Patent classifications
H04L2209/56
DIGITAL VALUE TOKEN PROCESSING SYSTEMS AND METHODS HAVING IMPROVED SECURITY AND SCALABILITY
Systems and methods that provide improved security and scalability in digital token exchange are disclosed. In one example, a system may receive from a requester one or more old cryptographically signed tokens each including a shared class and denomination. After validating the previously issued Value Tokens, the system may sign newly issued Value Tokens having the shared class and send them to the requester as a swap for the previously issued Value Tokens. Some tokens have intrinsic value while other coded Value Tokens require reference to a record of valid tokens to validate them. The system allows tokens of one type to be swapped for tokens of the other type, but issues intrinsic Value Tokens only as a swap for coded Value Tokens.
Interoperable Token Issuance and Use in Transaction Processing
The method comprises receiving an onboarding request for a first onboarding process of a first representation of a first user at a token issuance and transaction system, the request received from a transaction system, the request indicating a second onboarding process of a second representation of the first user at the transaction system. The method includes generating, based on performing the first onboarding process and receiving an indication of success of the second onboarding process, a link between the first and second representations at the token issuance and transaction system and the transaction system. The method includes receiving a pre-transaction request from the transaction system, the pre-transaction request indicating a transaction type and the link between the first and second representations. The method also includes determining, based on the link, whether to generate a payment token for completing a requested transaction corresponding to the pre-transaction request.
Data sharding for transmission over a high generation cellular network
Aspects of the disclosure relate to data sharding for transmission over a high generation cellular network. A computing platform may detect, via a communication network, transmission of data from a first computing device to a second computing device. Subsequently, the computing platform may intercept, prior to receipt of the transmission by the second computing device, the data. Then, the computing platform may shard the data into a first shard and a second shard. Then, the computing platform may identify, within the communication network, a first communication channel and a second communication channel. Then, the computing platform may send, to the second computing device, the first shard via the first communication channel, and the second shard via the second communication channel. Subsequently, the computing platform may merge, the first shard and the second shard, to reconfigure the data.
Apparatuses and methods for evaluation of proffered machine intelligence in predictive modelling using cryptographic token staking
A method of improving performance of machine learning models by leveraging crowdsourced artificial intelligence includes sending first data to a plurality of data source compute nodes and receiving indications of stakes and estimates based on the first data from the plurality of data source compute nodes. Each data source compute node is ranked based on the received indications of stakes, to generate a plurality of ranked data source compute nodes. An accuracy of each received estimate is calculated by comparing the received estimates to second data. Until a predefined resource is depleted, and in order of rank, if the accuracy of the estimate associated with a ranked data source compute node exceeds a predefined threshold, the predefined resource is decremented and a token augmentation can be assigned to the ranked data source compute node.
Subscriber identification module (SIM) authentication protections
A method of computer authentication of a user request for a Subscriber Identity Module (SIM) card transfer by a biometric signature from a user equipment (UE) comprising assigning a risk score, by a mobile service provider, to a user account based on user activity in the user account, wherein the user activity includes a SIM card transfer authorization. The mobile service provider then sends a message requesting a biometric signature from an authentication application executing in memory on the UE. The authentication application on the UE then proceeds capturing a biometric signature, encrypting the biometric signature, and sending an encrypted biometric signature to the mobile service provider using a wireless communication protocol. The mobile service provider then compares the biometric signature to an authorized signature and modifies the risk score based on the comparison.
System and method for mitigating international revenue share fraud
Aspects of the subject disclosure may include, for example, a non-transitory, machine-readable medium, comprising executable instructions that, when executed by a processing system including a processor, facilitate performance of operations including receiving a call; selecting a next carrier to handoff the call; generating a call data record (CDR) for the handoff to the next carrier; encrypting the CDR using a call encryption key, thereby creating an encrypted CDR; encrypting the encrypted CDR using a committee encryption key, thereby creating a double encrypted CDR; recording the double encrypted CDR to a blockchain; and sending the call encryption key to the next carrier. Other embodiments are disclosed.
DATA VERIFICATION METHOD AND APPARATUS, COMPUTER DEVICE, AND COMPUTER READABLE STORAGE MEDIUM
A data verification method and apparatus, a computer device and a computer-readable storage medium are provided, and belong to the technical field of networks. The method includes the following steps: acquiring a data verification request; acquiring at least one set of first data from at least one data source; and verifying target data based on the at least one set of first data. According to the solution, by acquiring data having a production and life relationship with the target data, during data verification, the authenticity of the target data can be verified based on different dimensions and different production and life links.
System for streamlined assetization of a revenue stream
A payment gateway is configured to directly access a revenue stream and financial information about the revenue stream. A machine learning (ML) model is trained to continuously process the financial information about the revenue stream to continuously analyze and score the revenue stream. A smart contract factory is responsive to the scoring by the ML model to generate at least one smart contract on a distributed, decentralized network. The smart contract is programmed to receive payments in stablecoins with respect to revenue stream.
ELECTRONIC DEVICE AND CONTROL METHOD THEREOF
An electronic device is provided. The electronic device includes a communication interface, a memory for storing at least one instruction and storing a plurality of pieces of transaction information and a plurality of index values corresponding to the plurality of pieces of transaction information, and at least one processor configured to control the electronic device by being connected to the memory, wherein the at least one processor is further configured to execute the at least one instruction to, when a delete request including an index value corresponding to transaction information is received, compare the index value included in the delete request with the plurality of index values stored in the memory, delete transaction information corresponding to the index value included in the delete request from the memory, based on a result of the comparison, generate verification data corresponding to the interface to transmit the generated verification data to an external server included in a blockchain network.
INTERMEDIARY SERVER, SYSTEM, INTERMEDIATING METHOD, AND NON-TRANSITORY RECORDING MEDIUM
An intermediary server for intermediating ownership of energy between a supplier and a user, includes circuitry that transmits a first request to another intermediary server capable of requesting a change of ownership of energy to a decentralized ledge system that manages energy information on energy, the first request requesting to change ownership of energy produced by a same production method as a particular production method, from another intermediary agent managing the other intermediary server to an intermediary agent managing the intermediary server.