One or more aspects described herein provide methods and systems for authoritatively confirming that a recipient is an intended recipient to receive personal data, and to securely transmit the personal data to the intended recipient, when both the sender and receiver are operating in a trustless ecosystem such as that used with blockchain technology. A computing device may receive an indication of a blockchain address used, by a sender computing device and via a blockchain, to send one or more virtual assets. The computing device may store an association between the blockchain address and the recipient. The computing device may send, to the sender computing device and in response to a query comprising the blockchain address, an indication of the recipient. The indication may be configured to cause the sender computing device to send, to the recipient, personal data associated with an owner of the one or more virtual assets.
Methods, systems, and devices for data management are described. A custodial token platform may receive a request, from a client application on a user device, to generate an attestation record associated with a user profile of the custodial token platform. The custodial token platform may verify, after receiving the request, that the user profile is associated with the set of attributes for the requested attestation record. The custodial token platform may broadcast, after verifying that the user profile is associated with the set of attributes, a first message configured to generate the attestation record via a blockchain network, where the first message is signed using a key associated with the custodial token platform. The custodial token platform may broadcast a second message configured to store a mapping of an identifier for the attestation record and a self-custody blockchain address associated with the user profile.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
A custodial token platform may implement wallet orchestration techniques. For example, the custodial token platform may process a corpus of transaction data associated with a custodial token platform. The data may indicate withdraw transactions of a plurality of crypto tokens from outbound addresses of the custodial token platform and cold addresses managed by the custodial token platform. The custodial token platform may simulate withdrawal transactions of the plurality of crypto tokens from the outbound addresses and the cold addresses based on the corpus of transaction data. The custodial token platform may determine a ratio between balances of each of the plurality of crypto tokens based on the simulated withdrawal transactions. The ratio between balances of each of the plurality of crypto tokens may be based on a maximum balance of crypto tokens to be stored in the outbound addresses and an average withdrawal time for withdrawal of the crypto tokens.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
4.
VERIFIER GENERATED COMMON REFERENCE STRING FOR ZERO-KNOWLEDGE PROOFS
Methods, systems, and devices for data management are described. A verifier node may generate a common reference string (CRS) using a random value. The verifier node may transmit a message including the CRS to a prover node. The prover node may execute a zero-knowledge proof (ZKP) using the CRS and transmit, to the verifier node, a commitment of an output of the ZKP. The commitment of the output may be configured to hide the output from the verifier node until the output is revealed to the verifier node. The verifier node may transmit the random value. The prover node may determine whether the CRS is generated using the random value from the verifier node and either abort the cryptographic operation or reveal the commitment. The verifier node may verify that the output is a valid ZKP if the prover node reveals the commitment.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
5.
VERIFIER GENERATED COMMON REFERENCE STRING FOR ZERO-KNOWLEDGE PROOFS
Methods, systems, and devices for data management are described. A verifier node may generate a common reference string (CRS) using a random value. The verifier node may transmit a message including the CRS to a prover node. The prover node may execute a zero-knowledge proof (ZKP) using the CRS and transmit, to the verifier node, a commitment of an output of the ZKP. The commitment of the output may be configured to hide the output from the verifier node until the output is revealed to the verifier node. The verifier node may transmit the random value. The prover node may determine whether the CRS is generated using the random value from the verifier node and either abort the cryptographic operation or reveal the commitment. The verifier node may verify that the output is a valid ZKP if the prover node reveals the commitment.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Systems and methods that mitigate network congestion on blockchain networks by supporting blockchain operations through off-chain interactions. For example, as communications to initiate off-chain events and/or blockchain operations are received, the system may determine various characteristics about the addresses involved. In particular, the system may determine whether the addresses correspond to cryptography-based, storage applications sharing a common platform service.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 47/12 - Avoiding congestionRecovering from congestion
Methods, systems, and devices for data management are described. A presentation service may receive an application programming interface (API) request to generate a first update to a content item for display at a client application. The presentation service may cause, based on receiving the API request, the first update to the content item to be displayed at the client application. The presentation service may synchronize the first update to the content item to a content management system. A service may transmit, to the content management system, a second update to the content item that is synchronized to the content management system. The presentation service may cause, based on transmitting the second update, the second update to the content item to be displayed at the client application.
Methods, systems, and devices for data management are described. A server may receive a plurality of parts of a secret from a computing device, where the plurality of parts may be individually encrypted and individually associated with respective public parts. The server may transmit a random challenge to the computing device. The computing device may transmit, to the server, a subset of parts in a decrypted state. The server may determine, using the subset of decrypted parts and a corresponding subset of respective public parts, that the subset of decrypted parts corresponds to a polynomial function with a degree corresponding to a quantity of parts in the subset of decrypted parts. The server may verify that the individually encrypted plurality of parts corresponds to a secret based on determining that the subset of decrypted parts corresponds to the polynomial function.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods, systems, and devices for tracking staked token returns are described. A custodial token platform receives a request to wrap an initial first amount of a first crypto token that is staked. The custodial token platform wraps the first amount of the first crypto token, resulting in a wrapped amount of a second crypto token. The custodial token platform detects a first trigger event while the user is associated with at least one prior principal amount and a prior return amount of the second crypto token. The custodial token platform determines an additional return amount. Determining involves calculating, using an updated conversion ratio, a first principal amount and a first return amount for the at least one prior principal amount, a second principal amount and a second return amount for the prior return amount, and combining the first return amount and the second return amount as the additional return amount.
Methods, systems, and devices for data management are described. A server may determine that a current characteristic of a crypto token satisfies a notification condition associated with an application on one or more user devices. The server may transmit a payload that causes a push notification associated with the application on a user device to be displayed at the user device. The push notification may be indicative of the notification condition. The server may receive, from the application, a request for information associated with the crypto token in response to an input activating the push notification at the user device. The server may transmit a response including the information associated with the crypto token. The response may cause display of a token page at the application associated with the crypto token including notification condition information included in the payload.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods, systems, and devices for using a device-specific key for key derivation are described. A user device receives, via a client application on the user device, a request to perform a cryptographic operation using a cryptographic key. The user device causes, after receiving the request, a secure subsystem of the user device to generate the cryptographic key using multiple iterations of a key derivation function and a device-specific key as input into the key derivation function. The device-specific key is stored in the secure subsystem. The user device performs a cryptographic operation using the cryptographic key.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods, systems, and devices for data management are described. A datacenter may include one or more servers and an offline key storage system. The datacenter may receive, via a server and from a multi-party computation (MPC) coordinator, a first request to access a key share associated with an MPC node. The server may transmit a second request for the key share associated with the MPC node via a first cross domain communication path to an offline key storage system. The offline key storage system may verify a digital signature included with the second request. The offline key storage system may transmit a response including the key share that is encrypted using an encryption key associated with the MPC node to the server via a second cross domain communication path. The server may transmit a communication including the encrypted key share to the MPC coordinator.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
18.
TOKEN TRANSFER VIA MESSAGING SERVICE OF WALLET APPLICATION
Methods, systems, and devices for data management are described. A wallet application may display one or more messages sent via a messaging service from a second user at a first user interface associated with a first user. The first user interface may receive one or more inputs to initiate a process for sending a crypto token to the second blockchain address of the second user. The wallet application may broadcast a message configured to transfer the crypto token from the first blockchain address to the second blockchain address via a blockchain network associated with the crypto token. The wallet application may update the first user interface to indicate the broadcasted message via the blockchain network. As such, users of the wallet application may transfer crypto tokens from a blockchain address via a blockchain network while, in a same user interface, sending and receiving messages via a messaging service.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods, systems, and devices for data management are described. A custodial token platform may determine whether one or more crypto tokens associated with a user account at the custodial token platform satisfy a criteria. The custodial token platform may display a user interface including an indication that staking is available for a first crypto token based on the first crypto token of the one or more tokens satisfying the criteria. The custodial token platform may receive one or more inputs from a user via the user interface, including an input that indicates an amount of the first crypto token to stake. The custodial token platform may generate messages configured to stake the amount of the first crypto token via a blockchain network associated with the first crypto token. Further, user may opt in to automatically stake future crypto tokens received by the user account and that are eligible for staking.
Methods, systems, and devices for staging of non-fungible tokens (NFTs) before deployment of the NFTs are described. A custodial token platform receives user inputs corresponding to a collection of NFTs associated with a smart contract to be stored on a blockchain distributed data store. The custodial token platform deploys the smart contract to the blockchain distributed data store based on the user inputs, receives data corresponding to the collection, and uploads the data corresponding to the collection to a distributed file system. Uploading the data corresponding to the collection includes uploading first content for a first NFT and uploading second content for a second NFT to the distributed file system. The custodial token platform receives an update to the first content, uploads the updated first content to the distributed file system, and updates the smart contract to include indications of the data corresponding to the collection and the updated first content.
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Methods, systems, and devices for data management are described. A custodial token platform may communicate with a client to support a multi-party computation (MPC) signature for a message. A central coordinator may receive, from the client, a request to sign a message using respective key shares generated by MPC nodes. The key shares may be generated in accordance with an access structure, where the access structure is configured based on a respective set of parameters for the MPC nodes. The central coordinator may transmit a request to execute a MPC signature using a respective key share. The central coordinator may maintain data associated with execution of the MPC signature function by a subset of the MPC nodes using the respective key shares. Additionally, the central coordinator may transmit, to the client, a result of execution of the MPC signature function by the subset of the MPC nodes.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods, systems, and devices for using a blockchain wallet for two-factor authentication are described. A custodial token platform implements a two-factor authentication process using a wallet to facilitate verifying a user identity accessing an application or service. The platform receives, from a client application on a user device, an authentication request that is associated with a first user account. The platform transmits a response indicating that a wallet authentication procedure is enabled and the response may include a wallet address. The platform receives a challenge request that includes the wallet address. The platform transmits a challenge response that includes a data payload to be signed using a private key associated with the wallet address. The platform receives a signed response message. The platform verifies that the signed response message is validly signed, and the platform transmits an indication that the signed response message is validly signed.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
23.
USING BLOCKCHAIN WALLET FOR TWO-FACTOR AUTHENTICATION
Methods, systems, and devices for using a blockchain wallet for two-factor authentication are described. A custodial token platform implements a two-factor authentication process using a wallet to facilitate verifying a user identity accessing an application or service. The platform receives, from a client application on a user device, an authentication request that is associated with a first user account. The platform transmits a response indicating that a wallet authentication procedure is enabled and the response may include a wallet address. The platform receives a challenge request that includes the wallet address. The platform transmits a challenge response that includes a data payload to be signed using a private key associated with the wallet address. The platform receives a signed response message. The platform verifies that the signed response message is validly signed, and the platform transmits an indication that the signed response message is validly signed.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Methods, systems, and devices for data management are described. A self-executing program of a blockchain network (e.g., blockchain distributed data store) may receive, from a client application, a first request to mint an identity attestation token for a user. The first request may include an indication of a wallet address for the user. The self-executing program may generate the identity attestation token that is indicative of first identity information, for the user, that is stored in an off-chain data source and broadcast a message that is configured to transfer the identity attestation token to the wallet address for the user. The self-executing program may receive, from a second application, a request for the first identity information for the user and send, to the second client application after receiving the request, a second message that includes information indicative of the off-chain data source.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods, systems, and devices for data management are described. A custodial token platform implements a preminting process to facilitate wrapping staked crypto tokens and enables unwrapping the wrapped crypto tokens for liquid staking crypto tokens. The platform receives a first request to wrap a first amount of a first crypto token that is staked. The platform associates a second amount of the second crypto token with the first user profile, where the second crypto token is transferrable and minted, and based on a first value of a current conversion ratio between the first crypto token and the second crypto token. The platform receives, from a first or second user profile, a second request to unwrap the second crypto token, which is based on a second value of the current conversion ratio between the first crypto token and the second crypto token.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Methods, systems, and devices for data management are described. A self-executing program of a blockchain distributed data store may receive a first message that includes indications of a sender address and a first amount of a first crypto token type to be received by a recipient address. The self-executing program may verify based at least in part on execution of the self-executing program, that the first message is validly signed by an operator associated with the self-executing program. The operator may be associated with a custodial token platform that verifies information and signs messages. The self-executing program may broadcast, after verifying that the first message is validly signed, one or more second messages that are configured to transfer the first amount of the first crypto token type to the recipient address.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
Methods, systems, and devices for data management are described. A self-executing program of a blockchain distributed data store may receive a first message that includes indications of a sender address and a first amount of a first crypto token type to be received by a recipient address. The self-executing program may verify based at least in part on execution of the self-executing program, that the first message is validly signed by an operator associated with the self-executing program. The operator may be associated with a custodial token platform that verifies information and signs messages. The self-executing program may broadcast, after verifying that the first message is validly signed, one or more second messages that are configured to transfer the first amount of the first crypto token type to the recipient address.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
Methods, systems, and devices for data management are described. A self-executing program of a blockchain distributed data store may receive a first message that includes indications of a sender address and a first amount of a first crypto token type to be received by a recipient address. The self-executing program may verify based at least in part on execution of the self-executing program, that the first message is validly signed by an operator associated with the self-executing program. The operator may be associated with a custodial token platform that verifies information and signs messages. The self-executing program may broadcast, after verifying that the first message is validly signed, one or more second messages that are configured to transfer the first amount of the first crypto token type to the recipient address.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Methods, systems, and devices for data management are described. A wallet service may include one or more application programming interface (API) endpoints. An API endpoint may receive a set of requests to broadcast messages via one or more blockchain networks, the set of requests including a first request to broadcast a first message via a first blockchain network and a second request to broadcast a second message via a second blockchain network. A first blockchain message may be generated using a mapping of a plurality of sets of network-specific parameters to respective blockchain networks, and the first blockchain message may include a first set of network-specific parameters. A second blockchain message may also be generated using the mapping, and the second blockchain message may include a second set of network-specific parameters. The first and second blockchain messages may be broadcast via respective nodes of the blockchain networks.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Methods, systems, and devices for data management are described. A wallet service may include one or more application programming interface (API) endpoints. An API endpoint may receive a set of requests to broadcast messages via one or more blockchain networks, the set of requests including a first request to broadcast a first message via a first blockchain network and a second request to broadcast a second message via a second blockchain network. A first blockchain message may be generated using a mapping of a plurality of sets of network-specific parameters to respective blockchain networks, and the first blockchain message may include a first set of network-specific parameters. A second blockchain message may also be generated using the mapping, and the second blockchain message may include a second set of network-specific parameters. The first and second blockchain messages may be broadcast via respective nodes of the blockchain networks.
Methods, systems, and devices for token management are described. A custodial token platform may communicate with a wallet application to support a multi-party computation wallet and transfer of private keys and key shards to support wallet cloning and key export. The custodial token platform may receive a message signed by a first key shard, sign the message using a second key shard, and broadcast the signed message to transfer a token between the wallet application and a recipient address. The custodial token platform may receive an encrypted payload including the first key shard, and transmit the encrypted payload to a second client application for decryption by the second client application on a second user device. Additionally, the wallet application may support export of the private key based one or multiple authentication techniques, which may cause retrieval of the key shards and display of an indication of the private key.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Methods, systems, and devices for token management are described. A custodial token platform may communicate with a wallet application to support a multi-party computation wallet and transfer of private keys and key shards to support wallet cloning and key export. The custodial token platform may receive a message signed by a first key shard, sign the message using a second key shard, and broadcast the signed message to transfer a token between the wallet application and a recipient address. The custodial token platform may receive an encrypted payload including the first key shard, and transmit the encrypted payload to a second client application for decryption by the second client application on a second user device. Additionally, the wallet application may support export of the private key based one or multiple authentication techniques, which may cause retrieval of the key shards and display of an indication of the private key.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods and systems are described herein for performing cryptographic operations. In particular, the system receives identifiers for blockchain operation requests (e.g., bids) for transferring control of a non-fungible token (NFT) from a first blockchain address to a second blockchain address in exchange for payment (e.g., fungible tokens). The system provides visual indications of the blockchain operation requests to a first user device associated with a first cryptography-based storage application (e.g., an address associated with a cryptographic wallet of a user). The system may receive, from the first user device, a command to approve one of the blockchain operation requests and may determine an on-chain program (e.g., smart contract) for transferring the NFT. The system may submit, to the on-chain program, a request to transfer the NFT to the second blockchain address associated with the approved first blockchain operation request.
Aspects of the disclosure relate to event processing. A computing platform may prefetch, prior to receipt of a purchase request, a plurality of pay to addresses (associated with an omnibus account, used to route funds from the omnibus account to a merchant account, and not associated with a particular merchant account when prefetched). The computing platform may receive, from a client, a request to make a purchase from a merchant, and may associate the client and the merchant with one of the prefetched pay to addresses/notify the client of the prefetched pay to address. The computing platform may monitor the prefetched pay to address for receipt of a predefined amount of cryptocurrency associated with the purchase. Upon detecting receipt of the predefined amount of cryptocurrency, the computing platform may transfer funds corresponding to the purchase from the omnibus account to an account for the merchant.
A custodial token platform may implement a single smart contract for outbound messages. The custodial token platform may deploy, to a blockchain distributed data store, a self-executing program that batches messages from the self-executing program to multiple addresses of the blockchain distributed data store that are external to a custodial token platform associated with the self-executing program. The custodial token platform may select, from the multiple withdrawal requests and based on selection criteria, a set of withdrawal requests to fulfill via a batch message from the self-executing program. The custodial token platform may broadcast, to the blockchain distributed data store, a message that calls the self-executing program. The message includes an indication of a set of external addresses associated with the set of withdrawal requests, and the message causes a transfer of a set of crypto tokens from the self-executing program to the external addresses via the batch message.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Methods and systems are described herein for predicting cryptographic asset distributions for a future period of time using artificial intelligence and/or machine learning (AI/ML) models. A system may receive a first dataset comprising time-series data over a past period of time. The cryptographic asset may be used to secure a blockchain. The system may determine, using AI/ML models with the first dataset, a prediction of the cryptographic asset distributions for the future period of time, wherein a cryptographic asset distribution occurs in response to a respective cryptographic asset being used to secure a respective blockchain. The system may also determine characteristics about a user and generate a recommendation to secure the blockchain based on the prediction and the one or more characteristics about the user.
Systems and methods are described herein for novel uses and/or improvements to blockchains and blockchain technology. As one example, methods and systems are described herein for facilitating initial deployments of cryptographic assets across computer networks in a cryptographically secure manner while mitigating interactions with computer programs that simulate human activity.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A custodial token platform may implement smart contracts for inbound transactions and flush transactions. The platform may deploy to a blockchain ledger, a plurality of inbound smart contracts, including first inbound smart contract for a first user of a plurality of users of a custodial token platform. The plurality of smart contracts may include a second inbound smart contract for a second user of the plurality of users of the custodial token platform. The platform may deploy a batch smart contract configured to control the plurality of inbound smart contracts. The platform may broadcast a transaction that calls the batch smart contract. The transaction causes a transfer of the first set of one or more crypto tokens of the first inbound smart contract and the second set of one or more crypto tokens of the second inbound smart contract to an outbound address of the custodial token platform.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
39.
SYSTEMS AND METHODS FOR A BLOCKCHAIN INTEROPERABILITY PLATFORM
Methods and systems described herein relate to an improved platform that provides support to the deposits and/or withdrawals of multi-network assets between two levels of a blockchain network. More specifically, the methods and systems provide this improved platform by introducing additional liquidity pools that allow for transfers without having to bridge between the two levels.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
40.
Display screen with transitional graphical user interface
A custodial token platform may implement wallet orchestration techniques. For example, the custodial token platform may monitor an inbound address that is associated with a user of the custodial token platform and configured to receive a plurality of different inbound transactions. The custodial token platform may also identify one or more inbound transactions that indicate transfer of a crypto token from a first external user address to the inbound address controlled by the custodial token platform and broadcast, based on a ratio between addresses a second transaction configured to transfer the amount of the crypto token from the inbound address to the outbound address that is controlled by the custodial token platform. The custodial token platform may also broadcast a withdrawal transaction configured to transfer an amount of the crypto token attributed to the outbound address to a second user address external to the custodial token platform.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A custodial token platform may implement wallet orchestration techniques. For example, the custodial token platform may process a corpus of transaction data associated with a custodial token platform. The data may indicate movements of a crypto token between outbound addresses of the custodial token platform and a cold address managed by the custodial token platform. The custodial token platform may simulate movements of the crypto token between the outbound addresses and the cold address using a plurality of balance configurations that define one or more balance thresholds for the outbound addresses and determine a balance configuration for the outbound address and the cold address based on the simulation. The custodial token platform may then broadcast one or more transactions that are configured to move the crypto token between the outbound addresses and the cold address based at least in part on the determined balance configuration.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
To support token recovery at a token management system, a custodial token platform may receive via a user interface, an identifier of a first blockchain transaction that is associated with a crypto token that is not supported by the custodial token platform and that is to be recovered from an inbound address of the custodial token platform. Information associated with the first blockchain transaction may be displayed, and the user interface may receive an indication of a user address associated with a user and that is external to the custodial token platform. The custodial token platform may verify the user address using a signed message and may broadcast, subsequent to verifying that the message is signed, a second blockchain transaction configured to transfer the crypto token from the inbound address to the user address.
Methods and systems are described herein for recommending network processing routes when conducting blockchain operations. For example, the system may receive a first user request to perform a first blockchain operation across one or more computer networks to access a first blockchain asset. The system may then determine a first processing characteristic for the first user request and a first plurality of locations of the first blockchain asset (e.g., across the one or more computer networks). The system may then determine a first plurality of network routes to a first subset of the first plurality of locations. The system may then filter the first plurality of network routes (e.g., based on the first processing characteristic) to generate a first subset of the plurality of network routes. Based on the first subset of the plurality of network routes, the system may generate a first recommendation for performing the blockchain operation.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
45.
Systems and methods for cryptocurrency pool management
A multitenant custodial wallet that provides users with a flexible primitive for managing discrete sets of cryptographic keys to interact with one or more blockchain protocols. By recognizing a pool primitive (e.g., pool object), a wallet can manage a set of keys as a single pool, in addition to managing keys individually.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods and systems are described herein for performing a cold start operation of a system for acquiring non-fungible tokens (NFTs) using on-chain data. In particular, a user feed initialization system may receive an on-chain address associated with a cryptography-based storage application (e.g., an address associated with a crypto wallet of a user) and determine, based on the on-chain address, NFTs that the user's cryptography-based storage application controls (e.g., NFTs that the user owns). The user feed initialization system may use on-chain data associated with the NFTs (e.g., via interrogating the on-chain programs associated with the NFTs that the user owns) to identify (e.g., via a machine learning model) other NFTs that the user may desire to acquire.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
50.
Generating a token data feed with privacy-preserving logins
Methods and systems are described herein for performing privacy-preserving operation of a system for acquiring non-fungible tokens (NFTs) using on-chain data. In particular, a user feed initialization system may determine that a privacy-preserving login is requested and may receive an on-chain address associated with a cryptography-based storage application (e.g., an address associated with a crypto wallet of a user) and determine, based on the on-chain address, NFTs that the user's cryptography-based storage application controls (e.g., NFTs that the user owns). The user feed initialization system may use on-chain data associated with the NFTs (e.g., via interrogating the on-chain programs associated with the NFTs that the user owns) to identify (e.g., via a machine learning model) other NFTs that the user may desire to acquire.
Methods and systems are described herein for a decision layer of a multi-layer data platform. The decision layer may process application queries and serve the queries based on a dataset of previously generated and indexed data or, as a last resort, queries the blockchain node directly. Using indexed blockchain data to serve application queries reduces latency and downtime of traditional systems that direct queries to blockchain nodes immediately. Furthermore, the decision layer overcomes high latency and downtime issues associated with a pool of load-balanced nodes by reducing the number of direct queries to a blockchain. When applications rely on data directly queried from a blockchain, they are susceptible to limited availability, a problem that the decision layer mitigates with indexed and updated blockchain data.
Methods and systems use a dynamic gas range approach for facilitating blockchain operations across multiple blockchain networks using a decentralized exchange. Use of the multi-modal dynamic gas range process allows for the system to separate the data collection operation (e.g., analyzing data across many layers, features, front-end systems, back-end systems, libraries, and/or channels of multiple blockchain networks) and the dynamic gas range estimation operation. By doing so, the system first allows static blockchain operation characteristics to be verified, reducing uncertainty related to the cost of the blockchain operation (e.g., due to impermanent loss and continually changing network congestion). For example, the system may perform verifications and validations on data in a piecemeal manner such that errors and/or network conditions affecting the blockchain operation may be detected prior to the blockchain operation being confirmed. Thus, the system may generate warnings and/or recommendations to mediate errors before a blockchain operation is confirmed.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
53.
Display screen with transitional graphical user interface
Methods and systems use a second dataset comprising independently validated data based on labeled blockchain operations previously processed through the blockchain network. The use of the second dataset in conjunction with the dataset comprising labeled blockchain characteristics data received from a plurality of sources provides a comprehensive input for a machine learning model to identify and label suspicious blockchain operations. By doing so, the system mitigates fraudulent, criminal, or suspicious transactions. For example, the system may send an alert to a user if a behavior type is deemed a high risk by the machine learning model; the system may furthermore hold the funds associated with the blockchain operation in a separate account while the transaction is manually reviewed. Thus, the system may generate alerts to notify a user of a suspicious behavior type or suspicious blockchain operation, divert funds associated with the transaction, and conduct a manual review of suspicious blockchain operations.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06K 9/62 - Methods or arrangements for recognition using electronic means
55.
SYSTEMS AND METHODS FOR SELECTIVELY INDEXING BLOCKCHAIN OPERATIONS BY PARSING RAW BLOCKCHAIN DATA FOR RELEVANT DATA PRIOR TO EXECUTING CONFIRMATORY FUNCTION CALLS
Methods and systems for parsing and identifying unindexed parameters and other information (e.g., a token contract address) that may appear encoded in event data. Specifically, the system may retrieve bytecode for an identified blockchain operation (e.g., a transaction). The system may then segregate the bytecode into constructor arguments, code sections, and/or metadata. The system may then parse the segregated portions of bytecode for bytecode representations that are based on function signatures, event signatures, token standards, and/or contract addresses. In some embodiments, the system may further narrow the pool of known bytecode representations that are compared against the remaining sections of bytecode based on bytecode representations corresponding to a particular type of blockchain network standard.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods and systems disclosed herein for parsing and identifying unindexed parameters and other information (e.g., a token contract address) may appear encoded in event data. Specifically, the system may retrieve bytecode for an identified blockchain operation (e.g., a transaction). The system may then segregate the bytecode into constructor arguments, code sections, and/or metadata. The system may then parse the segregated portions of bytecode for bytecode representations that are based on function signatures, event signatures, token standards, and/or contract addresses.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
57.
Systems and methods for processing blockchain operations featuring a plurality of blockchain operation types
Methods and systems for a processing architecture that maintains a separate logic pathway corresponding to a first operation type and a second operation type, until a blockchain operation is submitted to the blockchain network using either the first operation type or a second operation type. Following submission of the blockchain operation to the blockchain network, the architecture collapses the parallel logic pathways to a single logical pathway for both types.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
58.
SYSTEMS AND METHODS FOR MODIFYING PENDING BLOCKCHAIN OPERATIONS
Methods and systems for a processing architecture that maintains a separate logic pathway corresponding to a first operation type and a second operation type, until a blockchain operation is submitted to the blockchain network using either the first operation type or a second operation type. Following submission of the blockchain operation to the blockchain network, the architecture collapses the parallel logic pathways to a single logical pathway for both types.
Methods and systems for a processing architecture that maintains a separate logic pathway corresponding to a first operation type and a second operation type, until a blockchain operation is submitted to the blockchain network using either the first operation type or a second operation type. Following submission of the blockchain operation to the blockchain network, the architecture collapses the parallel logic pathways to a single logical pathway for both types.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
Systems and methods for a unified approach that is compatible with all blockchains, protocols, etc. The systems and methods use a bifurcated indexing system with a dynamically selected application service. The systems and methods bifurcate the indexing process into a storage layer and a compute layer.
G06F 16/25 - Integrating or interfacing systems involving database management systems
G06F 16/178 - Techniques for file synchronisation in file systems
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
61.
Systems and methods for creating a reorganization-immune blockchain index using mono-increasing sequence records
Systems and methods for creating a reorganization-immune blockchain index using mono-increasing sequence records are described. For example, the system may receive on-chain data for a plurality of blocks, wherein the plurality of blocks comprises a first block comprising a first event of a plurality of blockchain events within the on-chain data. The system may determine a first sequence number for the first event, wherein the first sequence number is based on a mono-increasing sequence record.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
62.
Systems and methods for supporting both batch processing and streaming data applications based on raw blockchain data
Systems and methods for supporting both batch processing and streaming data applications, to load and process data incrementally, while providing a near-constantly materialized dataset based on raw blockchain data, are described. For example, the system may receive first on-chain data in a first format via a first input stream, wherein the first on-chain data originates from a blockchain node of a blockchain network. The system may transform the first on-chain data to a second format for storage in a second dataset, wherein the second format comprises an unbounded table.
G06F 16/178 - Techniques for file synchronisation in file systems
G06F 16/25 - Integrating or interfacing systems involving database management systems
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
63.
Systems and methods for facilitating blockchain operations involving on chain and off chain interactions
Systems and methods recite the use of a platform service that determines a specific type of data (e.g., a processing metric) based on current network conditions (e.g., current congestion on a blockchain network). The processing metric is then used to account for variations in processing characteristics of a blockchain network occurring while the platform service integrates the on-chain and off-chain interactions. Accordingly, while the platform service performs the integration by triggering an on-chain blockchain operation in response to a communication to initiate an off-chain response, the processing metric accounts for any delays and/or volatility in the network conditions.
Methods and systems allow for the deployment of private (i.e., not necessarily publicly available) and reversible (or replaceable) smart contracts to create the stateless blockchain overlay layer. For example, the stateless blockchain overlay layer allows developers to deploy private smart contracts as overlays on top of any existing blockchain. The deployment of these private smart contracts is instantaneous, reversible, and free. Furthermore, the private smart contracts may be called at any block, including past ones. The private smart contracts may be used to expose arbitrary blockchain-based computation at arbitrary block heights to their developers.
G06F 16/21 - Design, administration or maintenance of databases
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
65.
Systems and methods for improved blockchain data indexing by avoiding throughput bottlenecks
Systems and methods for a unified approach that is compatible with all blockchains, protocols, etc. The systems and methods use a bifurcated indexing system with a dynamically selected application service. The systems and methods bifurcate the indexing process into a storage layer and a compute layer.
H04L 67/1074 - Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
66.
Systems and methods for generating secure, encrypted communications using multi-party computations in order to perform blockchain operations in decentralized applications
Methods and systems described herein relate to an improved platform that provides secure, encrypted communications across distributed computer networks when coordinating cryptography-based digital repositories in order to perform blockchain operations in decentralized applications. More specifically, the methods and systems provide this improved platform by introducing additional abstraction layers into a production service for computing signatures during multi-party computation (MPC) signing procedures.
Methods and systems described herein relate to an improved platform that provides secure, encrypted communications across distributed computer networks when coordinating cryptography-based digital repositories in order to perform blockchain operations in decentralized applications. More specifically, the methods and systems provide this improved platform by introducing additional abstraction layers into a production service for computing signatures during multi-party computation (MPC) signing procedures.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
68.
Systems and methods for performing blockchain operations using multi-party computation cohort management groupings
Methods and systems described herein relate to an improved platform that provides secure, encrypted communications across distributed computer networks when coordinating cryptography-based digital repositories in order to perform blockchain operations in decentralized applications. More specifically, the methods and systems provide this improved platform by introducing additional abstraction layers into a production service for computing signatures during multi-party computation (MPC) signing procedures.
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
69.
Systems and methods for mitigating network congestion on blockchain networks by supporting blockchain operations through off-chain interactions
Systems and methods that mitigate network congestion on blockchain networks by supporting blockchain operations through off-chain interactions. For example, as communications to initiate off-chain events and/or blockchain operations are received, the system may determine various characteristics about the addresses involved. In particular, the system may determine whether the addresses correspond to cryptography-based, storage applications sharing a common platform service.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 47/12 - Avoiding congestionRecovering from congestion
Methods and systems are described herein for a malware detection system that detects whether an on-chain program associated with a cryptographic token is malicious based on output of a machine learning model. The malware detection system may retrieve or generate attributes associated with an on-chain program and input those into a plurality of scripts within a malware detection script database to determine whether the on-chain program is malicious. The scripts may be generated based on an output of a machine learning model indicating whether the on-chain program is malicious.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
71.
SYSTEMS AND METHODS FOR MITIGATING NETWORK CONGESTION ON BLOCKCHAIN NETWORKS BY SUPPORTING BLOCKCHAIN OPERATIONS THROUGH OFF-CHAIN INTERACTIONS
Systems and methods that mitigate network congestion on blockchain networks by supporting blockchain operations through off-chain interactions. For example, as communications to initiate off-chain events and/or blockchain operations are received, the system may determine various characteristics about the addresses involved. In particular, the system may determine whether the addresses correspond to cryptography-based, storage applications sharing a common platform service.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
In some embodiments, in connection with an API request to transact with an entity, a first conversion rate associated with a first time may be determined, where the first conversion rate is a current conversion rate for an on-chain asset at the first time; Based on a monitoring of a blockchain, a receipt of the on-chain asset at a second blockchain address from a first blockchain address associated with the user may be detected on the blockchain. In response to the detection, the on-chain asset may be converted to an off-chain asset at a second time associated with a second conversion rate, the second conversion rate being the current conversion rate for the on-chain asset at the second time. An amount of the off-chain asset may be transmitted to the entity, where the amount of the off-chain asset sent to the entity is based on the first conversion rate.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/16 - Payments settled via telecommunication systems
G06Q 40/04 - Trading Exchange, e.g. stocks, commodities, derivatives or currency exchange
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 51/08 - Annexed information, e.g. attachments
73.
Systems and methods for predicting communication account identities across decentralized applications
Methods and systems that use of a multi-tiered machine learning architecture that aggregates traits of blockchain and off-chain operations. The multi-tiered machine learning architecture then uses this data to generate recommendations related to account identities for communications (e.g., blockchain operations) that occur across decentralized applications.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods and system for managing partial private keys for cryptography-based, storage applications used in blockchain operations and/or facilitating secure authentication when conducting blockchain operations using cryptography-based, storage applications. For example, the methods and system may perform a plurality of blockchain operations for digital assets stored in a first cryptography-based, storage application, wherein the first cryptography-based, storage application corresponds to a first partial private key, and wherein the first partial private key is stored on a first user device, and wherein the second partial private key is not accessible to platform service facilitating the first cryptography-based, storage application.
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods and system for managing partial private keys for cryptography-based, storage applications used in blockchain operations and/or facilitating secure authentication when conducting blockchain operations using cryptography-based, storage applications. For example, the methods and system may perform a plurality of blockchain operations for digital assets stored in a first cryptography-based, storage application, wherein the first cryptography-based, storage application corresponds to a first partial private key, and wherein the first partial private key is stored on a first user device, and wherein the second partial private key is not accessible to platform service facilitating the first cryptography-based, storage application.
H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
76.
SYSTEMS AND METHODS FOR MANAGING PARTIAL PRIVATE KEYS FOR CRYPTOGRAPHY-BASED, STORAGE APPLICATIONS USED IN BLOCKCHAIN OPERATIONS FOR DECENTRALIZED APPLICATIONS
Methods and system for managing partial private keys for cryptography-based, storage applications used in blockchain operations and/or facilitating secure authentication when conducting blockchain operations using cryptography-based, storage applications. For example, the methods and system may perform a plurality of blockchain operations for digital assets stored in a first cryptography-based, storage application, wherein the first cryptography-based, storage application corresponds to a first partial private key, and wherein the first partial private key is stored on a first user device, and wherein the second partial private key is not accessible to platform service facilitating the first cryptography-based, storage application.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
In some aspects, a computing system may use time series data and machine learning to determine an efficient time to send data to a blockchain. A machine learning model may use a variety of blockchain related data to predict a network usage costs for different times in the future. The predicted network usage costs may be used to determine when data should be sent for storing on the blockchain to reduce network resource costs for a computing system. For example, based on inputting the blockchain data into the machine learning model, a computing system may generate output indicating network usage costs for a future time period, with each network usage cost corresponding to a timestamp within the future time period. The computing system may determine a minimum network usage cost of the network usage costs and send data to a node in the blockchain network at the corresponding timestamp.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 47/83 - Admission controlResource allocation based on usage prediction
78.
Systems and methods for using secure, encrypted communications across distributed computer networks to provide variable resiliency when indexing blockchain states for performing blockchain operations in decentralized applications using cryptography-based digital repositories
Methods and systems are described herein for facilitating blockchain operations in decentralized applications by offering enhanced efficient when conducting blockchain operations using cryptography-based, digital ledgers through the use of specialized indexing. For example, as opposed to relying on raw blockchain data to power decentralized applications, the methods and systems use a blockchain indexer. The blockchain indexer provides a queryable record of a subset of blockchain operations.
Methods and systems are described for facilitating blockchain operations based on network congestion. The system may facilitate blockchain operations by generating recommendations for blockchain operations based on values for one or more blockchain operation characteristics that are determined based on a likelihood that a given blockchain operation will be completed in a timely manner. The system thus ensures accounts for transient congestion in a blockchain network, while also minimizing a burden on a user device attempting to perform a blockchain operation.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 47/12 - Avoiding congestionRecovering from congestion
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
80.
Systems and methods for a blockchain interoperability platform
Methods and systems described herein relate to an improved platform that provides support to the deposits and/or withdrawals of multi-network assets between two levels of a blockchain network. More specifically, the methods and systems provide this improved platform by introducing additional liquidity pools that allow for transfers without having to bridge between the two levels.
H04L 67/1008 - Server selection for load balancing based on parameters of servers, e.g. available memory or workload
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 67/1014 - Server selection for load balancing based on the content of a request
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
82.
Method and system for mobile cryptocurrency wallet connectivity
The method 10 for mobile cryptocurrency wallet connectivity can include facilitating a blockchain transaction S100 and establishing an initial connection between a mobile client and a web client S200. The system 20 for mobile cryptocurrency wallet connectivity can include a browser 110, one or more websites 120, a web client 130, a mobile application 140, and a backend server 150.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Systems and methods for facilitating secure blockchain operations in decentralized applications using cryptography-based, storage applications in computer networks
Methods and systems disclosed herein recite the use of linking cryptography-based digital repositories in order to perform blockchain operations in decentralized applications. For example, the system may link a first cryptography-based, storage application (e.g., a first digital wallet) with a second first cryptography-based, storage application (e.g., a second digital wallet). The first cryptography-based, storage application may correspond to a first private key, and wherein the first private key is stored on a first user device. The second cryptography-based, storage application corresponds to a first partial private key and a second partial private key, wherein the first partial private key is stored on a first remote device, and wherein the second partial private key is stored on the first user device.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
84.
Systems and methods for linking cryptography-based digital repositories to perform blockchain operations in decentralized applications
Methods and systems disclosed herein recite the use of linking cryptography-based digital repositories in order to perform blockchain operations in decentralized applications. For example, the system may link a first cryptography-based, storage application (e.g., a first digital wallet) with a second first cryptography-based, storage application (e.g., a second digital wallet). The first cryptography-based, storage application may correspond to a first private key, and wherein the first private key is stored on a first user device. The second cryptography-based, storage application corresponds to a first partial private key and a second partial private key, wherein the first partial private key is stored on a first remote device, and wherein the second partial private key is stored on the first user device.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
85.
SYSTEMS AND METHODS FOR FACILITATING SECURE BLOCKCHAIN OPERATIONS IN DECENTRALIZED APPLICATIONS USING CRYPTOGRAPHY-BASED, STORAGE APPLICATIONS IN COMPUTER NETWORKS
Methods and systems disclosed herein recite the use of linking cryptography-based digital repositories in order to perform blockchain operations in decentralized applications. For example, the system may link a first cryptography-based, storage application (e.g., a first digital wallet) with a second first cryptography-based, storage application (e.g., a second digital wallet). The first cryptography-based, storage application may correspond to a first private key, and wherein the first private key is stored on a first user device. The second cryptography-based, storage application corresponds to a first partial private key and a second partial private key, wherein the first partial private key is stored on a first remote device, and wherein the second partial private key is stored on the first user device.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
86.
Systems and methods for maintaining secure, encrypted communications across distributed computer networks by linking cryptography-based digital repositories in order to perform blockchain operations in decentralized applications
Methods and systems are described herein for facilitating blockchain operations in decentralized applications by offering enhanced efficient when conducting blockchain operations using cryptography-based, digital ledgers through the use of specialized indexing. For example, as opposed to relying on raw blockchain data to power decentralized applications, the methods and systems use a blockchain indexer. The blockchain indexer provides a queryable record of a subset of blockchain operations.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Systems and methods for selecting secure, encrypted communications across distributed computer networks for cryptography-based digital repositories in order to perform blockchain operations in decentralized
Methods and systems are described herein for facilitating blockchain operations in decentralized applications by offering enhanced efficient when conducting blockchain operations using cryptography-based, digital ledgers through the use of specialized indexing. For example, as opposed to relying on raw blockchain data to power decentralized applications, the methods and systems use a blockchain indexer. The blockchain indexer provides a queryable record of a subset of blockchain operations.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
Systems and methods for using secure, encrypted communications across distributed computer networks to efficiently index blockchain states for performing blockchain operations in decentralized applications using cryptography-based digital repositories
Methods and systems are described herein for facilitating blockchain operations in decentralized applications by offering enhanced efficient when conducting blockchain operations using cryptography-based, digital ledgers through the use of specialized indexing. For example, as opposed to relying on raw blockchain data to power decentralized applications, the methods and systems use a blockchain indexer. The blockchain indexer provides a queryable record of a subset of blockchain operations.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
One or more aspects described herein provide methods and systems for authoritatively confirming that a recipient is an intended recipient to receive personal data, and to securely transmit the personal data to the intended recipient, when both the sender and receiver are operating in a trustless ecosystem such as that used with blockchain technology. A computing device may receive an indication of a blockchain address used, by a sender computing device and via a blockchain, to send one or more virtual assets. The computing device may store an association between the blockchain address and the recipient. The computing device may send, to the sender computing device and in response to a query comprising the blockchain address, an indication of the recipient. The indication may be configured to cause the sender computing device to send, to the recipient, personal data associated with an owner of the one or more virtual assets.
Systems and methods for using secure, encrypted communications across distributed computer networks to efficiently update cryptography-based digital repositories for performing blockchain operations in decentralized applications
Methods and systems are described herein for facilitating blockchain operations in decentralized applications by offering enhanced efficient when conducting blockchain operations using cryptography-based, digital ledgers through the use of specialized indexing. For example, as opposed to relying on raw blockchain data to power decentralized applications, the methods and systems use a blockchain indexer. The blockchain indexer provides a queryable record of a subset of blockchain operations.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods and systems for improved indexing of non-standardized, custom smart contracts. The improved indexer identifies custom landmarks (e.g., portions of bytecode indicative of custom smart contract transactions or particular functions in those transactions) that are indicative of transactions involving custom smart contracts (as well as the various attributes of those custom smart contracts). The indexer does this by first collecting bytecode for a subset of known transactions involving the custom smart contracts. The indexer then compares the bytecode of the custom smart contracts in the subset to identify the landmarks or probabilities that portions of the bytecode correspond to landmarks. Once these landmarks are identified (or a probability of the landmark is above a certain threshold), the indexer may designate these as known landmarks. The indexer may then compare the portion of the bytecode corresponding to the known landmark to raw bytecode. Upon detecting a match (or a probability of a match above a certain threshold), the indexer may identify the transaction and/or attributes of the transaction.
Systems and methods for generating secure, encrypted communications across distributed computer networks for authorizing use of cryptography-based digital repositories in order to perform blockchain operations in decentralized applications
Methods and systems for the use of multi-party computation (“MPC”) key systems that involve the use of multiple parties, each of which hold respective private data that may be used to evaluate a computation without ever revealing any of the private data held by each party to perform blockchain operations. Using the MPC key systems, the methods and systems generate secure, encrypted communications across distributed computer networks for authorizing use of cryptography-based digital repositories in order to perform blockchain operations in decentralized applications.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
93.
Systems and methods for providing secure, encrypted communications across distributed computer networks by coordinating cryptography-based digital repositories in order to perform blockchain operations in decentralized applications
Methods and systems for the use of multi-party computation (“MPC”) key systems that involve the use of multiple parties, each of which hold respective private data that may be used to evaluate a computation without ever revealing any of the private data held by each party to perform blockchain operations. Using the MPC key systems, the methods and systems generate secure, encrypted communications across distributed computer networks for authorizing use of cryptography-based digital repositories in order to perform blockchain operations in decentralized applications.
Systems and methods for requesting secure, encrypted communications across distributed computer networks for authorizing use of cryptography-based digital repositories in order to perform blockchain operations in decentralized applications
Methods and systems for the use of multi-party computation (“MPC”) key systems that involve the use of multiple parties, each of which hold respective private data that may be used to evaluate a computation without ever revealing any of the private data held by each party to perform blockchain operations. Using the MPC key systems, the methods and systems generate secure, encrypted communications across distributed computer networks for authorizing use of cryptography-based digital repositories in order to perform blockchain operations in decentralized applications.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
95.
Systems and methods for generating secure, encrypted communications across distributed computer networks for authorizing use of cryptography-based digital repositories in order to perform blockchain operations in decentralized applications
Methods and systems for the use of multi-party computation (“MPC”) key systems that involve the use of multiple parties, each of which hold respective private data that may be used to evaluate a computation without ever revealing any of the private data held by each party to perform blockchain operations. Using the MPC key systems, the methods and systems generate secure, encrypted communications across distributed computer networks for authorizing use of cryptography-based digital repositories in order to perform blockchain operations in decentralized applications.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
96.
Risk Analysis System for Cold Restore Requests for Digital Wallets
Computing devices, methods, systems, and computer-readable media for analyzing requests to perform cold restores of cryptocurrencies are described herein. A computing device may receive a request for a cold restore of one or more cryptocurrencies stored by a digital wallet. The one or more cryptocurrencies may be identified, and data may be received from a database. The computing device may determine, based on the data, a risk score associated with the transfer of the one or more cryptocurrencies from a cold state to a hot state. The risk score may be generated using a machine learning model, such as a machine learning model that may be trained to output a risk score associated with a cold restore based on recent transaction activity. The computing device may output, based on comparing the risk score to a threshold, an indication of whether the request should be granted.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 40/04 - Trading Exchange, e.g. stocks, commodities, derivatives or currency exchange
97.
Display screen with icon group and display screen with icon set