System and method for implementing hybrid public-private block-chain ledgers
First Claim
1. An apparatus, comprising:
- a communications unit;
a storage device; and
at least one processor coupled to the storage device and to the communications unit, the storage device storing software instructions for controlling the at least one processor when executed by the at least one processor, and the at least one processor being operative with the software instructions and configured to;
detect an occurrence of an event involving an asset tracked within a distributed storage ledger;
obtain encrypted trigger-event data from at least one block of the distributed storage ledger and decrypt the encrypted trigger-event data using a private cryptographic key associated with an owner of the tracked asset;
when the detected event corresponds to at least one triggering event identified within the decrypted trigger-event data, obtain encrypted rules data identifying one or more rules from the at least one block of the distributed storage ledger, the one or more rules being established by a centralized authority associated with the tracked asset;
decrypt the encrypted rules data using a master cryptographic key associated with the centralized authority;
identify, based on the decrypted rules data, at least one of the one or more rules that exhibits a causal relationship with the detected event; and
perform first operations consistent with the at least one identified rule, the first operations involving the tracked asset.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosed embodiments include computerized systems and methods that generate secured distributed storage ledger structures, such as block-chain-based ledger structures, that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a centralized authority of the secured distributed storage ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured distributed storage ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule and involving at least one of assets tracked within the secured distributed storage ledger or an owner of a portion of the tracked assets.
-
Citations
41 Claims
-
1. An apparatus, comprising:
-
a communications unit; a storage device; and at least one processor coupled to the storage device and to the communications unit, the storage device storing software instructions for controlling the at least one processor when executed by the at least one processor, and the at least one processor being operative with the software instructions and configured to; detect an occurrence of an event involving an asset tracked within a distributed storage ledger; obtain encrypted trigger-event data from at least one block of the distributed storage ledger and decrypt the encrypted trigger-event data using a private cryptographic key associated with an owner of the tracked asset; when the detected event corresponds to at least one triggering event identified within the decrypted trigger-event data, obtain encrypted rules data identifying one or more rules from the at least one block of the distributed storage ledger, the one or more rules being established by a centralized authority associated with the tracked asset; decrypt the encrypted rules data using a master cryptographic key associated with the centralized authority; identify, based on the decrypted rules data, at least one of the one or more rules that exhibits a causal relationship with the detected event; and perform first operations consistent with the at least one identified rule, the first operations involving the tracked asset. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer-implemented method, comprising:
-
detecting, using at least one processor, an occurrence of an event involving an asset tracked within a distributed storage ledger; using the at least one processor, obtaining encrypted trigger-event data from at least one block of the distributed storage ledger and decrypting the encrypted trigger-event data using a private cryptographic key associated with an owner of the tracked asset; when the detected event corresponds to at least one triggering event identified within the decrypted trigger-event data, obtaining, using the at least one processor, encrypted rules data identifying one or more rules from the at least one block of the distributed storage ledger, the one or more rules being established by a centralized authority associated with the tracked asset; decrypting, using the at least one processor, the encrypted rules data using a master cryptographic key associated with the centralized authority; based on the decrypted rules data, identifying, using the at least one processor, at least one of the one or more rules that exhibits a causal relationship with the detected event; and performing, using the at least one processor, first operations consistent with the at least one identified rule, the first operations involving the tracked asset. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A tangible, non-transitory computer-readable medium storing instructions that, when executed by at least one processor, perform a method comprising:
-
detecting, using at least one processor, an occurrence of an event involving an asset tracked within a distributed storage ledger; obtaining encrypted trigger-event data from at least one block of the distributed storage ledger and decrypting the encrypted trigger-event data using a private cryptographic key associated with an owner of the tracked asset; when the detected event corresponds to at least one triggering event identified within the decrypted trigger-event data, obtaining encrypted rules data identifying one or more rules from the at least one block of the distributed storage ledger, the one or more rules being established by a centralized authority associated with the tracked asset; decrypting the encrypted rules data using a master cryptographic key associated with the centralized authority; based on the decrypted rules data, identifying at least one of the one or more rules that exhibits a causal relationship with the detected event; and performing first operations consistent with the at least one identified rule, the first operations involving the tracked asset.
-
Specification