from reserved to primary, and thereafter upon a subsequent new token registration and first authentication event, the original said token is promoted from primary to secondary. Thereafter upon another new token registration and first authentication event, the original said token is terminated. The concurrent token authentication lifecycle provides for token set expiration. Expiration is advanced following first authentication of a reserved token. Upon reaching expiration token set is terminated.

PROVIDING IRREVOCABLE EVIDENCE OF PHYSICAL PRESENCE USING PROXIMITY TECHNOLOGY AND A DISTRIBUTED LEDGER
20220374902 · 2022-11-24 ·

Aspects described herein include using proximity technology such as beacon devices or geofences to detect physical presence at a physical location. Presence information may be generated and included in a non-fungible token (NFT). The NFT may be provided to a digital wallet. The identity of an individual associated with the digital wallet may be authenticated. A distributed ledger may record the transaction that provides the NFT to the digital wallet.

Secure sent message identifier
11509664 · 2022-11-22 · ·

A message management service allows a user to access and manage messages from various message services. The user can access the message management service using a message management client application executing on a client device and can draft messages using the message management client application and send the messages through the different message services. The message management service can add information to messages sent using the message management client application that can be used to identify and organize the messages. A secure sent-message identifier can be added to messages sent by the message management service to reliably indicate that the messages were sent by the message management service.

Dampening token allocations based on non-organic subscriber behaviors
11593721 · 2023-02-28 · ·

Described processes include: determining portions of instances of a cryptographic token to be allocated to record providers, like providers of an asset indicated by a record, wherein: the portions are determined based on network effects associated with the records the record provider supplied on performance of a computer-implemented network in which both record providers and record consumers participate, patterns indicative of inorganic consumption may be determined from one or more of interactions of individual consumers, interactions of collections of consumers, or consumer interactions in the aggregate for a given provider or record; and the effects on network performance are adjusted responsive to designation of one or more entities as exhibiting inauthentic behavior; and appending to a distributed ledger, records indicating the respective portions, and adjustments, are allocated to record providers.

Digital fiat currency

Techniques are disclosed which include receiving, by a central entity computer, a request for digital currency. The request includes a serial number and a denomination of a physical currency. The central entity computer generates the digital currency for the denomination and linked to the serial number. The generating includes recording the digital currency on a blockchain. The central entity computer transmits a notification of the generation of the digital currency. The central entity computer causes removal of the physical currency from circulation in a fiat currency system.

Secure and robust decentralized ledger based data management

Systems and methods providing access control and data privacy/security with decentralized ledger technology are disclosed. To ensure data privacy the decryption or access to data by a non-data owner requires joint orchestration of decentralized system nodes to provide partial decryption components with n-of-x required to fulfill request. Data can be encrypted, and access control policy can be decided including required number of key fragments to fulfill decryption. Access control policies can be stored in the decentralized ledger based system. Key information can be stored in the system in a decentralized manner with partial key fragments encrypted and split among system nodes. An access request can be sent to the system to fetch a data file, without disclosing the requester's identity in the system. The decentralized ledger based system can verify a legitimate request to access the data and denies access to malicious or faulty participants.

System and method using a fitness-gradient blockchain consensus and providing advanced distributed ledger capabilities via specialized data records
11509464 · 2022-11-22 ·

An improved system implements Fitness Gradient Consensus including hash distance and bucket consensus variations within a digital blockchain by calculating the highest fitness value among competing blocks to resolve conflicts and allocate the rewards associated with building new blocks. The consensus system applies conflict resolution formulas to incentivize block-building nodes to share blocks generated, as it completes construction, to improve chances of a reward, resulting in enhanced speed and security of blockchain. The hash distance consensus utilizes a hash distance scalar value as part of its fitness metric, and the bucket consensus assigns tokens to buckets and calculates an aggregate value of the assigned tokens. A trust-but-verify variant increases transactional throughput and reduces linearity and computational constraints. The system also utilizes novel record types, such as token genesis, transfer, transaction, trade order, settlement, proposition, determination, and pattern linkage records to facilitate the automation of financial, commercial and legal processes.

Review recordation and evaluation systems and methods

A computer-implemented system and method for generating and displaying an authority score through a software application executed by a process or a computing device. The processor may receive visit data indicative of a user's presence and review data describing an entity at a location. The processor may determine an authority score for the review data and perform a calculation using at least a portion of the visit data as at least one input. The processor may generate and cause a visual indication of the authority score to be displayed by a display device.