G06Q30/018

PROVIDENCE CERTIFICATION
20230048293 · 2023-02-16 ·

Implementations generally relate to providence certificates. In some implementations, a method includes generating a first providence certificate digitally signed with a first private encryption key, where the first providence certificate is associated with a first component of a product, and where the first providence certificate provides a first predetermined assurance. The method further includes generating a second providence certificate digitally signed with a second private encryption key, where the second providence certificate is associated with the product, and where the second providence certificate provides the first providence certificate and a second predetermined assurance.

SYSTEMS, METHODS, AND DEVICES FOR GENERATING CRYPTOCURRENCY BASED ON CARBON DIOXIDE EMISSIONS
20230049748 · 2023-02-16 ·

A computer-based system collects data associated with a user activity. The data is transmitted from an app running on a computing device with a user account authenticated by the computer-based system. A carbon footprint of the user activity is calculated based on the data associated with the user activity. The system calculates a proof of environmental impact in response to a function of the carbon footprint and a baseline value. An amount of cryptocurrency is generated based on the proof of environmental impact by writing a transaction for the amount of cryptocurrency to a blockchain in response to proof of environmental impact. The amount of cryptocurrency is assigned to the user account authenticated with the computer-based system.

Detecting security breaches with watchdog transaction accounts

Disclosed are various embodiments for detecting security breaches using watchdog transaction accounts. A security agent can initiate a purchase with a first electronic commerce system and provide a watchdog transaction account as payment for the purchase. The security agent can then store a record of the purchase which includes a merchant identifier for the merchant and the watchdog transaction account. Subsequently, a transaction authorization system can determine that authorization for a transaction with second electronic commerce system failed. If the transaction authorization system determines that the account used in the transaction with the second electronic commerce system, then the transaction authorization system can determine that the first electronic commerce system has suffered a security breach.

Systems, methods, and apparatus for software defined silicon security

Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) for software defined silicon security are disclosed. Example apparatus include a trusted agent determiner to (i) determine respective reputation scores associated with a plurality of agents in a mesh network, the plurality of agents associated with a plurality of semiconductor devices, respective ones of the semiconductor devices including circuitry configurable to provide one or more features, and (ii) select, based on the respective reputation scores, a first agent from the plurality of the agents to transmit a request to activate or deactivate at least one of the one or more features. Example apparatus also include an agent interface to, in response to the request, broadcast an activation or deactivation of the least one of the one or more features to the mesh network to cause the trusted agent determiner to update the reputation score of the first agent.

Deploying physical diamond tokens on a blockchain
11580536 · 2023-02-14 · ·

A diamond asset comprising one or more diamonds and an encryption chip is used to asset-back a cryptographic token that can be used to conduct transactions. The cryptographic token is written to a blockchain using a smart contract that is configured to enable a transaction associated with the token in response to two or more of: a signature by the encryption chip, a signature by the owner of the diamond asset, and a validation of a visual layout of the diamond asset.

Deploying physical diamond tokens on a blockchain
11580536 · 2023-02-14 · ·

A diamond asset comprising one or more diamonds and an encryption chip is used to asset-back a cryptographic token that can be used to conduct transactions. The cryptographic token is written to a blockchain using a smart contract that is configured to enable a transaction associated with the token in response to two or more of: a signature by the encryption chip, a signature by the owner of the diamond asset, and a validation of a visual layout of the diamond asset.

Methods and systems for transmitting information

Methods and systems for transferring information, comprising: transmitting, by a first computing device of the first computing system, a first network function request to a decentralized network, the first network function request including first information; and transmitting, by a second computing device of the second computing system, a second network function request to the decentralized network, the second network function request including second information.

Apparatuses, computer-implemented methods, and computer program products for automatic product verification and shelf product gap analysis

Embodiments of the present disclosure include apparatuses, computer-implemented methods, and computer program products for automatic product verification and shelf product gap analysis. Some embodiments utilize a multi-imager imaging engine to capture at least two image data objects associated with at least a near field and a far field via corresponding near and far-field imagers. The far field image data object in some embodiments is processed to identify, and/or detect and decode, product information on a product label at a shelving location for future processing. The near-field image data object may be processed to identify a product set located within the environment surrounding the product label. The information identified from each image data object may be processed to identify whether one or more product mismatches, pricing mismatches, and/or product gaps are present at the shelving location, with improved likelihood of success for each task.

Official vetting using composite trust value of multiple confidence levels based on linked mobile identification credentials

In an example, a subject using a user mobile-identification-credential device (UMD) requests vetting by a vetting system, which receives verified subject information associated with a level-n mobile identification credential (MIC-n) that UMD received from a level-n authorizing party system (APS-n). MIC-n is linked to lower level MIC-0 to MIC-(n−1). The vetting system, as level-n relying party system (RPS-n), uses the verified subject information associated with the linked MIC-0 to MIC-n to verify or not verify the identity of the subject, develops an identity profile of the subject, and determines a vetting result of the subject by calculating a composite trust score based on MIC trust values for the multiple levels of MIC. MIC-i (i=1 to n) is linked to MIC-(i−1) which UMD received from APS-(i−1), and APS-i is RPS-(i−1) which verified the identity of the subject using verified subject information associated with MIC-(i−1), such that MIC-0 to MIC-n are linked.

Official vetting using composite trust value of multiple confidence levels based on linked mobile identification credentials

In an example, a subject using a user mobile-identification-credential device (UMD) requests vetting by a vetting system, which receives verified subject information associated with a level-n mobile identification credential (MIC-n) that UMD received from a level-n authorizing party system (APS-n). MIC-n is linked to lower level MIC-0 to MIC-(n−1). The vetting system, as level-n relying party system (RPS-n), uses the verified subject information associated with the linked MIC-0 to MIC-n to verify or not verify the identity of the subject, develops an identity profile of the subject, and determines a vetting result of the subject by calculating a composite trust score based on MIC trust values for the multiple levels of MIC. MIC-i (i=1 to n) is linked to MIC-(i−1) which UMD received from APS-(i−1), and APS-i is RPS-(i−1) which verified the identity of the subject using verified subject information associated with MIC-(i−1), such that MIC-0 to MIC-n are linked.