Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

SYSTEMS AND METHODS FOR ENFORCING CRYPTOGRAPHICALLY SECURE ACTIONS IN PUBLIC, NON-PERMISSIONED BLOCKCHAINS USING BIFURCATED SELF-EXECUTING PROGRAMS COMPRISING SHARED DIGITAL SIGNATURE REQUIREMENTS

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Publication Date:
    December 26, 2024
  • Additional Information
    • Document Number:
      20240430102
    • Appl. No:
      18/820107
    • Application Filed:
      August 29, 2024
    • Abstract:
      Systems and methods for a bifurcated self-executing program that wraps a first self-executing program (e.g., a first smart contract) on a blockchain within a second self-executing program (e.g., a second smart contract), in which the second self-executing program enforces the digital signature requirement. The bifurcated self-executing program comprises a single compiled self-executing program that combines the first self-executing program and the second self-executing program.
    • Assignees:
      Citibank, N.A. (New York, NY, US)
    • Claim:
      1. A system for conducting cryptographically secure actions in public, non-permissioned blockchains using a layer one blockchain solution featuring bifurcated self-executing programs that are compiled together and comprise shared digital signature requirements, the system comprising: a blockchain node for a cryptographically secure network, wherein the blockchain node comprises one or more processors; and a non-transitory computer-readable medium having instructions recorded thereon that, when executed by the one or more processors, cause operations comprising: receiving a first request, at a bifurcated self-executing program, to perform a first blockchain action, wherein the first request has a first origination, and wherein the bifurcated self-executing program comprises a combination of a plurality of individual self-executing programs that cannot be altered once the bifurcated self-executing program is deployed; in response to receiving the first request, processing the first request with a first self-executing program of the bifurcated self-executing program; determining, based on the first self-executing program, whether the first origination corresponds to an origination requirement; and in response to determining that the first origination corresponds to the origination requirement, processing the first request with a second self-executing program of the bifurcated self-executing program to perform the first blockchain action.
    • Claim:
      2. A method for conducting cryptographically secure blockchain actions in public, non-permissioned blockchains using a layer one blockchain solution featuring bifurcated self-executing programs, the method comprising: receiving a first request, at a bifurcated self-executing program, to perform a first blockchain action, wherein the first request has a first origination, and wherein the bifurcated self-executing program comprises a combination of a plurality of individual self-executing programs that cannot be altered once the bifurcated self-executing program is deployed; in response to receiving the first request, processing the first request with a first self-executing program of the bifurcated self-executing program; determining, based on the first self-executing program, whether the first origination corresponds to an origination requirement; and in response to determining that the first origination corresponds to the origination requirement, processing the first request with a second self-executing program of the bifurcated self-executing program to perform the first blockchain action.
    • Claim:
      3. The method of claim 2, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining an entity that issued the first request; and determining the first origination based on the entity.
    • Claim:
      4. The method of claim 2, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining a vetted entity; and determining the origination requirement based on the vetted entity.
    • Claim:
      5. The method of claim 2, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining an address that issued the first request; and determining the first origination based on the address.
    • Claim:
      6. The method of claim 2, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining a unique identifier that issued the first request; and determining the first origination based on the unique identifier.
    • Claim:
      7. The method of claim 2, further comprising: determining a notification requirement for the first request, wherein the notification requirement notifies an entity of the first request; and receiving a confirmation that the notification requirement has been satisfied.
    • Claim:
      8. The method of claim 2, further comprising: determining a first processing characteristic corresponding to the first request; and determining, based on the first self-executing program, whether the first processing characteristic corresponds to a predetermined processing characteristic.
    • Claim:
      9. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a security certificate for the first request; determining, based on the predetermined processing characteristic, a security certificate requirement for the bifurcated self-executing program; and determining whether the security certificate corresponds to the security certificate requirement.
    • Claim:
      10. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a request validator for the first request; determining, based on the predetermined processing characteristic, a request validator requirement for the bifurcated self-executing program; and determining whether the request validator corresponds to the request validator requirement.
    • Claim:
      11. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a request validation procedure for the first request; determining, based on the predetermined processing characteristic, a request validation procedure requirement for the bifurcated self-executing program; and determining whether the request validation procedure corresponds to the request validation procedure requirement.
    • Claim:
      12. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a request testing protocol procedure for the first request; determining, based on the predetermined processing characteristic, a request testing protocol requirement for the bifurcated self-executing program; and determining whether the request testing protocol procedure corresponds to the request testing protocol requirement.
    • Claim:
      13. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a supported protocol for the first request; determining, based on the predetermined processing characteristic, a protocol requirement for the bifurcated self-executing program; and determining whether the supported protocol corresponds to the protocol requirement.
    • Claim:
      14. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a digital asset type for the first request; determining, based on the predetermined processing characteristic, a digital asset type requirement for the bifurcated self-executing program; and determining whether the digital asset type corresponds to the digital asset type requirement.
    • Claim:
      15. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a synthetic asset support for the first request; determining, based on the predetermined processing characteristic, a synthetic asset support requirement for the bifurcated self-executing program; and determining whether the synthetic asset support corresponds to the synthetic asset support requirement.
    • Claim:
      16. The method of claim 8, wherein the bifurcated self-executing program is generated based on: receiving a first uncompiled version of the first self-executing program; receiving a second uncompiled version of the second self-executing program; and compiling the first uncompiled version of the first self-executing program and the second uncompiled version of the second self-executing program to generate the bifurcated self-executing program.
    • Claim:
      17. A non-transitory, computer-readable medium, comprising instructions that, when executed by one or more processors, cause operations comprising: receiving a first request, at a bifurcated self-executing program, to perform a first blockchain action, wherein the first request has a first origination, and wherein the bifurcated self-executing program comprises a combination of a plurality of individual self-executing programs that cannot be altered once the bifurcated self-executing program is deployed; in response to receiving the first request, processing the first request with a first self-executing program of the bifurcated self-executing program; determining, based on the first self-executing program, whether the first origination corresponds to an origination requirement; and in response to determining that the first origination corresponds to the origination requirement, processing the first request with a second self-executing program of the bifurcated self-executing program to perform the first blockchain action.
    • Claim:
      18. The non-transitory, computer-readable medium of claim 17, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining an entity that issued the first request; and determining the first origination based on the entity.
    • Claim:
      19. The non-transitory, computer-readable medium of claim 17, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining a vetted entity; and determining the origination requirement based on the vetted entity.
    • Claim:
      20. The non-transitory, computer-readable medium of claim 17, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining an address that issued the first request; and determining the first origination based on the address.
    • Current International Class:
      04; 04; 04
    • Accession Number:
      edspap.20240430102