WO2023203543A1 - Procédé et système de détermination d'au moins un droit associé à au moins un nœud informatique donné - Google Patents

Procédé et système de détermination d'au moins un droit associé à au moins un nœud informatique donné Download PDF

Info

Publication number
WO2023203543A1
WO2023203543A1 PCT/IB2023/054110 IB2023054110W WO2023203543A1 WO 2023203543 A1 WO2023203543 A1 WO 2023203543A1 IB 2023054110 W IB2023054110 W IB 2023054110W WO 2023203543 A1 WO2023203543 A1 WO 2023203543A1
Authority
WO
WIPO (PCT)
Prior art keywords
instruction
computing node
determining
given
distributed ledger
Prior art date
Application number
PCT/IB2023/054110
Other languages
English (en)
Inventor
Nathan TRUDEAU
Original Assignee
Bb Inventions Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bb Inventions Inc. filed Critical Bb Inventions Inc.
Publication of WO2023203543A1 publication Critical patent/WO2023203543A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • At least one embodiment of the invention relates to methods and systems for determining at least one right associated with at least one computing node. More precisely, at least one embodiment of the invention relates to computer-implemented methods in distributed ledger enabled systems.
  • Know your customer (KYC) guidelines are widely used by financial institutions in an effort to verify the identity of their customers. Such guidelines allow to ensure that a user is not prone to malevolent actions, thus minimizing risks of frauds and harmful activities.
  • KYC procedures usually imply that the user provides financial and/or social security information to the institutions, and that the user performs a series of operations which cannot be performed by a machine.
  • Distributed ledger enabled systems such as blockchains, tangles and hashgraphs, are systems comprising databases that are consensually shared across a plurality of entities and are actively maintained to track provided transactions.
  • blockchains One can think of blockchains as being the most prominent and used form of distributed ledger enabled system, which in most cases has the particularity of being decentralized.
  • a decentralized distributed ledger enabled system enables at least one type of at least one relevant activity and information to be shared between the plurality of entities.
  • the entities related to the distributed ledger enabled system usually achieve a consensus when actions are initiated therein.
  • Blockchains are becoming more and more complex as time goes, constantly evolving. Blockchains, which require a similar level of protection as centralized financial institutions, are beginning to implement KYC procedures for nodes, or associated wallets thereof, in order to attempt compliance with emerging some governments regulations.
  • Blockchains implementing well-known methods for achieving a consensus typically do not have built-in mechanism(s) for ensuring that specific sets of standards and requirements related to users are enforced in a decentralized manner, the decentralization varying in scale according to the blockchain. Due to the decentralized and often public nature of blockchains, as well as their lack of modularity, requirement and standardization procedures are often challenging to implement. Such requirement and standardization procedures can be made in an effort to minimize the overall risks of currently used blockchain technology.
  • a method for determining at least one right associated with at least one given computing node related to a distributed ledger enabled system comprising obtaining at least one set of at least one instruction to be executed using the at least one given computing node, obtaining at least one result associated with an execution of the at least one set of at least one instruction using the at least one given computing node, and determining the at least one right according to the at least one result, wherein the execution of the at least one set of at least one instruction involves receiving at least one input from a user interacting with the at least one given computing node, and further wherein the at least one set of at least one instruction is suitable for ensuring that the user is not associated with unwanted behavior involving at least one of at least one existing wallet and at least one computing node related to the distributed ledger enabled system.
  • the method further comprises determining the at least one set of at least one instruction, and wherein the obtaining of the at least one set of at least one instruction is enabled by said determining of the at least one set of at least one instruction.
  • the determining of the at least one set of at least one instruction comprises at least one first computing node related to the distributed ledger enabled system approving at least one portion of the at least one set of at least one instruction, and further wherein the obtaining of the at least one set of at least one instruction involves providing the at least one set of at least one instruction to the at least one given computing node.
  • the determining of the at least one set of at least one instruction comprises at least one of altering at least one given set of at least one instruction and generating the at least one set of at least one instruction.
  • the unwanted behavior involves at least one of the user being an at least partial owner of at least one of the at least one existing wallet and the at least one computing node and a lack of compliance in relation to at least one determined rule in the distributed ledger enabled system.
  • At least one portion of the at least one result is at least one of encrypted and obfuscated.
  • the determining of the at least one right comprises obtaining at least one portion of at least one indication of information associated with the user from at least one data source using at least one portion of the at least one result and determining at least one level of trustworthiness associated with the user using said at least one portion of the at least one indication of information.
  • At least one of said determining of the at least one set of at least one instruction, said obtaining of the at least one result and said determining of the at least one right involves at least one interaction between at least one of the at least one first computing node, and further wherein the at least one interaction comprises at least one of providing at least one portion of the at least one set of at least one instruction thereto, obtaining at least one given result therefrom, the at least one given result being related to the at least one result and associating at least one of the at least one right thereto.
  • the at least one right is associated with at least one of at least one task, action and function.
  • At least one of said determining of the at least one set of at least one instruction, said obtaining of the at least one set of at least one instruction and said determining of the at least one right is enabled according to at least one of at least one condition, event, action, function and criterion related to the distributed ledger enabled system.
  • said determining of the at least one right further comprises determining if at least one of the at least one level of trustworthiness is suitable for the at least one of at least one task, action and function.
  • At least one of the at least one of at least one condition, event, action, function and criterion is associated with at least one of the at least one given computing node and the at least one first computing node.
  • a system comprising at least one processor, and at least one storage medium storing instructions, which when executed by the at least one processor, causes the system to carry out the method of any one of the previous aspects.
  • a machine-readable medium carrying machine readable instructions, which when executed by a processor of a machine, causes the machine to perform the method of any one of the previous aspects.
  • a method for determining at least one set of at least one instruction related to a distributed ledger enabled system the method being performed according to at least one first computing node part of a distributed ledger enabled system, the method comprising obtaining at least one first set of at least one instruction, processing the at least one first set of at least one instruction and determining the at least one set of at least one instruction according to at least one result of the processing, wherein the at least one determined set of at least one instruction is suitable for determining at least one right associated with at least one given computing node, and further wherein the at least one given computing node is related to the distributed ledger enabled system, and further wherein the processing of the at least one first set of at least one instruction comprises at least one of at least one altering of at least one portion of the at least one first set of at least one instruction and at least one approving process of at least one portion of the at least one first set of at least one instruction.
  • the at least one right comprises at least one of at least one authorization, at least one role, at least one action and at least one access related to the distributed ledger enabled system.
  • the processing of the at least one first set of at least one instruction involves at least one second computing node.
  • the involving of the at least one second computing node comprises at least one of the at least one approving process of at least one portion of the at least one first set of at least one instruction.
  • the processing of the at least one first set of at least one instruction further comprises receiving at least one input from at least one user interacting with at least one corresponding computing node selected from a group consisting of the at least one first computing node.
  • At least one of the at least one first computing node and the at least one second computing node is considered to be reliable.
  • At least one of the at least one first set of at least one instruction is at least one of the at least one determined set of at least one instruction.
  • at least one of the at least one determined set of at least one instruction is derived from at least one of the at least one first set of at least one instruction.
  • the at least one determined set of at least one instruction is suitable for determining at least one level of trustworthiness associated with the at least one given computing node.
  • the determining of the at least one set of at least one instruction at least one of enables a determining and comprises determining at least one level of trustworthiness associated with at least one of the at least one first computing node and the at least one second computing node.
  • At least one portion of at least one of the processing of the at least one first set of at least one instruction, the at least one first set of at least one instruction, the determining of the at least one set of at least one instruction and the at least one set of at least one instruction is associated with at least one of at least one encryption, obfuscation and anonymization method.
  • At least one of said obtaining of the at least one first set of at least one instruction, said processing of the at least one first set of at least one instruction and said determining the at least one set of at least one instruction is enabled according to at least one of at least one condition, event, action, function and criterion related to the distributed ledger enabled system.
  • a system comprising at least one processor, and at least one storage medium storing instructions, which when executed by the at least one processor, causes the system to carry out the method of any one of the previous aspects.
  • a machine-readable medium carrying machine readable instructions, which when executed by a processor of a machine, causes the machine to perform the method of any one of the previous aspects.
  • One of the several advantages of one or more embodiments of the methods and systems disclosed is that entities comprised in the distributed ledger enabled system are involved in the determining of the sets of instructions that are provided to new entities. Enabling entities part of the distributed ledger enabled system to get involved in the determining of instructions and associated sets can significantly and increasingly reduce overall system risks over time by dynamically adapting the instructions according to the distributed ledger enabled system’s needs.
  • One other advantage of the several advantages of one or more embodiments of the method and the system disclosed is that the instructions provided to entities seeking rights can confirm that a given computing node is associated with a user and that the user is determined to not be associated with unwanted behavior.
  • Figure 1 is a flowchart illustrating an embodiment of a method for determining at least one right associated with at least one given computing node related to a distributed ledger enabled system, in accordance with at least one embodiment
  • Figure 2 is a schematic diagram illustrating an embodiment of a system comprising at least one computing node part of a distributed ledger enabled system wherein a given computing node is associated with a determining of at least one right, in accordance with at least one embodiment;
  • Figure 3 is a schematic diagram illustrating an electronic device which may be used in accordance with one or more non-limiting embodiments of the present technology
  • Figure 4 is a flowchart illustrating an embodiment of a method for determining at least one set of at least one instruction related to a distributed ledger enabled system, the method being performed according to at least one first computing node part of a distributed ledger enabled system, in accordance with at least one embodiment
  • Figure 5 is a schematic diagram illustrating an embodiment of a system comprising at least one first computing node part of a distributed ledger enabled system wherein a given computing node is associated with a determining of at least one set of at least one instruction, in accordance with at least one embodiment.
  • a reference to “another embodiment” or “another aspect” in describing an embodiment does not imply that the referenced embodiment is mutually exclusive with another embodiment (e.g., an embodiment described before the referenced embodiment), unless expressly specified otherwise.
  • verbs "add”, “provide” and like verbs typically refer to at least one of at least one adding, at least one providing, at least one putting in, at least one connecting, at least one joining, at least one appending, at least one attaching and at least one including related to at least one determined subject, unless expressly specified otherwise.
  • the expression "associated with” and like expressions may be used to have at least one portion of at least one determined subject at least one of relate to and associate with at least one other subject.
  • level of trustworthiness typically refer to at least one number, such as at least one reliability metric value, corresponding to an ability to rely on one as being trustworthy.
  • node and the expression “computing node” typically refer to the same element herein, unless specified otherwise.
  • a node comprises at least one of a processor, a storage system and a communication interface, and is typically associated with at least one wallet.
  • the node is selected from a group comprising a computer, a laptop, a cellphone, a smartphone, a desktop computer, a server, a device, a tablet, a processing device, a storage device, a device comprising a digital interface and the like, unless expressly specified otherwise.
  • transaction typically refers to a transfer of an asset, an instruction, or data from one or more parties to one or more other parties.
  • various forms of digital information and/or data may be transferred in a transaction, such as non-fungible tokens (NFTs), digital identities, and/or any data of any type, form, shape, nature and/or scope involving at least one entity part of a distributed ledger enabled system, wherein said digital information and/or data may or may not have monetary value, according to at least one embodiment, unless expressly specified otherwise.
  • NFTs non-fungible tokens
  • data of a blockchain typically refers to at least one indication of at least one portion of data related to a distributed ledger enabled system, unless expressly specified otherwise.
  • the expression “store a blockchain”, “storing a blockchain” and like expressions typically refers to storing data relating to a blockchain, such as at least one indication of one or more previously verified transactions in the blockchain, unless expressly specified otherwise.
  • the term "reliability metric value” and like terms/expressions typically refer to a metric, such as a score, related to at least one entity, such as at least one computing node, or associated wallet thereof, and influenced by at least one of at least one blockchain-related event, at least one at least initiated blockchain-related action, at least one activity, at least one behavior, at least one indication of at least one portion of provided data and the like made by said at least one entity in a distributed ledger enabled system, unless expressly specified otherwise.
  • rule typically refers to at least one of at least one machine readable instruction and at least one of various types of interpretable instruction provided in various forms in which a computing node is determined in relation to at least one set of at least one parameter and at least one condition.
  • the at least one rule is at least enabled for at least one portion of a plurality of computing nodes and relates to at least one reliability metric value associated with at least one computing node, unless expressly specified otherwise.
  • blockchain typically refers to at least one portion of an implementation of a distributed ledger enabled system, unless expressly specified otherwise.
  • block typically refers to at least one indication of at least one structured data unit related to a distributed ledger enabled system, unless expressly specified otherwise.
  • a portion typically refers to an entirety or at least one subset of at least one determined subject, unless expressly specified otherwise.
  • system manager typically refers to at least one entity, such as at least one computing node, or associated wallet thereof, which possesses at least one of at least one type of authority varying in at least one of a form, nature and/or scope granting at least one superiority aspect over at least one other entity, such as at least one computing node, or associated wallet thereof, related to a distributed ledger enabled system, such as:
  • enabling and/or authorizing a blockchain-related event including: enabling a processing of an at least initiated blockchain-related action, enabling a processing of a blockchain-related action, initiating a blockchain-related action related to an indication of data related to the distributed ledger enabled system, and other privileged initiated blockchain-related action and/or the like, unless expressly specified otherwise.
  • the term "reliable” typically refers to at least one of at least enabling, establishing, assessing and determining of at least one of a status, behavior, network usage, data movement, available at least one resource and at least one at least initiated blockchain-related action of at least one entity, such as at least one computing node, or associated wallet thereof, at least enabling at least one predicting related to at least one probability of at least one at least initiating of at least one at least partially anomalous blockchain-related action associated with at least one given entity, such as the at least one entity and/or at least one entity related to the at least one entity, related to a distributed ledger enabled system, unless expressly specified otherwise.
  • the verb "sign” typically refers to at least one of at least one determining, at least one signing and at least one processing of at least one determined subject, in which at least one cryptographic algorithm, such as at least one asymmetric encryption algorithm, is involved, unless expressly specified otherwise.
  • wallet typically refers to at least one of at least one device, at least one physical medium, at least one storage medium, at least one program, at least one machine readable instruction, at least one service, at least one portion and/or at least one result of at least one cryptography related algorithm and at least one system, in which at least one cryptographic algorithm, such as at least one asymmetric encryption algorithm, is involved and that at least enables at least one of at least one ownership and at least one processing of at least one asset, at least one encrypting of information, at least one signing of information and at least one relevant information, such as at least one cryptography related key, unless expressly specified otherwise.
  • at least one cryptographic algorithm such as at least one asymmetric encryption algorithm
  • the verb "compiling” typically refers to at least one obtaining, at least one assembling, at least one gathering, at least one evaluating, at least one interaction with at least one entity, such as at least one computing node, or associated wallet thereof, part of a distributed ledger enabled system, at least one processing and at least one compiling in relation to at least one determined subject, unless expressly specified otherwise.
  • the term "determine” typically refers to at least one of at least one entity that has been identified and/or is identified as at least related to a given context and at least one entity that may be subject to at least one of at least one determining, at least one classifying, at least one selecting, at least one gathering, at least one specifying, at least one recording, at least one of putting, at least one choosing, at least one deciding, at least one compiling, at least one separating, at least one recording, at least one electing, at least one comprising, at least one receiving, at least one verifying, at least one inserting, at least one confirming, at least one validating, at least one detecting, at least one allowing, at least one acquiring, at least one establishing, at least one interacting, at least one rebalancing, at least one indicating, at least one creating, at least one at least initiating of at least one blockchain-related action, at least one at least enabling, at least one evaluating, at least one performing, at least one deeming,
  • the verb “execute” typically refers to at least one of at least one executing, at least one interpreting and at least one determining, unless expressly specified otherwise.
  • the terms “verification”, “validation”, “confirmation” and like terms and the verbs “verify”, “validate”, “confirm” and like verbs typically refer to at least one of
  • the verbs "punish”, “penalize”, “disadvantage” and like verbs typically refer to at least enabling at least one of at least one penalizing, at least one punishing, at least one disadvantaging, at least one diminishing, at least one handicapping and at least one sanctioning, such as an expulsing, of at least one entity, such as at least one computing node, or associated wallet thereof, of a distributed ledger enabled system, unless expressly specified otherwise.
  • the verbs "generate”, “obtain” typically refer to at least one of at least one generating, at least one obtaining, at least one acquiring and at least one of at least enabling a processing of an at least initiated blockchain-related action, at least enabling a processing of an at least initiating blockchain-related action and at least initiating a blockchain-related action related to at least one subject, unless expressly specified otherwise.
  • fraudulent typically refer to at least one at least potentially unwanted event, which may be blockchain related according to the context of use, such as at least one of at least one determined fraudulent event, which may be blockchain-related, at least one determined suspicious event, which may be blockchain-related, and at least one determined malicious event, which may be blockchain-related, unless expressly specified otherwise.
  • the expression "indication” typically refers to at least one of at least one number which is at least one of a smaller size, a greater size and a similar size in relation to a related indicated at least one value, binary data related to the indicated at least one value, at least one identifier related to the indicated at least one value, at least one series of characters which is at least one of a smaller size, a greater size and a similar size in relation to the related indicated at least one value, at least one machine readable instruction allowing at least one obtaining of the at least one value, at least one blockchain-related event related to the indicated at least one value and the indicated at least one value itself, unless expressly specified otherwise.
  • At least one embodiment of the present invention is directed to methods and systems for determining at least one right associated with at least one computing node.
  • a parameter is defined as a value part of a blockchain which may or may not, according to at least one embodiment, be immutable.
  • a parameter part of the blockchain is immutable.
  • a parameter part of the blockchain can be updated according to at least one criterion, at least one event and/or rule, such as at least one vote involving at least one voting computing node, such as a poll, enabled, such as started, by at least one entitypart of the blockchain having such authority, such as a system manager and/or a relevant role.
  • a parameter part of the blockchain can be updated according to at least one criterion, at least one event and/or rule, such as at least one vote involving at least one voting computing node, such as a poll, enabled, such as started, by at least one entitypart of the blockchain having such authority, such as a system manager and/or a relevant role.
  • FIG. 1 there is shown an embodiment of a method for determining at least one right associated with at least one given computing node related to a distributed ledger enabled system.
  • At least one of the determining of the at least one set of at least one instruction, the obtaining of the at least one result and the determining of the at least one right involves at least one interaction between at least one of the at least one first computing node, and further wherein the at least one interaction comprises at least one of providing at least one portion of the at least one set of at least one instruction thereto, obtaining at least one given result therefrom, the at least one given result being related to the at least one result and associating at least one of the at least one right thereto. More details are provided in the below processing steps of figure 1.
  • processing step 102 at least one set of at least one instruction to be executed using the at least one given computing node is obtained.
  • the at least one set of at least one instruction is suitable for ensuring that the user is not associated with unwanted behavior involving at least one of at least one existing wallet and at least one computing node related to the distributed ledger enabled system.
  • the skilled addressee will further appreciate that at least one of the nature, scope and form of the unwanted behavior may vary greatly form at least one embodiment to at least one other.
  • the unwanted behavior comprises at least one of the user being an at least partial owner of at least one of the at least one existing wallet and the at least one computing node and a lack of compliance in relation to at least one determined rule in the distributed ledger enabled system, such as generating a number of at least one transaction in a determined number of at least one block above a determined number, such as a parameter, in the distributed ledger enabled system and/or the like, involving at least one of at least one existing wallet and at least one computing node related to the distributed ledger enabled system.
  • the method disclosed in figure 1 further comprises determining the at least one set of at least one instruction, and wherein the obtaining of the at least one set of at least one instruction is enabled by the determining of the at least one set of at least one instruction. More details are provided in the below processing steps of figure 1.
  • the at least one set of at least one instruction is obtained upon request by at least one of the at least one given computing node. In at least one embodiment, at least one of the at least one set of at least one instruction is obtained after a predetermined amount of time has elapsed since the obtaining of a previous set of at least one instruction. In at least one embodiment, the predetermined amount of time is associated with a parameter. In at least one embodiment, the at least one set of at least one instruction is obtained upon request of at least one of at least one computing node, system manager and smart contract.
  • the at least one set of at least one instruction comprises a plurality of sets, wherein at least one portion of the plurality of sets is associated with at least one portion of the at least one given computing node.
  • a plurality of sets can increase the accuracy of the method disclosed in figure 1 by having different sources of information instead of a single one.
  • the at least one given computing node comprises a plurality of computing nodes.
  • at least one portion of the plurality of computing nodes is associated with a user.
  • a plurality of computing nodes can increase the accuracy of the method disclosed in figure 1 by having different sources of information instead of a single one.
  • At least one portion of the plurality of computing nodes performs at least one of an execution and a processing, such as by performing a validation and/or signature, of at least one instruction from at least one associated set to be determined before compiling at least one result associated and obtained therewith, which enables a determining of the at least one set of at least one instruction.
  • a plurality of computing nodes typically involving the abovementioned determining process, implies interactions and/or communications between at least one portion of the plurality of computing nodes to achieve at least one relevant processing step, such as the determining process.
  • a determining process of at least one given set of at least one given instruction is enabled according to at least one of at least one condition, event, action, function and criterion, such as at least one at least potentially fraudulent pattern related to the distributed ledger enabled system, such as at least one at least potentially fraudulent pattern involving at least one of the at least one given computing node, a determined number of at least one block generated in the distributed ledger enabled system, at least one result of at least one evaluation of at least one level of trustworthiness associated with at least one involved computing node, such as at least one of the at least one given computing node, at least one ongoing and/or requested action related to the distributed ledger enabled system and involving, such as originating from, at least one of the at least one given computing node, at least one characteristic associated with the user and/or the like.
  • the determining of the at least one set of at least one instruction comprises at least one first computing node related to the distributed ledger enabled system approving at least one portion of the at least one set of at least one instruction, and further wherein the obtaining of the at least one set of at least one instruction involves providing the at least one set of at least one instruction to the at least one given computing node.
  • the at least one first computing node comprises at least one of at least one system manager, smart contract, computing node and third party.
  • at least one of the at least one third party provides at least one KYC-related service.
  • the at least one first computing node comprises at least one of the at least one given computing node.
  • At least one portion of the at least one given computing node may provide one or more inputs regarding at least one of the at least one set of at least one instruction provided to at least one other portion of the at least one given computing node.
  • at least one of a nature, scope and form of the approving may be influenced according to at least one of at least one condition, event, action, function and criterion, such as at least one at least potentially fraudulent pattern related to the distributed ledger enabled system, such as at least one at least potentially fraudulent pattern involving at least one of the at least one given computing node, a determined number of at least one block generated in the distributed ledger enabled system, at least one result of at least one evaluation of at least one level of trustworthiness associated with at least one involved computing node, such as at least one of the at least one given computing node, at least one ongoing and/or requested action related to the distributed ledger enabled system and involving, such as originating from, at least one of the at least one given computing node, at least one characteristic associated with the
  • the determining of the at least one set of at least one instruction comprises least one of altering at least one given set of at least one instruction and generating the at least one set of at least one instruction. Accordingly, it will be understood by the skilled addressee that, in at least one embodiment, a given set of at least one instruction is partially or fully generated, meaning that at least one portion of the at least one instruction of the given set can be altered according to at least one computing node and/or entity, such as by adding and/or removing at least one instruction. In at least one embodiment, a given set of at least one instruction is obtained at least in part from a previous existing set of at least one instruction in the distributed ledger enabled system.
  • a given set of at least one instruction is generated according to data part of the distributed ledger enabled system.
  • at least one portion of the given set of at least one instruction is obtained from at least one of at least one computing node, system manager, smart contract and third party.
  • at least one relevant computing node is requested to process at least one result from a given set of at least one instruction to be able to provide at least one concerned instruction.
  • a given set of at least one instruction is processed, such as by performing a validation, according to at least one computing node before being obtained by the at least one given computing node, such as by having the at least one computing node providing it to the at least one given computing node.
  • at least one portion of the given set of at least one instruction is obtained from at least one third party, such as from an API.
  • the given set of at least one instruction is obtained from at least one of at least one computing node, system manager and smart contract.
  • the at least one computing node from which the given set of at least one instruction is obtained from may be penalized upon providing at least one other set of at least one instruction to at least one given computing node upon at least one criterion, such as a failing to wait for a determined number of blocks to be generated.
  • a determining, such as the above- mentioned partial or full generating, of a given set of at least one instruction can be provided in various forms, according to at least one embodiment, such as at least one embodiment of Figure 4.
  • a set of at least one instruction is a collection of at least one instruction wherein at least one portion is to be executed by at least one of a user interacting with a concerned computing node and the concerned computing node.
  • an execution of at least one instruction of at least one set enables an execution of at least one given instruction of at least one of at least one given set and the set, such as by, using at least one result associated with the execution, performing a decrypting and/or at least one deobfuscation related to at least one of the at least one given instruction.
  • a “chain” of at least one of such enabling can be implemented, in at least one embodiment.
  • a processing, such as a combination, of at least one result associated with at least one instruction forms at least one other instruction.
  • an instruction may be formulated using at least one verb in the imperative mood or in the interrogative mood.
  • a given instruction may be at least an indication of at least one of the following: “What is your name?”, “What is your social security number?”, “Provide a passport photo.”, “Click the box.”, “Provide a picture of you holding the following numbers written on a piece of paper and using black ink, the piece of paper being positioned beside and on the right side of your face: [Numbers here]” and the like.
  • an instruction can depend on another one.
  • the “[At least one number here]” could be obtained as a result following an execution of another instruction.
  • the instruction(s) would, in at least one embodiment, be formulated to determine a uniqueness factor of the user answering them related to the other users related to the distributed ledger enabled system.
  • the skilled addressee will appreciate that the instruction(s) would, in one or more embodiments, be formulated to ensure that the user answering them is not associated with unwanted behavior.
  • the at least one result associated with an execution of the instruction(s) is validated by at least one other computing node, at least one third party, at least one smart contract, at least one system manager, and/or the like.
  • an instruction of a set of at least one instruction is at least one machine readable instruction which requires that at least one specific action be performed, such as a Completely Automated Public Turing test to tell Computers and Humans Apart (Captcha), at least one of drawing and typing at least one of text, characters, numbers and the like in at least one specific portion of at least one specific image, file, compiled binary data and/or data considered interactable, and/or the like.
  • at least one instruction can be considered as a puzzle, such as a puzzle addressing fluid human intelligence.
  • at least one instruction is intended to surprise and put under pressure a given concerned user, such that the concerned user answers as quickly as possible.
  • At least one instruction instructs a user to provide a written signature.
  • an instruction may instruct a user to provide at least one audio recording, such as ambient noise(s) and/or voice recording(s) of the user saying specific characters.
  • a set of at least one instruction may comprise a single instruction or a plurality of instructions, according to one or more embodiments.
  • At least one of the type, nature, scope and form of at least one instruction associated with at least one given set may be influenced according to at least one of at least one condition, event, action, function and criterion, such as at least one at least potentially fraudulent pattern involving at least one of the at least one given computing node, a determined number of at least one block generated in the distributed ledger enabled system, at least one result of at least one evaluation of at least one level of trustworthiness associated with at least one involved computing node, such as at least one of the at least one given computing node, at least one ongoing and/or requested action related to the distributed ledger enabled system and involving, such as originating from, at least one of the at least one given computing node, at least one characteristic associated with the user and/or the like.
  • At least one signature, co-signature, obfuscation method and/or encryption method is at least one of involved in at least one interaction between at least one portion of the at least one given computing node and/or at least one other concerned computing node, such as the at least one first computing node, related to at least one aspect of the obtaining of the at least one set of at least one instruction and associated with the at least one result.
  • at least one portion of the at least one result is at least one of encrypted and obfuscated.
  • the at least one of the encryption and the obfuscation has been performed by at least one computing node involved in and according to one or more implementations of the method related to figure 4.
  • the at least one result associated with the execution of at least one portion of the obtained set of at least one instruction may be provided in various forms.
  • the at least one result comprises at least one of at least one credential, financial information, personal information, image, video, and any data that is related to at least one given instruction.
  • a plurality of results may be obtained from a single instruction.
  • a combination of a plurality of instructions is associated with a single result.
  • At least one portion of the obtained at least one result is provided to at least one of at least one system manager, smart contract, computing node, third party and the like for verification.
  • the verification involves determining a uniqueness factor of the associated user compared to the other users related to the distributed ledger enabled system.
  • At least one portion of the obtained at least one result is stored in at least one part of the distributed ledger enabled system, for instance in the form of at least one transaction and/or at least one indication recorded in a block part of the distributed ledger enabled system.
  • a node according to at least one of at least one first condition, action, function and criterion, such as being associated with at least one trustworthiness level, such as at least one reliability metric value, above a determined threshold, such as a parameter, may vote on modifying, adding and/or removing at least one instruction of at least one first determined set of at least one instruction, the at least one first determined set being determined according to at least one embodiment of the method disclosed in figure 4.
  • the at least one given computing node is at least one of supervised and monitored by at least one of at least one system manager, smart contract, computing node, third party and the like while being involved in an execution of at least one portion of the at least one set of at least one instruction.
  • the at least one of the at least one first condition, event, action, function and criterion comprises at least one at least potentially fraudulent pattern involving at least one of the at least one given computing node, a determined number of at least one block generated in the distributed ledger enabled system, at least one result of at least one evaluation of at least one level of trustworthiness associated with at least one involved computing node, such as at least one of the at least one given computing node, at least one ongoing and/or requested action related to the distributed ledger enabled system and involving, such as originating from, at least one of the at least one given computing node, at least one characteristic associated with the user and/or the like.
  • the at least one result is obtained by combining at least one first result associated with the abovementioned execution of the at least one set of at least one instruction with at least one other execution and/or processing result obtained from at least one of at least one system manager, smart contract, computing node, third party, and the like.
  • processing step 106 the at least one right is determined according to the at least one result.
  • At least one of the at least one right may be one of granted and denied.
  • the user associated with an executing of the instruction(s) fails to properly execute at least one portion of the concerned set of at least one instruction, such as by providing at least one incorrect result and/or too few result(s) and/or failing to provide at least one result within at least one of a determined number of block(s) and a determined timeframe, and/or is determined to not have the right to do so, such as having a reliability metric value under a determined threshold, such as a parameter and/or a result of at least one evaluation of associated reliability, such as processing at least one previous event in the distributed ledger enabled system involving the at least one given computing node, or associated wallet thereof, and/or is not determined as unique compared to the other users, the at least one given computing node may be at least one of denied
  • the at least one given computing node may be associated with at least one right. In at least one embodiment, an associating of at least one given right with at least one given computing node enables at least one additional right.
  • At least one portion of the at least one node may gain access to at least one given feature of the distributed ledger enabled system, such as a networking algorithm, such as a distributed hash table like Koorde, considered faster than a default networking algorithm configured in a specific manner, such as a distributed hash table like Kademlia.
  • a networking algorithm such as a distributed hash table like Koorde
  • the at least one right may vary greatly in nature, type, form, scope and/or the like from at least one first embodiment to at least one other.
  • the right at least enables at least one of joining and/or accessing at least one portion of a distributed ledger enabled system, performing a transaction in the network, forging and/or generating block, approving a transaction, determining at least one set of at least one instruction related to the distributed ledger enabled system, performing a defined role in the network, maintaining a status as an active node in a distributed ledger enabled system, providing instructions for being approved, minting a non-fungible token (NFT), at least one of at least one physical access and digital access, such as at least one of a physical premise and an API and/or virtual room and/or digital platform and/or feature of at least one digital product, and the like.
  • NFT non-fungible token
  • At least one of the at least one right is related to at least one of at least one role in a distributed ledger enabled system implementing the Proof of Justice (PoJ) consensus algorithm.
  • PoJ Proof of Justice
  • the type of right(s) to be provided to the at least one given computing node may depend on the obtained at least one result. For instance, a given group of rights obtained by the at least one given computing node may enable an accessing at least one portion of a distributed ledger enabled system and generating a transaction, but may not enable a generating and/or forging of a block.
  • right(s) associated with a plurality of computing nodes when combined, enables at least one other right. For instance, at least one portion from the plurality of computing nodes give its approval for a given event and/or action, thereby enabling the given event and/or action.
  • an executing of at least one instruction from a given set involves receiving at least one input from a user interacting with a concerned given computing node.
  • at least one instruction may be to execute a Captcha or to provide a picture, a screenshot, a video or any form of data related to the user or the computing node.
  • the execution of the at least one set of at least one instruction involves receiving at least one input from a user interacting with the at least one given computing node.
  • At least one portion of at least one instruction of a given set is associated with at least one portion of at least one other set.
  • a multi-factor authentication-like system is enabled, wherein the user must complete one or more instructions of at least one set on different computing nodes.
  • a computing node executing at least one instruction may receive a reward if at least one corresponding result is determined as satisfactory and/or according to at least one of at least one condition, event, action, function and criterion, such as at least one at least potentially fraudulent pattern involving at least one of the at least one given computing node, a determined number of at least one block generated in the distributed ledger enabled system, at least one result of at least one evaluation of at least one level of trustworthiness associated with at least one involved computing node, such as at least one of the at least one given computing node, at least one ongoing and/or requested action related to the distributed ledger enabled system and involving, such as originating from, at least one of the at least one given computing node, at least one characteristic associated with the user and/or the like.
  • the reward may be, for instance, funds, at least one digital asset, at least one right, an increase in at least one level of trustworthiness and/or the like.
  • the reward involves an increase of at least one reliability metric value related to the computing node, wherein the distributed ledger enabled system comprises an implementation of the Proof of Justice consensus mechanism.
  • the computing node executing the at least one instruction may receive a penalty if the at least one corresponding result is not determined as satisfactory.
  • the penalty may be, for instance, a right taken away, a fine, an expulsion and/or the like.
  • the distributed ledger enabled system comprises an implementation of the Proof of Justice consensus algorithm
  • the at least one set of at least one instruction is considered to be at least one corresponding Proof of Justice-related rule.
  • At least one computing node and/or data part of the distributed ledger enabled system at least one of the distributed ledger enabled system and public database(s) may be searched for information (e.g., similar result(s) and/or similar financial and/or personal information and/or the like) and establish a uniqueness factor, such as whether the user already has access to at least one of at least one existing wallet and at least one computing node related to the distributed ledger enabled system.
  • information e.g., similar result(s) and/or similar financial and/or personal information and/or the like
  • At least one computing node and/or data if, according to the at least one result, at least one computing node and/or data, it is established that the user has access to of one or more wallets and/or active computing node in the network and that the user seeks to further access a new wallet or a new active computing node in the network, entities in the distributed ledger enabled system associated with the user and, in at least one embodiment, the user, may be penalized, such as by being denied at least one right and/or suffer one or more punishment.
  • users having access to a plurality of wallets and/or computing nodes in certain types and implementations of distributed ledger enabled systems may enable malicious behavior associated with the distributed ledger enabled system.
  • access to at least one indication of, such as information related to, at least one given result is publicly available.
  • access to at least one indication of information related to at least one given result is at least enabled at least one of for and by at least one of at least one system manager, smart contract, computing node, third party and the like.
  • at least one of at least one indication of information related to at least one given result and at least one indication of at least one given result is one of fully and partially represented with the help of at least one zero knowledge proof.
  • the determining of the at least one right comprises obtaining at least one portion of at least one indication of information associated with the user from at least one data source using at least one portion of the at least one result and determining at least one level of trustworthiness associated with the user using the at least one portion of the at least one indication of information.
  • a low level of trustworthiness is associated with risk, such as potentially malicious behavior, and a high level of trustworthiness is associated with user demonstrating a good behavior.
  • the level of trustworthiness is related to the uniqueness factor.
  • information associated with at least one given result may be used for searching into data source(s), such as public database(s), for signs of one or more suspicious activities.
  • at least one computer program, computing node and/or person may search social media platforms, third party database(s) and/or other source of data for possible committed infractions or problematic content related to the user associated with the at least one given computing node in order to establish at least one level of trustworthiness. For instance, a detection of a criminal record, a bad, or lack thereof, credit record, inappropriate content shared on platforms such as social media and/or the like may affect at least one of the at least one level of trustworthiness of the at least one given computing node.
  • At least one given level of trustworthiness associated with a given user is influenced by a sensitivity level, such as an amount and/or nature and/or form and/or type and/or scope of personal information, of at least one input related to, such as from, the given user.
  • the at least one right is associated with at least one of at least one task, action and function, such as generating at least one transaction of at least one type related to the distributed ledger enabled system.
  • the skilled addressee will appreciate that the nature, scope, type and form of the at least one right can vary greatly from one or more embodiments to one or more other embodiments, as previously disclosed.
  • the determining of the at least one right further comprises determining if at least one of the at least one level of trustworthiness is suitable for the at least one of at least one task, action and function.
  • a user deemed trustworthy may be allowed a greater access to one or more features of the distributed ledger enabled system than a given user which has been deemed less trustworthy.
  • the type, nature, form and scope of the at least one of at least one task, action and function can vary greatly from at least one embodiment to at least one other and according to one or more implementation aspects of the distributed ledger enabled system.
  • At least one of the determining of the at least one set of at least one instruction, the obtaining of the at least one set of at least one instruction and the determining of the at least one right is enabled according to at least one of at least one condition, event, action, function and criterion related to the distributed ledger enabled system, such as a determined number of at least one block generated, at least one rule, a quantity of at least one transaction made by a computing node, or a plurality thereof, associated with a given transaction, or a plurality thereof, a quantity, or amount thereof, of at least one asset associated with a given transaction, a quantity of at least one different type of transaction(s) involving a computing node associated with a given transaction, a result of an evaluation of a level of trustworthiness associated with a given computing node, or plurality thereof, an action made, or a plurality thereof, made by a given computing node, or a plurality thereof, and/or the like.
  • At least one of the at least one of at least one condition, event, action, function and criterion is associated with at least one of the at least one given computing node and the at least one first computing node.
  • FIG. 2 there is shown a system for determining at least one right associated with a given computing node, which will be referred to as the system 200.
  • the system 200 is suitable for implementing one or more non-limiting embodiments of the present technology.
  • system 200 as shown is merely an illustrative implementation of the present technology.
  • description thereof that follows is intended to be only a description of illustrative examples of the present technology. This description is not intended to define the scope or set forth the bounds of the present technology.
  • modifications to the system 200 may also be set forth below. This is done merely as an aid to understanding, and, again, not to define the scope or set forth the bounds of the present technology. These modifications are not an exhaustive list, and, as a skilled addressee will understand, other modifications are likely possible.
  • FIG. 2 is a schematic diagram illustrating an embodiment of a system 200 comprising a plurality of nodes 202, 212a-d wherein a given computing node 202 is associated with a determining of at least one right, in accordance with at least one embodiment.
  • the skilled addressee will appreciate that the given computing node 202 is a node connected to a network 210, the network 210 being connected to a plurality of other nodes 212a-d.
  • embodiments are not limited to four nodes 212a-d as depicted in Figure 2, and that the number of nodes part of the system 200 may vary greatly and be provided in various forms.
  • each node 202, 212a-d stores data part of and is associated with at least one version of the blockchain 208.
  • the blockchain 208 presented in the system 200 is related to a system enabling to delegate a storing of at least one portion of data part of the blockchain 208 to at least one of the nodes 202, 212a-d, thereby implying that at least one portion of the nodes 202, 212a-d not storing at least one portion of data of the blockchain 208 would query at least one node storing data part of the blockchain 208 in order to obtain relevant data thereto, such as at least one given set of at least one instruction.
  • the network 210 may be of various types.
  • the network 210 is selected from a group comprising local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).
  • the network 210 is a peer-to-peer network which is related to the Internet.
  • the given computing node 202 of figure 2 is typically associated with a wallet 206, in which funds or other types of currency and/or assets may be associated with.
  • the wallet 206 is at least partially owned by a user 204.
  • the system 200 further comprises a set of at least one instruction 214 that may be transferred using the network 210. It will be appreciated that the set of at least one instruction 214 is obtained in accordance with one or more embodiments of the method disclosed in Figure 1. In at least one embodiment, the set of at least one instruction 214 is stored in a storage medium, such as volatile memory and/or nonvolatile memory, of at least one computing node of the plurality of computing nodes 202, 212a-d.
  • a storage medium such as volatile memory and/or nonvolatile memory
  • At least one portion of the set of at least one instruction is stored by a third party, and the set of at least one instruction 214 is accessible upon request and/or according to at least one of at least one condition, event, action, function and criterion, such as at least one at least potentially fraudulent pattern involving the computing node 202, a determined number of at least one block generated in the system 200, at least one result of at least one evaluation of at least one level of trustworthiness associated with at least one involved computing node, such as the computing node 202, at least one ongoing and/or requested action related to the system 200 and involving, such as originating from, the computing node 202, at least one characteristic associated with the user 204 and/or the like.
  • at least one portion of the set of at least one instruction 214 is altered and/or generated and/or determined according to at least one of the computing node 202 and at least one of the computing nodes 212a-d.
  • the node 202 obtains at least one set of at least one instruction 214 to be executed using the computing node 202. Then, at least one of the nodes 202, 212a-d obtains at least one result associated with an execution of the at least one set of at least one instruction 214 associated with the computing node 202.
  • At least one right related to the node 202 is determined according to the at least one result, wherein the execution of the at least one set of at least one instruction 214 involves receiving at least one input from a user 204 interacting with the computing node 202, and further wherein the set of at least one instruction 214 is suitable for ensuring that the user is not associated with unwanted behavior involving at least one of at least one existing wallet and at least one computing node related to the system 200.
  • interactions and/or communications such as at least one obtaining, providing, processing, validating and/or determining, between a plurality of nodes 202, 212a-d, such as the obtaining of the set of at least one instruction 214, typically use the network 210.
  • At least one of the nature, scope and form of at least one instruction associated with the set 214 may be influenced according to at least one of at least one condition, event, action, function and criterion, such as at least one at least potentially fraudulent pattern involving the computing node 202, a determined number of at least one block generated in the system 200, at least one result of at least one evaluation of at least one level of trustworthiness associated with at least one involved computing node, such as the computing node 202, at least one ongoing and/or requested action related to the system 200 and involving, such as originating from, the computing node 202, at least one characteristic associated with the user 204 and/or the like.
  • At least one signature, co-signature, obfuscation method and/or encryption method is involved in at least one interaction between at least one portion of the nodes 202, 212a-d and/or a third party related to the system 200.
  • at least one of at least one result associated with an execution of at least one instruction of the set 214 and at least one communication involving at least one of the node 202 and the nodes 212a-d also comprises at least one signature and/or co-signature.
  • an additional authority related to the system 200 is associated with at least one additional smart contract, a system manager, a server, a computing node, a processing device and/or a software, such as an authority granting an entity related to the system 200 a right to enable at least one specific action, such as an updating and/or altering and/or creating and/or removal of at least one portion of at least one of at least one instruction of at least one set and at least one set of at least one instruction, and/or the like. It will thus be appreciated that the nature of the system 200 may be provided in various forms.
  • Figure 3 is a schematic diagram illustrating an electronic device 1000 which may be used in accordance with one or more non-limiting embodiments of the present technology.
  • an electronic device 1000 suitable for use with at least one implementation of the present technology, the electronic device 1000 comprising various hardware components including one or more single or multicore processors collectively represented by processor 1002, a graphics processing unit (GPU) 1004, a storage drive such as a solid-state drive 1006, a random-access memory 1008, a display interface 1010, and an input/output interface 1012.
  • processor 1002 a graphics processing unit (GPU) 1004
  • storage drive such as a solid-state drive 1006, a random-access memory 1008, a display interface 1010, and an input/output interface 1012.
  • Communication between the various components of the electronic device 1000 may be enabled by one or more internal and/or external buses 1014, such as a PCI bus, universal serial bus, IEEE 1394 "Firewire” bus, SCSI bus, Serial-ATA bus, and/or the like, to which the various hardware components are electronically coupled.
  • the input/output interface 1012 may be coupled to a touchscreen 1016 and/or to the one or more internal and/or external buses 1014.
  • the touchscreen 1016 may be portion of the display. In at least one embodiment, the touchscreen 1016 is the display.
  • the touchscreen 1016 may equally be referred to as a screen 1016.
  • the touchscreen 1016 comprises touch hardware 1018 (e.g., pressure-sensitive cells embedded in a layer of a display allowing detection of a physical interaction between a user and the display) and a touch input/output controller 1020 allowing communication with the display interface 1010 and/or the one or more internal and/or external buses 1014.
  • the input/output interface 1012 may be connected to a keyboard (not shown), a mouse (not shown) and/or a trackpad (not shown)
  • the solid-state drive According to implementations of the present technology, the solid-state drive
  • the 1006 stores machine readable instructions suitable for being loaded into the randomaccess memory 1008 and executed by the processor 1002 and/or the GPU 1004 for a blockchain.
  • the program instructions may be a portion of a library and/or an application.
  • the electronic device 1000 may be implemented as a server, a desktop computer, a laptop computer, a tablet, a smartphone, a given, or a plurality thereof, device comprising and/or being a device capable of executing computer interpretable instructions, such as an ARDUINO®, a personal digital assistant and/or any device that may be configured to implement the present technology, as it may be understood by a person skilled in the art.
  • ARDUINO® a personal digital assistant
  • FIG. 4 there is shown an embodiment of a method for determining at least one set of at least one instruction related to a distributed ledger enabled system, the method being performed according to at least one first computing node part of a distributed ledger enabled system.
  • processing step 402 at least one first set of at least one instruction is obtained.
  • the at least one first set of at least one instruction is obtained upon request according to at least one of the at least one first computing node. In at least one embodiment, at least one of the at least one first set of at least one instruction is obtained after a predetermined number of at least one block generated in the distributed ledger enabled system. In at least one embodiment, the predetermined number of at least one block is associated with a parameter. In at least one embodiment, the at least one first set of at least one instruction is obtained upon request of at least one of at least one computing node, system manager and smart contract.
  • the at least one first set of at least one instruction comprises a plurality of sets, wherein at least one portion of the plurality of first sets is associated with at least one portion of the at least one first computing node.
  • the at least one first computing node comprises a plurality of computing nodes.
  • each one of at least one portion of the plurality of first computing nodes is associated with a corresponding user.
  • a plurality of first computing nodes can increase the accuracy of the method disclosed in figure 4 by having different sources of information and/or feedback instead of a single one.
  • at least one portion of the plurality of first computing nodes performs at least one of a validation and signature in relation with at least one instruction before compiling at least one result associated and obtained therewith, which enables, according to the embodiment, at least one of the determining of the at least one set of at least one instruction and further processing of the at least one first set of at least one instruction.
  • one or more embodiments involving a plurality of first computing nodes implies interactions and/or communications between at least one portion of the plurality of first computing nodes to achieve at least one relevant processing step of the method disclosed in figure 4, such as the at least one of the determining of the at least one set of at least one instruction and the further processing of the at least one first set of at least one instruction.
  • the at least one determined set of at least one instruction is suitable for determining at least one right associated with at least one given computing node, the at least one given computing node being related to the distributed ledger enabled system.
  • the at least one right comprises at least one of at least one authorization, at least one role, at least one action and at least one access related to the distributed ledger enabled system.
  • the at least one right may vary greatly in nature, type, form, scope and/or the like from at least one first embodiment to at least one other.
  • the right at least enables at least one of joining and/or accessing at least one portion of a distributed ledger enabled system, performing a transaction in the network, forging and/or generating block, approving a transaction, determining at least one set of at least one instruction related to the distributed ledger enabled system, performing a defined role in the network, maintaining a status as an active node in a distributed ledger enabled system, providing instructions for being approved, minting a non-fungible token (NFT), at least one of at least one physical access and digital access, such as at least one of a physical premise and an API and/or virtual room and/or digital platform and/or feature of at least one digital product, and the like.
  • NFT non-fungible token
  • At least one of the at least one right is related to at least one of at least one role in a distributed ledger enabled system implementing the Proof of Justice (PoJ) consensus algorithm.
  • PoJ Proof of Justice
  • the type of right(s) to be provided to the at least one given computing node may depend on the obtained at least one result. For instance, a given group of rights obtained by the at least one given computing node may enable an accessing at least one portion of a distributed ledger enabled system and generating a transaction, but may not enable a generating and/or forging of a block.
  • right(s) associated with a plurality of computing nodes when combined, enables at least one other right. For instance, at least one portion from the plurality of computing nodes give its approval for a given event and/or action, thereby enabling the given event and/or action.
  • the at least one determined set of at least one instruction is suitable for determining at least one level of trustworthiness associated with the at least one given computing node.
  • at least one result, or indication thereof, associated with an execution related to at least one portion of the at least one instruction of the at least one determined set can be considered as personal information of a user associated with the at least one given computing node. It will be appreciated that a low level of trustworthiness is typically associated with risk, such as potentially malicious behavior, and a high level of trustworthiness is typically associated with user demonstrating a good behavior.
  • the at least one level of trustworthiness is suitable for ensuring that a user is not associated with unwanted behavior involving at least one of at least one existing wallet and at least one computing node related to the distributed ledger enabled system.
  • unwanted behavior may vary greatly form at least one embodiment to at least one other.
  • the unwanted behavior comprises at least one of the user being an at least partial owner of at least one of the at least one existing wallet and the at least one computing node and a lack of compliance in relation to at least one determined rule in the distributed ledger enabled system, such as generating a number of at least one transaction in a determined number of at least one block above a determined number, such as a parameter, in the distributed ledger enabled system and/or the like, involving at least one of at least one existing wallet and at least one computing node related to the distributed ledger enabled system.
  • information associated with the at least one result, or indication thereof may be used for searching into data source(s), such as public database(s), for signs of one or more suspicious activities.
  • At least one computer program, computing node and/or person may search social media platforms, third party database(s) and/or other source of data for possible committed infractions or problematic content related to the user associated with the at least one given computing node in order to establish at least one level of trustworthiness. For instance, a detection of a criminal record, a bad, or lack thereof, credit record, inappropriate content shared on platforms such as social media and/or the like may affect at least one of the at least one level of trustworthiness of the at least one given computing node.
  • At least one given level of trustworthiness associated with a given user is influenced by a sensitivity level, such as an amount and/or nature and/or form and/or type and/or scope of personal information, of at least one input related to, such as from, the given user.
  • a sensitivity level such as an amount and/or nature and/or form and/or type and/or scope of personal information
  • the at least one first set of at least one instruction is at least partially generated and/or altered and/or enabled dynamically according to at least one of at least one condition, event, action, function and criterion, such as activities associated with the distributed ledger related system, at least one at least potentially fraudulent pattern involving at least one of the at least one first computing node, a determined number of at least one block generated in the distributed ledger enabled system, at least one result of at least one evaluation of at least one level of trustworthiness associated with at least one involved computing node, such as at least one of the at least one first computing node, at least one ongoing and/or requested action related to the distributed ledger enabled system and involving, such as originating from, at least one of the at least one first computing node and/or the like.
  • At least one of the at least one first set of at least one instruction is at least partially invalidated.
  • the invalidating is influenced by at least one of the scope, nature, form and type of at least one instruction within the at least one of the at least one first set. For instance, in at least one embodiment, if a first given instruction of a first given set is a dependency of a second given instruction of a second given set and the first given instruction cannot be completed by a given first user because the given first user is not associated with at least one specific characteristic, the at least one specific characteristic being related to the first given instruction, the second given instruction may be invalidated.
  • at least one portion of at least one of the at least one first set is associated with, such as by originating from, at least one previously determined set of at least one instruction part of the distributed ledger enabled system.
  • At least one relevant set selected from a group consisting of the at least one set of at least one instruction is associated with at least one or more given computing nodes part of the distributed ledger enabled system.
  • the at least one relevant set could concern only computing nodes with a level of trustworthiness under or, in at least one embodiment, above a determined threshold.
  • the determined threshold is a parameter.
  • the determined threshold is calculated according to at least one of at least one condition, event, action, function and criterion, such as a change in reliability related to at least one portion of the concerned computing nodes.
  • At least one machine learning algorithm, at least one deep learning algorithm and/or the like are used to at least one of analyze, determine and verify the behavior associated with at least one portion of at least one relevant computing node, such as, in at least one abovementioned embodiment, at least one portion of the concerned computing nodes, and/or to provide at least one modification to at least one given first set selected from a group consisting of the at least one set of at least one instruction, such as, in at least one abovementioned embodiment, at least one of the at least one relevant set, which may improve the quality, such as the security, of one or more parts of the distributed ledger enabled system.
  • At least one system manager has the authority to add and/or modify and/or remove at least one instruction, or at least one set thereof, from the at least one set of at least one instruction, the at least one system manager being automated and/or controlled by at least one operator.
  • at least one of the common factor(s), such as criteria, of at least one of the at least one operator is at least one associated level of trustworthiness above a determined threshold.
  • the threshold is a parameter.
  • system 500 as shown is merely an illustrative implementation of the present technology.
  • description thereof that follows is intended to be only a description of illustrative examples of the present technology. This description is not intended to define the scope or set forth the bounds of the present technology.
  • modifications to the system 500 may also be set forth below. This is done merely as an aid to understanding, and, again, not to define the scope or set forth the bounds of the present technology. These modifications are not an exhaustive list, and, as a skilled addressee will understand, other modifications are likely possible.
  • FIG. 5 is a schematic diagram illustrating an embodiment of a system 500 comprising a plurality of nodes 505, 512a-f wherein a given computing node 505 is associated with a determining of a set of at least one instruction 514, in accordance with at least one embodiment.
  • the skilled addressee will appreciate that the given computing node 505 is a node connected to a network 510, the network 510 being connected to a plurality of other nodes 512a-f.
  • embodiments are not limited to six nodes 512a-f as depicted in Figure 5, and that the number of nodes part of the system 500 may vary greatly and be provided in various forms.
  • each node 505, 512a-d stores data part of and is associated with at least one version of the blockchain 508. In at least one embodiment, each node 512e-f stores minimal data part of at least one version of the blockchain 508.
  • the blockchain 508 presented in the system 500 is related to a system enabling to delegate a storing of at least one portion of data part of the blockchain 508 to at least one of the nodes 505, 512a-d, thereby implying that at least one portion of the nodes 505, 512a-d not storing at least one portion of data of the blockchain 508 would query at least one node storing data part of the blockchain 508 in order to obtain relevant data thereto, such as at least one given set of at least one instruction.
  • the network 510 may be of various types.
  • the network 510 is selected from a group comprising local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).
  • the network 510 is a peer-to-peer network which is related to the Internet.
  • the given computing node 505 of figure 5 is typically associated with a wallet 506, in which funds or other types of currency and/or assets may be associated with.
  • the wallet 506 is at least partially owned by a user 504.
  • the system 500 further comprises at least one first set of at least one instruction 516 that may be transferred using the network 510. It will be appreciated that the at least one first set of at least one instruction 516 is obtained in accordance with one or more embodiments of the method disclosed in Figure 4. In at least one embodiment, the at least one first set of at least one instruction 516 is stored in a storage medium, such as volatile memory and/or non-volatile memory, of at least one computing node of the plurality of computing nodes 505, 512a-d.
  • a storage medium such as volatile memory and/or non-volatile memory
  • At least one portion of the at least one first set of at least one instruction is stored by a third party, and the at least one first set of at least one instruction 516 is accessible upon request and/or according to at least one of at least one condition, event, action, function and criterion, such as at least one at least potentially fraudulent pattern involving the computing node 505, a determined number of at least one block generated in the system 500, at least one result of at least one evaluation of at least one level of trustworthiness associated with at least one involved computing node, such as the computing node 505, at least one ongoing and/or requested action related to the system 500 and involving, such as originating from, the computing node 505, at least one characteristic associated with the user 504 and/or the like.
  • at least one condition, event, action, function and criterion such as at least one at least potentially fraudulent pattern involving the computing node 505, a determined number of at least one block generated in the system 500, at least one result of at least one evaluation of at least one level of trustworthiness associated with at least
  • the node 505 obtains at least one first set of at least one instruction 516. Then, the at least one first set of at least one instruction 516 is processed. Then, the at least one set of at least one instruction 514 is determined according to at least one result of the processing, wherein the determined set of at least one instruction 514 is suitable for determining at least one right associated with at least one given computing node 512e-f, and further wherein the at least one given computing node 512e-f is related to the system 500, and further wherein the processing of the at least one first set of at least one instruction 516 comprises at least one of:
  • At least one approving process of at least one portion of the at least one first set of at least one instruction 516 At least one approving process of at least one portion of the at least one first set of at least one instruction 516.
  • interactions and/or communications such as at least one obtaining, providing, processing, validating and/or determining, between a plurality of nodes 505, 512a-d, such as the processing of the at least one first set of at least one instruction 516, typically use the network 510.
  • At least one of the nature, scope and form of at least one of at least one instruction associated with the at least one first set 516 and at least one instruction associated with the at least one set 514 may be influenced according to at least one of at least one condition, event, action, function and criterion, such as at least one at least potentially fraudulent pattern involving the computing node 505, a determined number of at least one block generated in the system 500, at least one result of at least one evaluation of at least one level of trustworthiness associated with at least one involved computing node, such as the computing node 505, at least one ongoing and/or requested action related to the system 500 and involving, such as originating from, the computing node 505, at least one characteristic associated with the user 504 and/or the like.
  • at least one condition, event, action, function and criterion such as at least one at least potentially fraudulent pattern involving the computing node 505, a determined number of at least one block generated in the system 500, at least one result of at least one evaluation of at least one level of trustworthiness associated with
  • At least one signature, co-signature, obfuscation method and/or encryption method is involved in at least one interaction between at least one portion of the nodes 505, 512a-d and/or a third party related to the system 500.
  • at least one of at least one result associated with the processing of least one instruction of the at least one first set 516 and at least one communication involving at least one of the node 505 and the nodes 512a-d also comprises at least one signature and/or co-signature.
  • an additional authority related to the system 500 is associated with at least one additional smart contract, a system manager, a server, a computing node, a processing device and/or a software, such as an authority granting an entity related to the system 500 a right to enable at least one specific action, such as an updating and/or altering and/or creating and/or removal of at least one portion of at least one of at least one instruction of at least one set and at least one set of at least one instruction, and/or the like. It will thus be appreciated that the nature of the system 500 may be provided in various forms.
  • At least one portion of the at least one set of at least one instruction is stored in at least one part of the distributed ledger enabled system, for instance in the form of at least one transaction and/or at least one indication recorded in a block part of the distributed ledger enabled system.
  • a node according to at least one of at least one first condition, action, function and criterion, such as being associated with at least one trustworthiness level, such as at least one reliability metric value, above a determined threshold, such as a parameter, may vote on modifying, adding and/or removing at least one instruction of the at least one set of at least one instruction.
  • the processing of the at least one first set of at least one instruction further comprises receiving at least one input from at least one user interacting with at least one corresponding computing node selected from a group consisting of the at least one first computing node.
  • a user input may increase at least one of a security and a quality aspect of the determined at least one set of at least one instruction.
  • the user may be prompted to select one or more numbers and/or choices as the user wishes, and/or draw a polygon when interfacing with a given node of the at least one corresponding computing node, which would then be used as a source of entropy for at least one randomization aspect of at least one of the at least one instruction of the at least one first set.
  • the processing of the at least one first set of at least one instruction involves at least one second computing node, such as at least one smart contract, at least one system manager and/or at least one third party, such as from one or more API(s).
  • at least one of the at least one first computing node and the at least one second computing node is considered to be reliable.
  • the processing comprises an approval process of at least one instruction of at least one of the at least one first set.
  • each first computing node processes at least one of at least one instruction of at least one of the at least one first set.
  • the processing further involves at least one synchronization and at least one compilation process.
  • the processing involves analyzing at least one portion of received data from at least one other computing node involved in the processing.
  • At least one portion of the at least one first set of at least one instruction is enabled by an approval involving at least one of a given first computing node involved in the processing, system manager, smart contract, third party, and the like.
  • at least one of the nature, scope and form of the approval may be influenced according to at least one of at least one condition, event, action, function and criterion, such as at least one at least potentially fraudulent pattern involving at least one of the at least one first computing node, a determined number of at least one block generated in the distributed ledger enabled system, at least one result of at least one evaluation of at least one level of trustworthiness associated with at least one involved computing node, such as at least one of the at least one first computing node, at least one ongoing and/or requested action related to the distributed ledger enabled system and involving, such as originating from, at least one of the at least one first computing node and/or the like.
  • At least one portion of the received data is individually and/or collectively evaluated.
  • a receiving computing node, or associated user thereof may select to either accept or deny at least one portion of at least one instruction part of the received data, and thus, according to at least one embodiment, with or without determining a reason.
  • a receiving computing node may ignore at least one relevant received instruction, which may be considered denied.
  • a receiving computing node is requested to interpret, decode, decrypt, use, analyze and/or the like at least one result from at least one received given set of at least one instruction to be able to determine a selection for at least one given instruction.
  • At least one portion of the received data is altered, such as by adding and/or removing and/or modifying one or more instructions obtained from the received data, prior further processing.
  • the altered data is provided to at least one portion of the at least one first computing node, enabling further processing involving the at least one portion of the at least one first computing node.
  • At least one selection of at least one of the at least one first computing node, or associated user thereof may be contested and penalized, according to at least one condition, such as a result of an evaluation associated with at least one portion of the at least one selection, if the selecting associated with the computing node involves approving instruction(s) that have been denied according to a majority of computing nodes involved in the processing, or if the selecting associated with the computing node involves denying instruction(s) that have been approved according to a majority of computing nodes involved in the processing.
  • the at least one selection of a receiving computing node concerning the processing may be contested and rewarded, according to at least one condition, if the selecting associated with the computing node involves approving instruction(s) that have been approved according to a majority of computing nodes involved in the processing, or if the selecting associated with the computing node involves denying instruction(s) that have been denied according to a majority of computing nodes involved in the processing.
  • a computing node, or plurality thereof, being a subject of a contest is requested to execute at least one instruction from at least one given set of at least one instruction, and according to at least one associated result and according to at least one condition, event, action, function and criterion relevant to the contest, a legitimacy, such as at least one level of trustworthiness, is established.
  • the computing node, or plurality thereof, being a subject to the contest may be found to be legitimate if no potentially malicious content, such as one or more instructions which can potentially harm the security of at least one of the distributed ledger enabled system and one or more users following an execution of at least one of the one or more instructions, is detected in the at least one associated result, and that the computing node, or plurality thereof, being a subject to the contest may be found not to be legitimate if content considered malicious is detected in the result.
  • no potentially malicious content such as one or more instructions which can potentially harm the security of at least one of the distributed ledger enabled system and one or more users following an execution of at least one of the one or more instructions
  • a contest concerning a computing node, or plurality thereof may be created according to at least one request from at least one system manager, smart contract, computing node, third party and/or the like.
  • the contest fails, i.e., the computing node, or plurality thereof, being a subject to the contest is found to be legitimate, an entity which participated in the creation of the contest may be penalized.
  • the contest succeeds, i.e., the computing node, or plurality thereof, being a subject to the contest is found not to be legitimate, the contesting one or more entities may be rewarded.
  • a contest is at least enabled if a determined number of at least one request is created.
  • the number varies according to at least one criterion, such as at least one trustworthiness level, such as at least one reliability metric value, associated with at least one computing node associated with at least one created request.
  • a given selection associated with a computing node has a weight which may differ from other computing node(s) part of the distributed ledger enabled system. More precisely, according to a calculating of a number of approved and/or denied instruction(s) and/or group(s) of instruction(s) according to a given computing node and/or according to at least one condition, event, action, function and criterion, such as a level of trustworthiness, such as a reliability metric value, a resulting weight amount may thereafter be obtained which, when combined with a given selection, allows an obtaining of a weighted given selection.
  • At least one portion of the computing node(s) part of the distributed ledger enabled system have a similar selection weight, even when, in at least one embodiment, the abovementioned amount varies by, in one or more embodiments, up to a determined threshold.
  • the determined threshold is a parameter or is determined according to at least one level of trustworthiness of a target computing node.
  • each computing node has a corresponding selection weight that may be one of based on and influenced by various factors, such as the elapsed time since a computing node has joined the distributed ledger enabled system, an amount, or number thereof, of resources placed by the computing node in the distributed ledger enabled system, at least one level of trustworthiness associated with the computing node, and/or the like.
  • a selection weight is established according to at least one of at least one computing node, system manager and smart contract.
  • the selection weight is influenced by a number, or quantity thereof, of resources that a target computing node, or associated wallet thereof, at least one of possesses and provides to at least one of at least one system manager, smart contract, computing node and third party.
  • a reward is provided to a target computing node according to the selection weight thereof for at least one selection.
  • a selection weight is influenced by at least one processing-related set of at least one instruction that at least one concerned computing node at least attempting to participate is required to execute using, in one or more embodiments, the method related to figure 1.
  • the selection weight may be updated according to at least one associated given result obtained according to the executing associated with the at least one processing-related set of at least one instruction.
  • At least one portion of at least one selection of at least one computing node involves at least one input of at least one user associated with the at least one computing node.
  • the determining of the at least one set of at least one instruction at least one of enables a determining and comprises determining at least one level of trustworthiness associated with at least one of the at least one first computing node and the at least one second computing node.
  • At least one of the at least one first computing node participating in the method for processing at least one set of at least one instruction may receive a reward if the at least one contribution is determined as satisfactory and/or according to at least one condition, such as by being associated, such as by contributing, with a determined number of instruction(s) in the determined at least one set of at least one instruction.
  • the at least one contribution is determined as satisfactory according to at least one parameter, other computing node, rule, and/or the like.
  • different levels of contributing offer different rewards.
  • the reward may be, for instance, funds, at least one digital asset, at least one right, an increase in at least one level of trustworthiness and/or the like.
  • the at least one of the at least one first computing node may receive a penalty if the at least one contribution is not determined as satisfactory.
  • the penalty may be, for instance, a right taken away, a fine, an expulsion, a reduction in at least one level of trustworthiness and/or the like.
  • different levels of contributing cause different penalties.
  • at least one of the at least one second computing node may also be eligible for at least one of at least one reward and at least one penalty.
  • the processing of the at least one first set of at least one instruction comprises at least one of at least one altering of at least one portion of the at least one first set of at least one instruction and at least one approving process of at least one portion of the at least one first set of at least one instruction.
  • the at least one approving process involves at least one vote, such as at least one weighted or unweighted vote, in accordance with at least one of the at least one first computing node.
  • the skilled addressee will appreciate that at least one of the at least one altering and the at least one approving process may vary greatly in shape, form, scope and nature.
  • the at least one altering is associated with the abovementioned one or more given embodiments.
  • the at least one approving process is associated with the abovementioned at least one given embodiment.
  • the involving of the at least one second computing node comprises at least one of the at least one approving process of at least one portion of the at least one first set of at least one instruction.
  • the involving of the at least one second computing node is associated with the abovementioned one or more relevant embodiments.
  • processing step 406 the at least one set of at least one instruction, according to at least one result of the processing, is determined.
  • only a portion of at least one given set of at least one given instruction is determined, while the at least one other portion is marked as incomplete for future processing purposes, for instance, another obtaining (402) and processing (404) which can use the at least one other portion, for instance, as a starting point.
  • only the determined instruction(s) and/or group(s) of instruction(s) can be at least one of provided to and accessed by the at least one given computing node.
  • an entirety of the set of at least one instruction or a portion thereof can be at least one of provided to and accessed by the at least one given computing node if the number of approved instruction(s) and/or group(s) of instruction(s) meet a defined threshold which, in at least one embodiment, is a parameter.
  • the set of at least one instruction is provided once a defined amount of time has elapsed since the obtaining of the set of at least one instruction.
  • At least one of the at least one first set of at least one instruction is at least one of the at least one determined set of at least one instruction, such as when all instruction(s) of all first set(s) are approved and, in at least one embodiment, generated using at least one portion of the at least one first computing node.
  • At least one of the at least one determined set of at least one instruction is derived from at least one of the at least one first set of at least one instruction, such as when at least one portion of the at least one instruction of the at least one first set has been previously marked as incomplete, and processed, such as altered, prior the at least one set of at least one instruction being determined.
  • the at least one set of at least one instruction is suitable for ensuring that the user is not associated with unwanted behavior involving at least one of at least one existing wallet and at least one computing node related to the distributed ledger enabled system.
  • the skilled addressee will further appreciate that at least one of the nature, scope and form of the unwanted behavior may vary greatly form at least one embodiment to at least one other.
  • the unwanted behavior comprises at least one of the user being an at least partial owner of at least one of the at least one existing wallet and the at least one computing node and a lack of compliance in relation to at least one determined rule in the distributed ledger enabled system, such as generating a number of at least one transaction in a determined number of at least one block above a determined number, such as a parameter, in the distributed ledger enabled system and/or the like, involving at least one of at least one existing wallet and at least one computing node related to the distributed ledger enabled system.
  • At least one portion of at least one of the processing of the at least one first set of at least one instruction, the at least one first set of at least one instruction, the determining of the at least one set of at least one instruction and the at least one set of at least one instruction is associated with at least one of at least one encryption, obfuscation and anonymization method.
  • the at least one of at least one encryption, obfuscation and anonymization comprises Differential Privacy, Homomorphic Encryption, Secure Multiparty Computation and/or the like.
  • At least one of the obtaining of the at least one first set of at least one instruction, the processing of the at least one first set of at least one instruction and the determining the at least one set of at least one instruction is enabled according to at least one of at least one condition, event, action, function and criterion related to the distributed ledger enabled system.
  • At least one of the type, nature, scope and form of at least one instruction associated with at least one given set may be influenced according to at least one of at least one condition, event, action, function and criterion, such as at least one at least potentially fraudulent pattern related to the distributed ledger enabled system, a determined number of at least one block generated in the distributed ledger enabled system and/or the like.
  • At least one signature, co-signature, obfuscation method and/or encryption method is at least one of involved in at least one interaction between at least one portion of the at least one first computing node and/or at least one other concerned computing node, such as the at least one second computing node, related to at least one aspect of at least one of the obtaining of the at least one first set of at least one instruction, the processing of the at least one first set of at least one instruction and the determining of the at least one set of at least one instruction and associated with the at least one result.
  • asymmetric encryption and/or symmetric encryption is at least one of involved in at least one interaction between at least one portion of the at least one first computing node and/or at least one other concerned computing node, such as the at least one second computing node, related to at least one aspect of at least one of the obtaining of the at least one first set of at least one instruction, the processing of the at least one first set of at least one instruction and the determining of the at least one set of at least one instruction and associated
  • At least one of an obtaining and a processing associated with a plurality of computing nodes involves at least one of at least one choosing, coordination, synchronization and compilation process.
  • At least one element selected from a group comprising at least one of at least one right, at least one level of trustworthiness, at least one uniqueness factor and the like associated with at least one computing node involves the at least one element being associated with involved at least one wallet, each of the at least one wallet being associated with at least one of the at least one computing node.
  • a set of at least one instruction may comprise a single instruction or a plurality of instructions, according to various embodiments.
  • One of the several advantages of one or more embodiments of the methods and systems disclosed is that entities comprised in the distributed ledger enabled system are involved in the determining of the sets of instructions that are provided to new entities. Enabling entities part of the distributed ledger enabled system to get involved in the determining of instructions and associated sets can significantly and increasingly reduce overall system risks over time by dynamically adapting the instructions according to the distributed ledger enabled system’s needs.
  • One other advantage of the several advantages of one or more embodiments of the method and the system disclosed is that the instructions provided to entities seeking rights can confirm that a given computing node is associated with a user and that the user is determined to not be associated with unwanted behavior.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multi Processors (AREA)

Abstract

L'invention concerne un procédé de détermination d'au moins un droit associé à au moins un nœud informatique donné lié à un système adapté à un registre distribué. Le procédé comprend l'obtention d'au moins un ensemble d'au moins une instruction à exécuter en utilisant ledit nœud informatique donné ; l'obtention d'au moins un résultat associé à une exécution dudit ensemble et la détermination dudit droit selon ledit résultat. L'exécution dudit ensemble d'au moins une instruction consiste à recevoir au moins une entrée de la part d'un utilisateur qui coopère avec ledit nœud informatique donné et ledit ensemble d'au moins une instruction est approprié pour garantir que l'utilisateur n'est pas associé à un comportement indésirable impliquant au moins l'un parmi au moins un portefeuille existant et au moins un nœud informatique.
PCT/IB2023/054110 2022-04-22 2023-04-21 Procédé et système de détermination d'au moins un droit associé à au moins un nœud informatique donné WO2023203543A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202263333742P 2022-04-22 2022-04-22
US63/333,742 2022-04-22

Publications (1)

Publication Number Publication Date
WO2023203543A1 true WO2023203543A1 (fr) 2023-10-26

Family

ID=88419432

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2023/054110 WO2023203543A1 (fr) 2022-04-22 2023-04-21 Procédé et système de détermination d'au moins un droit associé à au moins un nœud informatique donné

Country Status (1)

Country Link
WO (1) WO2023203543A1 (fr)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021030634A1 (fr) * 2019-08-13 2021-02-18 Facetec, Inc. Procédé et appareil de création et d'utilisation d'identification numérique
US20220084013A1 (en) * 2019-01-18 2022-03-17 Blockrules Ltd Identity management, smart contract generator, and blockchain mediating system, and related methods

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220084013A1 (en) * 2019-01-18 2022-03-17 Blockrules Ltd Identity management, smart contract generator, and blockchain mediating system, and related methods
WO2021030634A1 (fr) * 2019-08-13 2021-02-18 Facetec, Inc. Procédé et appareil de création et d'utilisation d'identification numérique

Similar Documents

Publication Publication Date Title
US11671256B2 (en) Distributed consent protecting data across systems and services
US20220277307A1 (en) Systems and methods for personal identification and verification
US11979504B2 (en) Blockchain architecture conforming to general data protection regulation for management of personally identifiable information
US20230006976A1 (en) Systems and Method for Providing Security Against Deception and Abuse in Distributed and Tokenized Environments
US8474018B2 (en) Role-based attribute based access control (RABAC)
US20230086191A1 (en) Systems and Methods for Token Content Unlocking, Biometric Authentication using Privacy-Protecting Tokens, Ownership-Based Limitations of Content Access, Policy-Based Time Capsule Technology, and Content Lock Mechanisms
WO2019086553A1 (fr) Gestion de confidentialité
JP2021504833A (ja) 資産管理方法および装置、および電子デバイス
US20200014702A1 (en) Adaptive multi-factor authentication system with multi-user permission strategy to access sensitive information
JP2018537022A (ja) デジタルアイデンティティを管理するためのシステム及び方法
TWI751422B (zh) 核身產品推送及核身方法和系統
US20180218364A1 (en) Managing distributed content using layered permissions
JP2018063695A (ja) 安全なオンラインバンキングトランザクションを実行するためのシステム及び方法
Yin et al. Hierarchically defining Internet of Things security: From CIA to CACA
Ahmad et al. Machine learning-based intelligent security framework for secure cloud key management
US20230129900A1 (en) Systems and Methods for Protecting Against Token-Based Malicious Scripts
Zhu et al. A proposal for account recovery in decentralized applications
Thakur et al. AntiPhiMBS-Auth: A new anti-phishing model to mitigate phishing attacks in mobile banking system at authentication level
WO2023203543A1 (fr) Procédé et système de détermination d'au moins un droit associé à au moins un nœud informatique donné
Guerar et al. TruthSeekers Chain: leveraging Invisible CAPPCHA, SSI and Blockchain to combat disinformation on social media
CN110533269B (zh) 业务风险防控方法及装置
O’Regan Ethics and privacy
Hon Security risks and concepts
Deters How to detect and contain suspicious transactions in distributed ledgers
Ansar et al. Blockchain based general data protection regulation compliant data breach detection system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23791449

Country of ref document: EP

Kind code of ref document: A1