G06Q20/1235

METHODS AND SYSTEMS FOR TRACKING AND RECOVERING ASSETS STOLEN ON DISTRIBUTED LEDGER-BASED NETWORKS
20230047830 · 2023-02-16 ·

The instant disclosure illustrates how the privacy and security of activities occurring on distributed ledger-based networks (DLNs) can be enhanced with the use of zero-knowledge proofs (ZKPs) that can be used to verify the validity of at least some aspects of the activities without private information related to the activities necessarily being revealed publicly. Methods and systems that are directed at facilitating the tracking and recovery of assets stolen on ZKP-enabled DLNs while preserving the confidentiality of the tokens are presented herein.

APPARATUSES, COMPUTER-IMPLEMENTED METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ALTERNATIVE PAYMENT TRANSACTIONS

A method, apparatus, and computer program product for alternative payment transactions are provided. An example computer-implemented method includes receiving a first request for payment associated with a first transaction that includes one or more first payment parameters and generating an initial payment responsive to the first request for payment based upon the first payment parameters. The computer-implemented method also includes determining first alternative payment data based upon first payment attribute data of a first user associated with the first transaction. The first payment attribute data is associated with non-cash liquid assets of the first user. The computer-implemented method additionally includes modifying the initial payment based upon the first alternative payment data and effectuating the modified initial payment from a first user account associated with the first user in satisfaction of the first transaction. The computer-implemented method may subsequently include modifying the first payment attribute data of the first user.

Peer-to-Peer Data Object Transfer and State Management
20230045946 · 2023-02-16 ·

Particular embodiments determine, at least in part by a computing device of a payment service, to associate a data object with a user account that is associated with a stored balance managed by the payment service. The computing device associates an amount of the data object with a distinct stored balance associated with the user account. The distinct stored balance is associated with a condition of use. The computing device monitors transaction data associated with users of the payment service. The computing device identifies, from the transaction data, a transaction associated with an identifier associated with the user account. Based on a determination that the transaction satisfies the condition of use, processing payment for the transaction using at least a portion of the distinct stored balance prior to using the stored balance.

Customized virtual store

Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing a program and a method for performing operations comprising: receiving, from a client device of a first user, a request from the first user to engage in an AR shopping experience curated by a store; identifying a first real-world product available for purchase from the store; receiving an image of a real-world environment of the first user; generating a first AR item that represents the first real-world product; comparing visual attributes of the first AR item to physical layouts of a plurality of real-world objects depicted in the image of the real-world environment; and overlaying the first AR item on a first real-world object of the plurality of real-world objects in the image responsive to comparing the visual attributes of the first AR item to the physical layouts of the plurality of real-world objects.

Systems and methods for encrypting data and algorithms

Systems, methods, and computer-readable media for achieving privacy for both data and an algorithm that operates on the data. A system can involve receiving an algorithm from an algorithm provider and receiving data from a data provider, dividing the algorithm into a first algorithm subset and a second algorithm subset and dividing the data into a first data subset and a second data subset, sending the first algorithm subset and the first data subset to the algorithm provider and sending the second algorithm subset and the second data subset to the data provider, receiving a first partial result from the algorithm provider based on the first algorithm subset and first data subset and receiving a second partial result from the data provider based on the second algorithm subset and the second data subset, and determining a combined result based on the first partial result and the second partial result.

TIME-RESTRICTED OWNERSHIP OF NFTs
20230041807 · 2023-02-09 ·

A non-fungible token (NFT) representing a computer game asset can be purchased for a limited time by a gamer or a spectator and in some cases extended up to a maximum period, after which time the NFT is placed back on the market.

Method, apparatus, and computer program product for predictive initial electronic bid value generation for new digital content objects
11593844 · 2023-02-28 · ·

Embodiments of the present disclosure provide methods, systems, apparatuses, and computer program products for adaptively generating an initial electronic bid value for a new digital content object.

Multi-zone secure artificial intelligence exchange and hub

In general, this disclosure describes a multi-zone secure AI exchange. The multi-zone secure AI exchange may be implemented in a multi-cloud, multi-data center environment, where each zone may be in a different cloud or data center. The multi-zone secure AI exchange may include a data repository, a data exchange, and shared services. The data repository may be configured to store algorithms and datasets, each having a respective owning user. The data exchange may receive datasets and algorithms from the data repository, and may perform the algorithms to produce output data. Each of the data repository, data exchange, and shared services may have a different level of security. The data repository may implement the highest level of security, allowing the owner user, and only the owning user, to control how their data and algorithms move in and out of the data repository, or are changed while in the data repository.

LINKED USER ACCOUNTS

Separate user accounts can be linked into a group of linked user accounts so that content items assigned to each of the user accounts can be accessed by each user account in the group. Linking user accounts in this way allows the individual user accounts to share content items while also retaining their individual properties such as username, password, preference data, etc. Linking user accounts allows each user account to retain the content items assigned to the user account when the user account is unlinked from the group. Linking user accounts can be restricted according to linking rules that dictate how many user accounts can be included in a group, when a user account can be added or removed from a group, etc. A master user account can set parameters restricting content items accessible to the user accounts in the group, as well as money spent be each user account.

MANAGING SUPPLEMENTAL CONTENT RELATED TO A DIGITAL GOOD
20180004919 · 2018-01-04 ·

In various example embodiments, a system and method for managing supplemental content relating to a digital good are presented. The supplemental content relating to the digital good may be received, where the supplemental content may be for presentation to a consumer. The supplemental content may be stored in accompaniment with the digital good. Ownership criteria associated with ownership rights of the supplemental content may be determined. The ownership rights corresponding to the supplemental content may be transferred from a first entity to a second entity based, at least in part, on the determined ownership criteria. The second entity may be authorized to access the supplemental content based, at least in part, on the determined ownership criteria. The supplemental content may be caused to be distributed to the second entity.