Patent classifications
H04L9/3297
Blockchain enabled service request system
Systems and methods for establishing and fulfilling a smart contract between users and service providers are disclosed. A method includes creating, by one or more nodes in a computer network, a smart contract in response to a request from a user for services and providing the smart contract to a blockchain. The method then includes notifying service providers of the smart contract and receiving responses to the notifications from the service providers. Then the method includes identifying one or more service providers that can complete the service. The method then includes updating the smart contract to include data about the identified service providers. The updated smart contract includes account information for a user account of the user, and account information for service provider accounts of the identified service providers. Then a value interaction is initiated that pushes value from the user account to the service provider accounts.
Universal payment channels
Systems and methods for transferring value. A method includes posting, by a user device to a blockchain, a deposit transaction comprising a deposit value and conditions and updating, by the user device, a state according to a transaction amount. The method also includes transmitting, by the user device, a state update of the state to a server computer and responsive to transmitting the state update, and receiving, by the user device, a payment complete message comprising a tuple from the server computer. The method also includes verifying, by the user device, the conditions and processing, by the user device, a server deposit transaction on the blockchain in response to verifying.
Real-time attestation of cryptoprocessors lacking timers and counters
The present technology discloses methods and systems for receiving a security profile request from an integrity verifier, the request including a nonce; requesting, from a trusted platform module, a new nonce, wherein the new nonce is generated at least in part by the nonce and a current timestamp from a clock in the trusted platform module; receiving, from the trusted platform module, the new nonce; requesting, from a cryptoprocessor, a set of platform configuration registers; receiving, from the cryptoprocessor, the set of platform configuration registers; and sending a response to the integrity verifier, the response including the new nonce and the set of platform configuration registers to verify a security status of the trusted platform module and the cryptoprocessor.
Artifact Origination and Content Tokenization
Devices can be configured to broadcast blocks incorporating artifact origination tokens. Devices can include network interfaces, memory; and processors. Processors can be configured to obtain artifact-to-time association elements. Artifact-to-time association elements can include artifact references and timestamps. Timestamps can include references to artifact references. Processors can be further configured to obtain artifact origination tokens. Artifact origination tokens can include artifact-to-time association element, certifier descriptors indicating certifier public keys, and/or certifier digital signatures. Certifier digital signatures can be generated based on certifier public keys and/or artifact-to-time association elements. Processors can be further configured to obtain ledger entries including artifact origination tokens with public keys, compute challenges based on ledger entries, and broadcast blocks incorporating the ledger entries. Blocks can be validated using cryptographic systems to obtain proof based challenges.
Data certification system and process for centralized user file encapsulation, encryption, notarization, and verification using a blockchain
A process for centralized user file encapsulation, encryption, notarization and verification using a blockchain and a system that certifies data in a proprietary “capsule” file format, with tamper-proof blockchain are disclosed. By utilizing a hybridization of both cloud and blockchain storage mechanisms, the present invention allows for the performant and cost-effective certification of large amounts of data. Furthermore, the generation of the capsule allows for users to store both the data payload and its digital notarization. The system then allows for users to share the capsule with others (by way of permissions enforced by the notary system) and upload it for verification of authenticity at a later point in time.
Methods and systems for utilizing hardware-secured receptacle devices
A system for using hardware-secured receptacle devices includes a transfer processing device configured to store transfer method data associated with user on at least a cryptographically secured receptacle device, receive user authentication credentials from a user, authenticate user identity as a function of the user authentication credentials, retrieve a transfer authorization from the at least a cryptographically secured receptacle device as a function of the transfer method data, generate a transfer as a function of the transfer authorization.
Creating a secure digital identity
Methods and systems for creating a verifiable digital identity are provided. The method includes obtaining a first user-generated item comprising an identifiable feature. The method also includes digitally signing the first user-generated item to generate a secure digital artifact. The method also includes uploading the secure digital artifact and the first user-generated item to an auditable chain of a public ledger. The method also includes verifying a digital identity of the user by auditing the auditable chain. The method also includes obtaining a second user-generated item generated comprising the identifiable feature. The method also includes comparing the first and second user-generated items. The method also includes uploading the second user-generated item to the public ledger when the comparing is within a threshold.
Geolocation-aware, cyber-enabled inventory and asset management system with automated state prediction capability
A system and method for geolocation-aware, cyber-enabled infrastructure inventory and asset management with state prediction capability. The system tracks tangible and intangible assets, including states associated with each asset such as the location, condition, and value of each asset. Physical assets may be cyber-enabled by attaching wireless computing devices to some or all of the physical assets to provide data about the physical assets using sensors of the computing devices, including but not limited to, such data as location, conditions of storage, and hours of operation or use. Data for each item is stored in a multi-dimensional time series database, which keeps a historical record of the states of each item. Unknown or future states can be predicted by applying predictive models to the time series data. Parametric evaluations of current and predicted future states can be used to optimize the assets against an objective.
Digital data content certification system, data certification device, user terminal, computer program and method therefor
A file is created in which digital data and a certificate are integrated and content authentication for the digital data and the certificate are performed simultaneously. A data authentication device (1) is provided with: an original data receiving means which is communicably connected to a user terminal (2) and a timestamp provision device (3), and receives original data to be authenticated from the user terminal (2); an intermediate file creation means which creates an authentication file corresponding to the original data, and attaches the actual original data to the authentication file to create an intermediate file; a timestamp request means which transmits the intermediate file to the timestamp provision device (3); a date/time security information acquisition means which receives from the timestamp provision device (3) date/time security information containing date/time information and a hash value for the intermediate file; an authenticated file creation means which embeds the received date/time security information in the intermediate file and creates an authenticated file; and an authenticated file transmission means which transmits the authenticated file to the user terminal (2)
SYSTEM AND METHOD FOR RESOLVING TRANSACTIONS WITH LUMP SUM PAYMENT CAPABILITIES
A system and method for settling of a transaction is provided. The system includes a server arrangement having a rules based engine and a meta-object system comprising a runtime utility engine configured to compile multiple meta-object instances, wherein the server arrangement is configured to receive a lump sum payment proposal from the user, the lump sum payment proposal comprising only that amount the user is presently willing to pay, process information comprising the lump sum payment proposal according to the rules, and present a second transaction settlement offer set to the user including the lump sum payment proposal and a plurality of offers limited to a plurality of installment payment options with no further immediate payment offered beyond the lump sum payment proposal.