×

Cryptographic currency user directory data and enhanced peer-verification ledger synthesis through multi-modal cryptographic key-address mapping

  • US 9,830,593 B2
  • Filed: 04/26/2014
  • Issued: 11/28/2017
  • Est. Priority Date: 04/26/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method, using a computer processor and a physical memory, comprising:

  • determining that a propagation packet is a transaction of a cryptographic currency propagating across a network for integration into a peer-verification ledger based on identification within an application layer protocol of the propagation packet at least one of;

    a magic number associated with a specific cryptographic currency, a byte size of the propagation packet, and a hash format associated with the specific cryptographic currency, the magic number located in a header field of the application layer protocol, and the transaction comprising a value transfer of the cryptographic currency between an input key-address of an input of the transaction and an output key-address of an output of the transaction;

    extracting an IP address from a TCP/IP layer of the propagation packet associated with the transaction;

    extracting, from the transaction, a transactional hash associated with the input of the transaction, the transactional hash referencing a previous output of a previous transaction;

    analyzing the peer-verification ledger to determine the input key-address associated with transactional hash referencing the previous output;

    extracting the input key-address of the input of the transaction of the cryptographic currency propagating across the network for integration into the peer-verification ledger;

    linking the IP address from the TCP/IP layer of the propagation packet with the input key-address of the input of the transaction;

    determining that the input key-address of the input of the transaction is under a suspected control of a user of interest based on an association between the user of interest and the IP address extracted from the TCP/IP layer of the propagation packet of the transaction;

    stratifying, within a user directory data, a designation of the suspected control of the input key-address of the input of the transaction into one or more designations of a provisional control and a designation of a verified control, based on a predetermined certainty of the association between the user of interest and the IP address extracted from the TCP/IP layer of the propagation packet of the transaction;

    determining that a point-to-point packet relayed between the user of interest and a correspondent of the user of interest is a key-bearing communication comprising a relayed key-address of the key-bearing communication, the key-bearing communication being at least one of an email, a chat note, a social media message, a text message and a voice call;

    extracting the relayed key-address of the key-bearing communication from the key-bearing communication;

    determining that the user directory data includes the relayed key-address of the key-bearing communication;

    when the user directory data does not include the relayed key-address of the key-bearing communication, creating a new entry for the relayed key-address within the user directory data;

    designating, within the user directory data, the relayed key-address of the key-bearing communication as under the suspected control of the user of interest;

    identifying the point-to-point packet as associated with the key-bearing communication based on at least one of a length of a character string of the relayed key-address of the key-bearing communication, a leading character of the character string of the relayed key-address of the key-bearing communication, and the character string of the relayed key-address of the key-bearing communication being a base-58 alpha-numeric format; and

    stratifying, within the user directory data, the designation of the suspected control of the relayed key-address of the key-bearing communication into the one or more designations of the provisional control and the designation of the verified control, based upon a predetermined certainty of an association between the user of interest and at least one of an IP address of the key-bearing communication extracted from the TCP/IP layer of the peer-to-peer packet and an online identity associated with a transmission of the key-bearing communication.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×