WO2023122182A1 - Jetons cryptographiques à expiration automatique et transactions pour identifier des articles numériques basés sur le temps uniques - Google Patents

Jetons cryptographiques à expiration automatique et transactions pour identifier des articles numériques basés sur le temps uniques Download PDF

Info

Publication number
WO2023122182A1
WO2023122182A1 PCT/US2022/053669 US2022053669W WO2023122182A1 WO 2023122182 A1 WO2023122182 A1 WO 2023122182A1 US 2022053669 W US2022053669 W US 2022053669W WO 2023122182 A1 WO2023122182 A1 WO 2023122182A1
Authority
WO
WIPO (PCT)
Prior art keywords
token
sub
tokens
network
data
Prior art date
Application number
PCT/US2022/053669
Other languages
English (en)
Inventor
Ryan Weldon
Hemingway Huynh
Original Assignee
13Th Bridge Games Studio, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 13Th Bridge Games Studio, Inc. filed Critical 13Th Bridge Games Studio, Inc.
Publication of WO2023122182A1 publication Critical patent/WO2023122182A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • the present disclosure is generally related to information security, cryptographic mechanisms and/or cryptographic arrangements for secret or secure communications, cryptographic mechanisms using hash chains, hash trees, and/or blockchains, computer/video games including electronic games using cryptography, and in particular, to self-expiring tokens and transactions based on gameplay experiences in computer/video games.
  • a blockchain is a shared or distributed ledger that records transactions such as orders, payments, activities, and the like.
  • the blockchain or ledger is a list of records (referred to as “blocks”) that are linked using cryptography, where each block generally includes a cryptographic hash of the previous block, a timestamp, and transaction data.
  • Each participant of a blockchain has their own version of the ledger, and thus, a version of the truth that may differ from other participants.
  • a blockchain is typically managed by a peer-to- peer network collectively adhering to a protocol for inter-node communication and validating new blocks.
  • Some nodes validate transactions, generate new blocks based on each validated transaction, and broadcast the new blocks to other nodes for addition to their local versions of the blockchain. Once recorded, the data in any given block cannot be altered retroactively without alteration of all subsequent blocks, which requires consensus of the network majority.
  • Blockchain technologies may be used for asset tokenization management.
  • Figure 1 depicts an example computing environment.
  • Figure 2 depicts an example asset self-expiring transaction and unique time based digital asset ownership system.
  • Figure 3 depicts components of an example token/blockchain engine.
  • Figure 4 depicts an example procedure for minting tokens.
  • Figure 5 illustrates an example computing system suitable for practicing various aspects of the present disclosure.
  • a blockchain (e.g., a blockchain 315 in Figure 3) is a database (DB) or distributed ledger containing information (e.g., records of financial transactions and/or other transactions) that can be simultaneously used and shared within a large decentralized, publicly accessible network. Additionally or alternatively, a blockchain is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets (tangible and intangible) in a network.
  • a blockchain includes a growing list of records, called blocks, that are linked together using some identifier or other like mechanism. Each block contains information about the block previous to it, forming a chain, with each additional block reinforcing the ones before it.
  • An advantage of using blockchain technology is that transactions performed on a blockchain are immutable, which means that the transactions cannot be changed or altered without permission from the network. This creates an accurate and nearly unchangeable record (or chain of records) that can be used to verify each transaction, such as each transfer of title or ownership, identity changes and/or changes/updates to identifying information, and the like.
  • blocks are linked together using cryptography where each block contains a cryptographic hash of a previous block, a timestamp, and transaction data.
  • the timestamp proves that the transaction data existed when the block was published in order to get into its hash.
  • Examples of the types of information that is/are included in a block include a timestamp (e.g., the time when the block was mined, minted, or otherwise created), a block number (e.g., the length of the blockchain in number of blocks), fee per gas or gas price (e.g., the minimum fee per gas required for a transaction to be included in the block), difficulty (e.g., the effort required to mine the block), mix hash (e.g., a unique identifier for the block), parent hash (e.g., a unique identifier for the block that came before (e.g., the previous block or the top-most block)), transaction data (e.g., the transaction included in the block (see e.g., inputs 301 in Figure 3)), state root (e.g., the entire state of the system including, for example, account balances, contract storage, contract code, account nonces, identity documents and/or identity data, and/or the like), and a nonce (e.g.,
  • Blockchains can be managed by a peer-to-peer network for use as a publicly distributed ledger, where nodes collectively adhere to a protocol to communicate and validate new blocks. These blockchains are referred to as “public blockchains”. Public blockchains are permission-less by nature, allowing most users to join, and are usually decentralized (e.g., stored and updated by multiple compute nodes). By contrast, a private blockchain is a blockchain network where only one or a few authorities or organizations have control over the blockchain network including, for example, rules and/or policies for adding new blocks to the blockchain and the like.
  • Tokenization refers to the process of substituting a sensitive data element with a nonsensitive equivalent (referred to as a “token”) that retains all the essential information about the data without compromising its security.
  • the token is a reference, code, or identifier that maps back to the sensitive data through a tokenization system.
  • the term “token” may refer to a fungible token (FT), a semi-FT, a non-fungible token (NFT), an NFT- profile picture (PFP), a unit of cryptocurrency, a decentralized autonomous organization (DAO) financial transaction record and/or program rule, and/or other like digital assets.
  • FT fungible token
  • NFT non-fungible token
  • PFP NFT- profile picture
  • DAO decentralized autonomous organization
  • NFT is a unique and non-interchangeable unit of data stored on a blockchain.
  • NFTs can be associated with reproducible digital files such as documents, photos, videos, and/or audio.
  • NFTs use a digital ledger (e.g., blockchain) to provide a certificate of authenticity or proof of ownership, but do not restrict the sharing or copying of the underlying digital files.
  • private blockchains can be used to store or record NFTs.
  • interchangeability distinguishes NFTs from blockchain cryptocurrencies (e.g., Bitcoin, Ethereum®, and the like) and FTs.
  • the mapping from original data to a token uses methods which render tokens infeasible to reverse in the absence of the tokenization system, for example, using tokens created from random numbers.
  • Tokenization systems provide data processing applications with the authority and interfaces to request tokens, or detokenize back to sensitive data.
  • An advantage of using blockchain for asset management is that transactions performed on a blockchain are immutable, which means that the transactions cannot be changed or altered without permission from the network. This creates an accurate and nearly unchangeable record for assets that can be used to verify each transaction, such as each transfer of title or ownership. Additionally, the blockchain makes sharing the transaction history across multiple parties more fluid and flexible.
  • FIG. 1 depicts an example of an environment 100 in cloud computing services, gaming services, and/or blockchain services can be used.
  • the environment 100 includes various compute devices 102a, 102b, 102c, 102d, and 102e (collectively referred to as “client devices 102” or “client device 102”), application (app) servers 120-1 - 120- (w here is a number; collectively referred to as “app servers 120” or “app server 120”), cloud computing service 130 (also referred to herein as a “cloud system 130”, “cloud service 130”, “cloud 130”, “gaming system 130”, “game service 130”, “blockchain service 130”, “NFT service 130”, “system 130”, and/or the like), one or more databases (DBs) 140, subscriber platforms (SPs) 150-1 - 150-F (where Fis anumber; collectively referred to as “SPs 150” or “SP 150”), each of which may be connected to one another via a network 199 (which may be the same or similar as the network 599 discussed
  • the compute devices 102 can be implemented or embodied as any suitable computing device(s) or other data processing apparatus or systems usable by users to access the system 130 and/or individual SPs 150.
  • compute device 102a is depicted as a desktop computer
  • compute device 102b is depicted as a laptop computer
  • compute device 102c is depicted as a video game console
  • compute device 102d is depicted as a tablet computer
  • compute device 102e is depicted as an extended reality (XR) headset which may be or include a virtual reality (VR), augmented reality (AR), and/or mixed reality (MR) device(s).
  • XR extended reality
  • VR virtual reality
  • AR augmented reality
  • MR mixed reality
  • any additional or alternative compute device(s) 102 can be included or otherwise access services from the cloud 130 and/or SP(s) 150 including, for example, work stations, personal digital assistants (PDAs), pagers, portable media players, smartphones, mobile (handheld) video game consoles, video game controllers, arcade games, a head-up display (HUD) device/system, in-vehicle compute systems, drones or robots, a smart appliance, a network appliance, and/or other computing device capable of interfacing directly or indirectly with the system 130 and/or individual SPs 150 via network 199.
  • the compute devices 102 include hardware components, such as processors, a memory /storage, and a communication interfaces.
  • each compute device 102 sends and receives HTTP messages where a header of each message includes various operating parameters and the body of the such messages may include queries, parameters, program code, and/or source code documents (e.g., HTML, XML, JSON, Apex®, CSS, JSP, MessagePackTM, Apache® ThriftTM, ASN.l, Google® Protocol Buffers (protobuf), DBOs, or some other like object(s)/document(s)).
  • source code documents e.g., HTML, XML, JSON, Apex®, CSS, JSP, MessagePackTM, Apache® ThriftTM, ASN.l, Google® Protocol Buffers (protobuf), DBOs, or some other like object(s)/document(s)
  • Such browsers can include a suitable browser engine such as, for example, a trident engine (e.g., Microsoft® Internet Explorer®, Tencent® Traveler®, and/or the like), a gecko engine (e.g., Mozilla® Firefox®, Tor Browser, and/or the like), a WebKit engine (e.g., Apple® Safari®, the Nintendo® NetFront Browser NX®, Google® Chrome® for iOS, and/or the like), blink engine (e.g., Google® Chrome®, Opera®, Microsoft® Edge®, and/or the like), Presto-based (e.g., Nintendo® DS® browser, and/or the like), and/or proprietary browser engines (e.g., Ekioh® Flow®, the play station 5 (PS5) secret web browser, and/or the like).
  • a trident engine e.g., Microsoft® Internet Explorer®, Tencent® Traveler®, and/or the like
  • a gecko engine e.g., Mozilla® Firefox®
  • the various app(s) 110 discussed herein may enable the compute devices 102 to provide authentication credentials (e.g., user identifier (ID), password, personal identification number (PIN), digital certificates, and/or the like) to the system 130 so that the system 130 may authenticate the identity of a user of the compute device 102.
  • authentication credentials e.g., user identifier (ID), password, personal identification number (PIN), digital certificates, and/or the like
  • the apps 110 include a gaming app 116a and a token and/or blockchain (TBC) app 116b (also referred to as “NFT app 116b”, “blockchain app 116b”, “wallet 116b”, and/or the like).
  • the gaming app 116a is configured to interact with the system 130 via one or more app servers 120 to consume gaming service(s) 136a
  • the TBC app 116b that is configured to interact with the TBC service(s) 136b (also referred to as “NFT service(s) 136b”, “NFT engine(s) 136b”, or the like) to obtain token and/or blockchain services. Examples of these services 136a, 136b are discussed infra.
  • the TBC app 116b is a digital wallet (referred to herein as “wallet 116b”), which is an app used to store a user’s credentials (e.g., cryptographic private keys and/or public keys) that are associated with a state of a user’s account in the blockchain.
  • the wallet 116b allows the user to make transactions, where the public key of the public/private key pair allows other wallets to make payments to the wallet 116b (e.g., using the wallet’s 116b network address, app/wallet identifier, or the like) and the private key of the public/private key pair allows the wallet 116b spend currency or cryptocurrency stored by the wallet 116b and/or in the blockchain.
  • one or more systems/servers 120, 130, 150 provide respective services 136a, 136b, 136c as separate processes, by implementing autonomous software agents, and/or as other individual systems or the like.
  • individual servers 120, 150 are dedicated to perform separate/respective services 136a, 136b, 136c, where the servers 120, 150 obtain requests from client devices 102 and provide information/data to the back-end system 130 to perform various actions, tasks, operations, and the like to provide their respective services 136a, 136b, 136c.
  • Transactions are functions that change the state of the blockchain.
  • each transaction is put into a batch, either alone or with other related transactions, then sent to TBC service(s) 136b of another node for processing.
  • a batch is a group of one or more related transactions, and in some implementations, a batch is an atomic unit of state change for a particular blockchain.
  • Transactions may be processed according to transaction logic (sometimes referred to as a “transaction family”), which is application-specific business logic (e.g., SP apps and/or the like) that defines a set of operations or transaction types that are allowed on a particular blockchain.
  • This transaction logic implements a data model and transaction language for one or more apps (e.g., apps 110).
  • the API(s) 138 may be implemented as a remote API or a web API, such as a Representational State Transfer (REST or RESTful) API, Simple Object Access Protocol (SOAP) API, salesforce.com Apex API, and/or some other like API.
  • REST or RESTful Representational State Transfer
  • SOAP Simple Object Access Protocol
  • salesforce.com Apex API salesforce.com Apex API, and/or some other like API.
  • a token verification sub-process 203 is performed.
  • the TBC processor(s) 136b performs the verification process.
  • decentralized servers e.g., one or more app servers 120, one or more SP servers 150, one or more user devices 102, and/or the like
  • the TBC processor(s) 136b perform a sub-token generation subprocess 204.
  • the microservices of the TBC engine 300 include a smart contracts engine (SCE) 310, a set of smart contracts 311, authentication engine 312, metadata 313, Flow microservices 314, one or more blockchains 315, issuance microservice 316, transaction content 317, on-chain microservice 318, off-chain microservice 319, and minting engine 320.
  • SCE smart contracts engine
  • the inputs 301 are received via a front-end API, WS, middleware, software connectors, and/or some other interface (e.g., not shown by Figure 3).
  • the input data 301 can be uploaded by individual users (e.g., using their client/wallet apps 116b) using a suitable UI 139.
  • This user interface can also be used to provide (upload) electronic documents/information to the server(s) 120.
  • the inputs 301 can be provided via third party web/mobile apps and/or Web2 apps using suitable APIs and the like.
  • the UID may be a version 4 Universally Unique Identifier (UUID) that is randomly generated according to Leach et al., “A Universally Unique IDentifier (UUID) URN Namespace”, Internet Engineering Task Force (IETF), Network Working Group, Request for Comments (RFC): 4122 (July 2005) (“[RFC4122]”), which is hereby incorporated by reference in its entirety.
  • UUID Universally Unique IDentifier
  • IETF Internet Engineering Task Force
  • RRC Request for Comments
  • 4122 July 2005
  • digital items e.g., gaming items
  • in-game items or in-game elements such as avatar skins, game items, game mechanics, game components, and/or other like game-related elements can be made into respective tokens.
  • clips of gameplay experiences or actions e.g., “moments” or “scenes”
  • individual clips or other recordings of the virtual concert can be minted into different tokens.
  • a player performing a dunk can be minted into a token and/or a live video of the user (in the real-world or the player-character within the game) during and immediately after the dunk is performed can be minted into a the same token or minted as a different token.
  • Another example includes a boxing video game where one boxer knocks out another boxer, and this in-game experience can be minted as a token.
  • different trigger conditions, events, or parameters can be used to identify and record different moments. In each of the aforementioned examples, individual clips of each of these moments can be minted into respective tokens.
  • the game-specific tokens include court tokens, which are ownable virtual property (e.g., real estate) that are designed to allow brands and influencers with sizable audiences a way to engage with and grow their audiences, while also providing revenue-generating and marketing opportunities.
  • the non-game-specific tokens include items that cannot be equipped in the game and exist separately from in-game experiences. Examples of non-game-specific tokens include sports highlights, digital art, songs, and clips/moments.
  • non-game-specific tokens/collectibles are primarily offered through partnerships with brands and/or individual token creators. Participants in the SRS economy will be able to sell and purchase tokens in the game's marketplace and in other separate marketplaces/platforms.
  • Chips can be purchased in the store, won in tournaments and single games, and earned via progression. Chips are used to purchase some items in the store, to level up players (e.g., provide access to a greater array of character attributes and/or in-game items), and to enter some tournaments.
  • Gold Bars can be purchased in the store, won in tournaments, and occasionally earned via progression. Gold Bars are used to purchase season passes and items in the store, and to enter some tournaments.
  • Legend points are XPs that determine a gamer’s status on the leaderboard as well as the gamer’s legend status. Legend points are available to all gamers at no cost.
  • the cryptocurrency is incorporated for use in special tournaments that gamers can participate in. Cryptocurrency will be incorporated in a seamless and easy-to-utilize fashion, the details of which will be shared shortly.
  • NVM can include read-only memory (ROM) (e.g., including programmable ROM (PROM), erasable PROM (EPROM), electrically EPROM (EEPROM), flash memory (e.g., NAND flash memory, NOR flash memory, and the like), solid-state storage (SSS) or solid-state ROM, programmable metallization cell (PMC), and/or the like), non-volatile RAM (NVRAM), phase change memory (PCM) or phase change RAM (PRAM) (e.g., Intel® 3D XPointTM memory, chalcogenide RAM (CRAM), Interfacial Phase-Change Memory (IPCM), and the like), memistor devices, resistive memory or resistive RAM (ReRAM) (e.g., memristor devices, metal oxide-based ReRAM, quantum dot resistive memory devices, and the like), conductive bridging RAM (or PMC), magnetoresistive RAM (MRAM), electrochemical RAM (ECRAM), ferroelectric RAM (FeRAM), antifer
  • the computational logic 504x may be stored or loaded into memory circuitry 503 as instructions 503x, or data to create the instructions 503x, which are then accessed for execution by the processor circuitry 501 via the IX 506 to carry out the various functions, processes, methods, algorithms, operations, tasks, actions, techniques, and/or other aspects described herein (see e.g., Figures 1-4).
  • the various elements may be implemented by assembler instructions supported by processor circuitry 501 or high-level languages that may be compiled into instructions 501x, or data to create the instructions 501x, to be executed by the processor circuitry 501.
  • the OSs also include one or more libraries, drivers, APIs, firmware, middleware, software glue, and the like, which provide program code and/or software components for one or more apps to obtain and use the data from other apps operated by the compute node 500, such as the various subsystems of the system 130, TBC engine 300, and/or any other device or system discussed herein.
  • one or more of the subsystems of the system 130, TBC engine 300, and/or any other device or system discussed herein may be operated, at least in part, on custom-designed silicon core(s).
  • These “hardware-ized” subsystems may be integrated into a larger chipset but may be more efficient than using general purpose processor cores.
  • the TRx 507b also includes a transmit signal path, which comprises circuitry configured to convert digital baseband signals provided by the modem 507a to be converted into analog RF signals (e.g., modulated waveform) that will be amplified and transmitted via an antenna array including one or more antenna elements (not shown).
  • the antenna array may be a plurality of microstrip antennas or printed antennas that are fabricated on the surface of one or more printed circuit boards.
  • the antenna array may be formed in as a patch of metal foil (e.g., a patch antenna) in a variety of shapes, and may be coupled with the TRx 507b using metal transmission lines or the like.
  • the network interface circuitry /controller (NIC) 507c provides wired communication to the network 599 and/or to other devices using a standard communication protocol such as, for example, Ethernet (e.g., [IEEE802.3]), Ethernet over GRE Tunnels, Ethernet over Multiprotocol Label Switching (MPLS), Ethernet over USB, Controller Area Network (CAN), Local Interconnect Network (LIN), DeviceNet, ControlNet, Data Highway+, PROFIBUS, or PROFINET, among many others.
  • Network connectivity may be provided to/from the compute node 500 via the NIC 507c using a physical connection, which may be electrical (e.g., a “copper interconnect”), fiber, and/or optical.
  • Coupled may mean two or more elements are in direct physical or electrical contact with one another, may mean that two or more elements indirectly contact each other but still cooperate or interact with each other, and/or may mean that one or more other elements are coupled or connected between the elements that are said to be coupled with each other.
  • directly coupled may mean that two or more elements are in direct contact with one another.
  • communicatively coupled may mean that two or more elements may be in contact with one another by a means of communication including through a wire or other interconnect connection, through a wireless communication channel or ink, and/or the like.
  • transfer at least in some examples refers to the movement or conveyance of data between two or more entities or elements. Additionally or alternatively, the term “transfer” at least in some examples refers to the redistribution or conveyance of right, title, interest, possession, or control of an asset or property.
  • transferor at least in some examples refers to the an entity that is to transfer or has transferred assets to another entity.
  • transferee at least in some examples refers to the an entity that received a transferred asset.
  • compute node or “compute device” at least in some examples refers to an identifiable entity implementing an aspect of computing operations, whether part of a larger system, distributed collection of systems, or a standalone apparatus.
  • a compute node may be referred to as a “computing device”, “computing system”, or the like, whether in operation as a client, server, or intermediate entity.
  • Specific implementations of a compute node may be incorporated into a server, base station, gateway, road side unit, on-premise unit, user equipment, end consuming device, appliance, or the like.
  • the servers may represent a cluster of servers, a server farm, a cloud computing service, or other grouping or pool of servers, which may be located in one or more datacenters.
  • the servers may also be connected to, or otherwise associated with, one or more data storage devices (not shown).
  • the servers may include an operating system (OS) that provides executable program instructions for the general administration and operation of the individual server computer devices, and may include a computer-readable medium storing instructions that, when executed by a processor of the servers, may allow the servers to perform their intended functions.
  • OS operating system
  • Suitable implementations for the OS and general functionality of servers are known or commercially available, and are readily implemented by persons having ordinary skill in the art.
  • the term “architecture” at least in some examples refers to a computer architecture or a network architecture.
  • the term “computer architecture” at least in some examples refers to a physical and logical design or arrangement of software and/or hardware elements in a computing system or platform including technology standards for interacts therebetween.
  • the term “network architecture” at least in some examples refers to a physical and logical design or arrangement of software and/or hardware elements in a network including communication protocols, interfaces, and media transmission.
  • appliance refers to a computer device or computer system with program code (e.g., software or firmware) that is specifically designed to provide a specific computing resource.
  • virtual appliance at least in some examples refers to a virtual machine image to be implemented by a hypervisor- equipped device that virtualizes or emulates a computer appliance or otherwise is dedicated to provide a specific computing resource.
  • security appliance at least in some examples refers to a computer appliance designed to protect computer networks from unwanted traffic and/or malicious attacks.
  • policy appliance at least in some examples refers to technical control and logging mechanisms to enforce or reconcile policy rules (information use rules) and to ensure accountability in information systems.
  • the term “session layer” at least in some examples refers to an abstraction layer that controls dialogues and/or connections between entities or elements, and may include establishing, managing and terminating the connections between the entities or elements.
  • the term “transport layer” at least in some examples refers to a protocol layer that provides end-to-end (e2e) communication services such as, for example, connection-oriented communication, reliability, flow control, and multiplexing.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

La présente divulgation concerne de manière générale la sécurité des informations, des mécanismes cryptographiques et/ou des agencements cryptographiques pour des communications secrètes ou sécurisées, des mécanismes cryptographiques utilisant des chaînes de hachage, des arbres de hachage et/ou des chaînes de blocs, des jeux informatiques/vidéos comprenant des jeux électroniques utilisant la cryptographie. En particulier, des jetons et des transactions à expiration automatique sont exploités sur la base d'expériences de jeu dans des jeux informatiques/vidéos. La présente divulgation concerne des mécanismes pour générer et transférer des sous-jetons à expiration automatique et des transactions cryptographiques générées qui peuvent être utilisées pour identifier une propriété d'actif numérique basée sur le temps sur une chaîne de blocs. Dans la divulgation, un ou plusieurs sous-jetons à expiration automatique sont créés pour un jeton pendant un processus d'extraction de jeton qui permet des échanges de tels jetons. La création de sous-jetons peut être synchronisée de manière à initier le processus d'exploitation minière, ou les sous-jetons peuvent être créés après l'exploration de jetons pour des échanges temporels. D'autres aspects peuvent être divulgués et/ou revendiqués.
PCT/US2022/053669 2021-12-23 2022-12-21 Jetons cryptographiques à expiration automatique et transactions pour identifier des articles numériques basés sur le temps uniques WO2023122182A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202163293612P 2021-12-23 2021-12-23
US63/293,612 2021-12-23

Publications (1)

Publication Number Publication Date
WO2023122182A1 true WO2023122182A1 (fr) 2023-06-29

Family

ID=86903582

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2022/053669 WO2023122182A1 (fr) 2021-12-23 2022-12-21 Jetons cryptographiques à expiration automatique et transactions pour identifier des articles numériques basés sur le temps uniques

Country Status (1)

Country Link
WO (1) WO2023122182A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102158276B1 (ko) * 2020-02-18 2020-09-25 (주)와이오엘 블록체인기반 화물 운송시스템
US20210110386A1 (en) * 2019-10-15 2021-04-15 Coinbase, Inc. System and method for universal asset tokens
US20210176202A1 (en) * 2018-06-29 2021-06-10 Alfa Technologies, Inc. Multi-blockchain proof-of-activity platform
US20210326845A1 (en) * 2018-11-02 2021-10-21 Verona Holdings Sezc Tokenization platform
US20210390161A1 (en) * 2018-10-19 2021-12-16 Nippon Telegraph And Telephone Corporation Content contract system, content contract method, rights holder terminal, alienee terminal, content accumulation server, rights holder program, alienee program, control program, and content accumulation program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210176202A1 (en) * 2018-06-29 2021-06-10 Alfa Technologies, Inc. Multi-blockchain proof-of-activity platform
US20210390161A1 (en) * 2018-10-19 2021-12-16 Nippon Telegraph And Telephone Corporation Content contract system, content contract method, rights holder terminal, alienee terminal, content accumulation server, rights holder program, alienee program, control program, and content accumulation program
US20210326845A1 (en) * 2018-11-02 2021-10-21 Verona Holdings Sezc Tokenization platform
US20210110386A1 (en) * 2019-10-15 2021-04-15 Coinbase, Inc. System and method for universal asset tokens
KR102158276B1 (ko) * 2020-02-18 2020-09-25 (주)와이오엘 블록체인기반 화물 운송시스템

Similar Documents

Publication Publication Date Title
Dhillon et al. Blockchain enabled applications
KR102646102B1 (ko) 복수의 사용자들 간에 게임을 진행하여 게임 결과를 기록하기 위한 장치, 방법 컴퓨터 프로그램
US11951400B2 (en) Secure decentralized video game transaction platform
KR102355666B1 (ko) 신뢰할 수 있는 노드를 사용하는 블록체인 채굴
Raval Decentralized applications: harnessing Bitcoin's blockchain technology
US20170250796A1 (en) Trans Vernam Cryptography: Round One
CN110024330A (zh) 对IoT装置的服务提供
US20230281604A1 (en) Technologies for creating and transferring non-fungible token based identities
Hoffman Web application security
US20140325070A1 (en) Usage consumption for an invitee of a cloud system
CN106663018A (zh) 在容器化工作空间环境中修改android应用生命周期以控制其执行的方法
US20190232172A1 (en) Chain of custody in gaming platforms
US9592443B2 (en) Data store for a modular assembly system
US9956488B2 (en) System and method for video game skill level adjustment
JP7486528B2 (ja) ブロックチェーン・トランザクションを検証するプロトコル
CN110750329B (zh) 基于fpga实现虚拟机运算的方法及装置
CN110263090B (zh) 多类型维度的收据存储方法和节点
CN110750488B (zh) 在fpga中实现外部调用的方法及装置
KR102247815B1 (ko) 블록체인 네트워크에 기반한 게임 세이브 데이터 관리 기법
EP3963498A1 (fr) Utilisation de transactions de chaîne de blocs pour fournir une fonctionnalité hors chaîne
WO2021057167A1 (fr) Procédé et dispositif de traitement de transaction pour processeur de contrat intelligent sécurisé à base de fpga
Ng et al. Toys and mobile applications: current trends and related privacy issues
WO2023122182A1 (fr) Jetons cryptographiques à expiration automatique et transactions pour identifier des articles numériques basés sur le temps uniques
Al-Zoubi et al. An Ethereum Private Network for Data Management in Blockchain of Things Ecosystem.
Valle Trillo Certification of IoT elements using the blockchain

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22912435

Country of ref document: EP

Kind code of ref document: A1