System for generation of substitutable configurations of secure electronic distributed register tokens

    公开(公告)号:US12238214B2

    公开(公告)日:2025-02-25

    申请号:US17592141

    申请日:2022-02-03

    Abstract: A system is provided for generation of substitutable configuration of secure distributed register tokens. In particular, the system may generate, on a distributed register, a secure token with a built-in source code function for triggering a substitution of the secure token with one or more substitute tokens upon the occurrence of a specific condition. The function may pull one or more values associated with the secure token (e.g., from an oracle) and generate the one or more substitute tokens based on the one or more values. Once the substitute tokens are generated, the substitute tokens may be used to replace the secure token on the distributed register.

    Domain-based Raft consensus selection of leader nodes in distributed data services

    公开(公告)号:US12010171B2

    公开(公告)日:2024-06-11

    申请号:US18135890

    申请日:2023-04-18

    CPC classification number: H04L67/1051 G06F11/3409 G06F16/27 H04L67/1085

    Abstract: Domain-based server-selection computer-implemented processes and machines implement an extension of RAFT consensus for leader selection based on patterns of update data proximity. Accounts involved in payment or other transactions are maintained as “sharded” data across data store instances that are split into shards according to their temporal activity. If the domain attributes for a node exceed a threshold and are greater than the other nodes, the node is designated as a leader node and the others are designated as follower nodes. This provides an additional optimization in network performance by introducing insights in normal operations within a domain in a distributed network. If the domain attributes do not exceed the threshold and/or are not greater than the other nodes, a traditional consensus algorithm is used to select leader and follower nodes.

    System for executing digital resource transfer using trusted computing

    公开(公告)号:US11888759B2

    公开(公告)日:2024-01-30

    申请号:US17355323

    申请日:2021-06-23

    Abstract: Systems, computer program products, and methods are described herein for executing digital resource transfer using trusted computing. The present invention is configured to receive, from a second computing device, an indication that a first computing device has initiated a transfer of a digital resource; determine, using the authentication protocol, that the first computing device is in secure possession of the digital resource; initiate, via the second computing device, a request to receive the digital resource from the first computing device; receive, via the second computing device, an indication that the second computing device has received the digital resource from the first computing device; initiate, via the second computing device, a resource verification protocol on the digital resource; verify, using the resource verification protocol, one or more digital signatures associated with the digital resource; and transmit, via the second computing device, an acknowledgement to the first computing device.

    SYSTEM FOR IMPLEMENTING A TRANSACTIONAL TIMELOCK MECHANISM IN A DISTRIBUTED LEDGER

    公开(公告)号:US20220414654A1

    公开(公告)日:2022-12-29

    申请号:US17355355

    申请日:2021-06-23

    Abstract: Systems, computer program products, and methods are described herein for implementing a transactional timelock mechanism in a distributed ledger. The present invention is configured to receive, from a computing device, a transaction to be registered in a ledger record associated with a distributed ledger at a future time; retrieve a required amount of resources for the one or more validation nodes to register the transaction in the ledger record; submit a validation request for the transaction to a memory pool associated with the one or more validation nodes with a proposed amount of resources less than the required amount of resources; continuously monitor the transaction in the memory pool until the future time; and at the future time, automatically re-submit the validation request for the transaction to the memory pool with the required amount of resources.

    User security profile for multi-media identity verification

    公开(公告)号:US11368456B2

    公开(公告)日:2022-06-21

    申请号:US17018918

    申请日:2020-09-11

    Abstract: A system receives a media sample. The system then identifies a critical portion of the media sample. The media sample is split into a verification sample comprising the critical portion of the media sample. The verification sample is decomposed into a first and second layer. A first hash value is generated based on the first layer by applying a hash function to a first code element from the verification sample. A second hash value is generated based on the second layer by applying the hash function to a second code element from the verification sample. A blockchain transaction is generated comprising a profile associated with the user. The transaction is stored as a block in a blockchain ledger.

    USER SECURITY PROFILE FOR MULTI-MEDIA IDENTITY VERIFICATION

    公开(公告)号:US20220086143A1

    公开(公告)日:2022-03-17

    申请号:US17018918

    申请日:2020-09-11

    Abstract: A system receives a media sample. The system then identifies a critical portion of the media sample. The media sample is split into a verification sample comprising the critical portion of the media sample. The verification sample is decomposed into a first and second layer. A first hash value is generated based on the first layer by applying a hash function to a first code element from the verification sample. A second hash value is generated based on the second layer by applying the hash function to a second code element from the verification sample. A blockchain transaction is generated comprising a profile associated with the user. The transaction is stored as a block in a blockchain ledger.

    System for identification and recordation of base components of a resource within a virtual medium

    公开(公告)号:US12164508B2

    公开(公告)日:2024-12-10

    申请号:US18370103

    申请日:2023-09-19

    Abstract: Systems, computer program products, and methods are described herein for identification and recordation of base components of a resource within a virtual medium. The present invention is configured to electronically receive, from a user input device, a request to generate a non-fungible token (NFT) for a first portion of a resource; in response, retrieve information associated with the first portion of the resource; initiate an NFT engine on the first portion of the resource; generate, using the NFT engine, an NFT for the first portion of the resource, wherein the NFT comprises at least the information associated with the first portion of the resource; record the NFT in a distributed ledger; and transmit control signals configured to cause the user input device to display a notification indicating that the NFT has been generated and recorded in the distributed ledger.

    Data Replication Over Low-Latency Network

    公开(公告)号:US20230062594A1

    公开(公告)日:2023-03-02

    申请号:US17465554

    申请日:2021-09-02

    Abstract: A system includes a first data center that includes a first computing device communicatively coupled to a first database. The first computing device is configured to determine data stored in the first database to be replicated to a second database communicatively coupled to a second computing device of a remote data center. The first computing device is further configured to determine whether a point-to-point data tunnel has been established across a broadband cellular network between the first computing device and the second computing device and to establish the point-to-point data tunnel across the broadband cellular network between the first computing device and the second computing device when it is determined that the point-to-point data tunnel has not been established. The first computing device is further configured to replicate the data to the second database by transmitting the data to the second computing device across the point-to-point data tunnel.

Patent Agency Ranking