- Document Number:
20240430102
- Appl. No:
18/820107
- Application Filed:
August 29, 2024
- Abstract:
Systems and methods for a bifurcated self-executing program that wraps a first self-executing program (e.g., a first smart contract) on a blockchain within a second self-executing program (e.g., a second smart contract), in which the second self-executing program enforces the digital signature requirement. The bifurcated self-executing program comprises a single compiled self-executing program that combines the first self-executing program and the second self-executing program.
- Assignees:
Citibank, N.A. (New York, NY, US)
- Claim:
1. A system for conducting cryptographically secure actions in public, non-permissioned blockchains using a layer one blockchain solution featuring bifurcated self-executing programs that are compiled together and comprise shared digital signature requirements, the system comprising: a blockchain node for a cryptographically secure network, wherein the blockchain node comprises one or more processors; and a non-transitory computer-readable medium having instructions recorded thereon that, when executed by the one or more processors, cause operations comprising: receiving a first request, at a bifurcated self-executing program, to perform a first blockchain action, wherein the first request has a first origination, and wherein the bifurcated self-executing program comprises a combination of a plurality of individual self-executing programs that cannot be altered once the bifurcated self-executing program is deployed; in response to receiving the first request, processing the first request with a first self-executing program of the bifurcated self-executing program; determining, based on the first self-executing program, whether the first origination corresponds to an origination requirement; and in response to determining that the first origination corresponds to the origination requirement, processing the first request with a second self-executing program of the bifurcated self-executing program to perform the first blockchain action.
- Claim:
2. A method for conducting cryptographically secure blockchain actions in public, non-permissioned blockchains using a layer one blockchain solution featuring bifurcated self-executing programs, the method comprising: receiving a first request, at a bifurcated self-executing program, to perform a first blockchain action, wherein the first request has a first origination, and wherein the bifurcated self-executing program comprises a combination of a plurality of individual self-executing programs that cannot be altered once the bifurcated self-executing program is deployed; in response to receiving the first request, processing the first request with a first self-executing program of the bifurcated self-executing program; determining, based on the first self-executing program, whether the first origination corresponds to an origination requirement; and in response to determining that the first origination corresponds to the origination requirement, processing the first request with a second self-executing program of the bifurcated self-executing program to perform the first blockchain action.
- Claim:
3. The method of claim 2, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining an entity that issued the first request; and determining the first origination based on the entity.
- Claim:
4. The method of claim 2, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining a vetted entity; and determining the origination requirement based on the vetted entity.
- Claim:
5. The method of claim 2, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining an address that issued the first request; and determining the first origination based on the address.
- Claim:
6. The method of claim 2, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining a unique identifier that issued the first request; and determining the first origination based on the unique identifier.
- Claim:
7. The method of claim 2, further comprising: determining a notification requirement for the first request, wherein the notification requirement notifies an entity of the first request; and receiving a confirmation that the notification requirement has been satisfied.
- Claim:
8. The method of claim 2, further comprising: determining a first processing characteristic corresponding to the first request; and determining, based on the first self-executing program, whether the first processing characteristic corresponds to a predetermined processing characteristic.
- Claim:
9. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a security certificate for the first request; determining, based on the predetermined processing characteristic, a security certificate requirement for the bifurcated self-executing program; and determining whether the security certificate corresponds to the security certificate requirement.
- Claim:
10. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a request validator for the first request; determining, based on the predetermined processing characteristic, a request validator requirement for the bifurcated self-executing program; and determining whether the request validator corresponds to the request validator requirement.
- Claim:
11. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a request validation procedure for the first request; determining, based on the predetermined processing characteristic, a request validation procedure requirement for the bifurcated self-executing program; and determining whether the request validation procedure corresponds to the request validation procedure requirement.
- Claim:
12. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a request testing protocol procedure for the first request; determining, based on the predetermined processing characteristic, a request testing protocol requirement for the bifurcated self-executing program; and determining whether the request testing protocol procedure corresponds to the request testing protocol requirement.
- Claim:
13. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a supported protocol for the first request; determining, based on the predetermined processing characteristic, a protocol requirement for the bifurcated self-executing program; and determining whether the supported protocol corresponds to the protocol requirement.
- Claim:
14. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a digital asset type for the first request; determining, based on the predetermined processing characteristic, a digital asset type requirement for the bifurcated self-executing program; and determining whether the digital asset type corresponds to the digital asset type requirement.
- Claim:
15. The method of claim 8, wherein determining whether the first processing characteristic corresponds to the predetermined processing characteristic comprises: determining, based on the first processing characteristic, a synthetic asset support for the first request; determining, based on the predetermined processing characteristic, a synthetic asset support requirement for the bifurcated self-executing program; and determining whether the synthetic asset support corresponds to the synthetic asset support requirement.
- Claim:
16. The method of claim 8, wherein the bifurcated self-executing program is generated based on: receiving a first uncompiled version of the first self-executing program; receiving a second uncompiled version of the second self-executing program; and compiling the first uncompiled version of the first self-executing program and the second uncompiled version of the second self-executing program to generate the bifurcated self-executing program.
- Claim:
17. A non-transitory, computer-readable medium, comprising instructions that, when executed by one or more processors, cause operations comprising: receiving a first request, at a bifurcated self-executing program, to perform a first blockchain action, wherein the first request has a first origination, and wherein the bifurcated self-executing program comprises a combination of a plurality of individual self-executing programs that cannot be altered once the bifurcated self-executing program is deployed; in response to receiving the first request, processing the first request with a first self-executing program of the bifurcated self-executing program; determining, based on the first self-executing program, whether the first origination corresponds to an origination requirement; and in response to determining that the first origination corresponds to the origination requirement, processing the first request with a second self-executing program of the bifurcated self-executing program to perform the first blockchain action.
- Claim:
18. The non-transitory, computer-readable medium of claim 17, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining an entity that issued the first request; and determining the first origination based on the entity.
- Claim:
19. The non-transitory, computer-readable medium of claim 17, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining a vetted entity; and determining the origination requirement based on the vetted entity.
- Claim:
20. The non-transitory, computer-readable medium of claim 17, wherein determining, based on the first self-executing program, whether the first origination corresponds to the origination requirement further comprising: determining an address that issued the first request; and determining the first origination based on the address.
- Current International Class:
04; 04; 04
- Accession Number:
edspap.20240430102
No Comments.