Patent classifications
H04L2209/56
Anomalous transaction detection for database
An example operation may include one or more of receiving, by a risk score module, a blockchain transaction proposal, obtaining transaction proposal data, obtaining external data, computing a risk score from the transaction proposal data and the external data, comparing the risk score to a risk score threshold, providing an endorsement decision, based on the comparison, and one of endorsing or rejecting the transaction proposal.
SYSTEM AND METHOD FOR MANAGING TRANSACTIONS IN DYNAMIC DIGITAL DOCUMENTS
A system software and method which relates to the field of computing technology or business process models or computer systems or distributed computer systems or computer networks relating to general purpose devices that can be programmed to carry out a set of data table or hash table updates, validations or modifications supporting, enabling or executing public and private services, financial transactions and commercial applications. More specifically, the present invention is directed to distributed and decentralized computing in which said distributed network is supported and encrypted by cryptographic technology, hash functions and distributed public or private keys or other related technology. System and methods for managing dynamic electronic documents on a private distributed ledger comprise establishing a dynamic electronic document comprising a first state object, wherein the state object references a prior approved first transaction; proposing a second transaction comprising as an input the first state object and as an output a transaction command to alter the state object as well as what parameters are required to validate the second transaction; validating the proposed second transaction; and updating the state object on a private distributed ledger to reference the second transaction.
SYSTEM AND METHOD FOR SECURE PEER-TO-PEER TRANSMISSION OF CONTENT IN DISTRIBUTED LEDGER NEWORKS
Different aspects of the invention implement an enhanced DLT system, and corresponding method, that allows the peer-to-peer transmission of huge amounts of data packets of content between users, and to be stored in the DLT network, in a secure, trustworthy and efficient manner. By allowing the interface between any type of existing layer 1 DLT network, it does not require the complex, slow, costly and highly risk process involved in the generation of a new layer 1 DLT network. It opens up the range of possible applications of the DLT network to applications in Big Data, IOT, Web 3, MMOG, or any other environment that needs the trust provided by the immutability of data stored in the DLT network.
MANAGEMENT ELECTRONIC DEVICE AND METHOD FOR WIRELESS COMMUNICATION, AND COMPUTER READABLE MEDIUM
A management electronic device includes a processing circuit configured to: obtain a spectrum in an N-th round of spectrum trading and acquire the interference received by the management electronic device when an electronic device uses the traded spectrum; receive the interference received by another electronic device as determined by another electronic device related to spectrum trading; determine competition rights parameters of the management electronic device and the other electronic device, respectively, the competition rights parameters representing the credibility of the electronic devices and the magnitude of competitiveness when competing for management rights in an N+1-th round of spectrum trading; and select a new management electronic device on the basis of at least one among the interference and the competition rights parameters, the new management electronic device having management rights in the N+1-th round of spectrum trading, instead of the management electronic device having management rights.
SYSTEM AND METHOD FOR PREVENTING SUSPICIOUS TRANSACTIONS IN DISTRIBUTED LEDGER
A system and method for preventing hacking of blockchain is proposed. The system includes a cryptocurrency owner configured to own a cryptocurrency wallet storing a cryptocurrency, a public key, and a private key, and capable of setting monitoring-subjected data and monitoring-excluded data, a hacking countermeasure system configured to check status of the cryptocurrency wallet by being connected to the cryptocurrency owner to receive the cryptocurrency and the public key, invalidate a hacking transaction when the hacking transaction matching the monitoring-subjected data is received, and allow the cryptocurrency to be traded by opening the cryptocurrency wallet with the private key and process transaction details into a block file when a monitoring-excluded transaction matching the monitoring-excluded data is received, and a blockchain network configured to receive the block file from the hacking countermeasure system and duplicate the block file into a plurality of block files to distribute and store each block file.
CLIENT-PROVISIONED CREDENTIALS FOR ACCESSING THIRD-PARTY DATA
Accessing third-party service provider data on behalf of a first-party service provider without having to provide credentials to a first-party service provider server(s) is described. A credential may be received via a user interface presented by a mobile payment application associated with a service provider, the credential being associated with a user account of a user and a third-party service provider. The mobile payment application may then send the credential to a computing device(s) of the third-party service provider, which causes a session to be established between the mobile payment application and the third-party device(s). The mobile payment application may receive, via the session, user data associated with the user account from the third-party device(s), and may send, without having provided the credential to a computing device(s) of the service provider, at least a portion of the user data to the computing device(s) of the service provider.
DATABASE SYSTEM PUBLIC TRUST LEDGER ARCHITECTURE
A request may be received to transfer from a first entity to a second entity a right related to a digital asset stored in an on-demand database system. The on-demand database system may provide computing services to a plurality of entities via the internet. A token associated with the digital asset may be identified. The token may being included in a smart contract recorded within a distributed trust ledger and may be owned by a first distributed trust ledger account. The smart contract may be executed within the distributed trust ledger to record a transfer of the token from the first distributed trust ledger account to a second distributed trust ledger account. The on-demand database system may be updated to include one or more database entries reflecting the recorded transfer.
ESTABLISHING COLLABORATIVE BREEDING PARAMETERS AND OWNERSHIP RIGHTS VIA UNIQUE IDENTITY ASSET MARKERS, AND RELATED SOFTWARE, METHODS, AND SYSTEMS
A method of establishing collaborative breeding parameters using blockchain technology is provided. The method may include providing a first user and a second user. The first user may own a first UIAM (unique identity asset marker) token corresponding to a first genomic asset and the second user may own a second UIAM token corresponding to a second genomic asset. The method may further include providing the first and second UIAM tokens and receiving a Ricardian contract with terms governing ownership rights for offspring. The Ricardian contract may be digitally executed and published on at least one blockchain. The method may further include minting a third UIAM token corresponding to a first offspring of the first and second genomic assets to the at least one blockchain. The third UIAM token may reflect the terms of the Ricardian contract and may evidence lineage of both the first and the second UIAM tokens.
Split ledger software license platform
Aspects of the subject disclosure may include, for example, a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, including requesting a license for software from first equipment of a license holder; receiving a passed ledger associated with the license from the first equipment of the license holder, wherein the passed ledger comprises a latest block; receiving a hash value for the latest block from a software vendor of the software; calculating a hash value for the latest block; and responsive to the hash value provided by second equipment of the software vendor matching the hash value calculated for the latest block: executing the software. Other embodiments are disclosed.
Method and system for filtering transactions using smart contracts and updating filtering smart contracts
A method for filtering blockchain value transfer transactions and updating filtering including receiving a transaction request comprising an indication that the transaction request is associated with an update to an existing transaction smart contract, defining an updated transaction smart contract, applying a filter smart contract to the transaction request, and recording to a log an indication that the updated transaction smart contract was made to the existing smart transaction contract, responsive to the applying the filter smart contract.