Distributed blockchain-type implementations configured to manage tokenized digital assets and improved electronic wallets, and methods of use thereof

ABSTRACT

In some embodiments, the present description provides a computer-based system having a dual-exchange cryptographically-secured platform (DECSP); where the DECSP includes: a first-type cryptographically-secured platform (first-type CSP) and a second-type cryptographically-secured platform (second-type CSP); where the first-type CSP includes a first computing device; where the second-type CSP includes a second computing device; where the first computing device is connected to a blockchain and configured to issue crypto-tokens associated with a non-crypto asset, perform blockchain-based activities, and automatically transmit an instruction associated with the non-crypto asset to a second computing device in response to an issuance of the crypto-token by the first computing device; where the second computing device is configured to: receive the instruction associated with the one non-crypto asset from the first computing device and automatically communicate with a non-crypto asset electronic marketplace to execute a transaction associated with the non-crypto asset to obtain a position in the non-crypto asset.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to U.S. Provisional Application62/898,015, filed on Sep. 10, 2019 and entitled “DISTRIBUTEDBLOCKCHAIN-TYPE LEDGER IMPLEMENTATIONS CONFIGURED TO MANAGE TOKENIZEDASSETS,” and U.S. Provisional Application 62/898,017, filed on Sep. 10,2019 and entitled “DIGITAL WALLETS AND METHODS OF USE THEREOF” that areherein incorporated by reference in their entirety.

FIELD OF TECHNOLOGY

The exemplary embodiments relate to distributed blockchain-typeimplementations and electronic valets (eWallets).

SUMMARY OF THE DISCLOSURE

In some embodiments, the present description provides an exemplarycomputer-based system that includes at least the following components: adual-exchange cryptographically-secured platform (DECSP); where theDECSP includes: a first-type cryptographically-secured platform(first-type CSP) and a second-type cryptographically-secured platform(second-type CSP); where the first-type CSP includes at least one firstcomputing device; where the second-type CSP comprises at least onesecond computing device; where the at least one first computing deviceis operationally connected to a blockchain and configured to at least:that is operationally connected to a blockchain and configured to atleast: i) issue at least one digital cryptographical token(crypto-token) associated with at least one non-crypto asset, ii)perform at least one blockchain-based activity with the at least onecrypto-token, iii) automatically cause to cryptographically generate, ona blockchain, at least one first blockchain immutable record of the atleast one blockchain-based activity with the at least one crypto-token,and iv) automatically transmit at least one instruction associated withthe at least one non-crypto asset to the at least one second computingdevice of the second-type CSP in response to an issuance of the at leastone crypto-token by the at least one first computing device of thefirst-type CSP; where the at least one second computing device of thesecond-type CSP is configured to at least: i) receive the at least oneinstruction associated with the at least one non-crypto asset from theat least one first computing device of the first-type CSP and ii)automatically communicate with at least one non-crypto asset electronicmarketplace to execute at least one transaction associated with the atleast one non-crypto asset based on the at least one instruction toobtain at least one position in the at least one non-crypto asset; andwhere the at least one first computing device of the first-type CSP, theat least one second computing device of the second-type CSP, or both,are configured to automatically link: i) the at least oneblockchain-based activity with the at least one crypto-token and 2) theat least one position in the at least one non-crypto asset.

In some embodiments, the present description provides an exemplarycomputer-based method that includes at least: administering adual-exchange cryptographically-secured platform (DECSP); where theDECSP includes: a first-type cryptographically-secured platform(first-type CSP) and a second-type cryptographically-secured platform(second-type CSP); where the first-type CSP includes at least one firstcomputing device; where the second-type CSP comprises at least onesecond computing device; where the at least one first computing deviceis operationally connected to a blockchain and configured to at least:that is operationally connected to a blockchain and configured to atleast: i) issue at least one digital cryptographical token(crypto-token) associated with at least one non-crypto asset, ii)perform at least one blockchain-based activity with the at least onecrypto-token, iii) automatically cause to cryptographically generate, ona blockchain, at least one first blockchain immutable record of the atleast one blockchain-based activity with the at least one crypto-token,and iv) automatically transmit at least one instruction associated withthe at least one non-crypto asset to the at least one second computingdevice of the second-type CSP in response to an issuance of the at leastone crypto-token by the at least one first computing device of thefirst-type CSP; where the at least one second computing device of thesecond-type CSP is configured to at least: i) receive the at least oneinstruction associated with the at least one non-crypto asset from theat least one first computing device of the first-type CSP and ii)automatically communicate with at least one non-crypto asset electronicmarketplace to execute at least one transaction associated with the atleast one non-crypto asset based on the at least one instruction toobtain at least one position in the at least one non-crypto asset; andwhere the at least one first computing device of the first-type CSP, theat least one second computing device of the second-type CSP, or both,are configured to automatically link: i) the at least oneblockchain-based activity with the at least one crypto-token and 2) theat least one position in the at least one non-crypto asset.

In some embodiments, the at least one first computing device of thefirst-type CSP, the at least one second computing device of thesecond-type CSP, or both, include a non-transitory computer memorystoring computer code that, when executed, causes the at least one firstcomputing device of the first-type CSP, the at least one secondcomputing device of the second-type CSP, or both, to automaticallyexecute at least one know-your-customer (KYC) determination.

In some embodiments, the at least one first computing device of thefirst-type CSP is further configured to automatically cause tocryptographically generate, on the blockchain, at least one secondblockchain immutable record of the at least one position in the at leastone non-crypto asset that is cryptographically linked to the at leastone crypto-token.

In some embodiments, the at least one first computing device of thefirst-type CSP is further configured to automatically verify asignature-of-trust of a node via which the at least one first computingdevice receives, from a user device associated with a user, at least onefirst request to perform the at least one blockchain-based activity withthe at least one crypto-token.

In some embodiments, the exemplary computer-based system and theexemplary computer-based method may include and/or utilize at least onedigital wallet (eWallet) including at least one first graphical userinterface configured to allow a user to perform the at least oneblockchain-based activity based on a user instruction related to the atleast one position in the at least one non-crypto asset.

In some embodiments, the at least one first computing device of thefirst-type CSP is further configured to transmit at least one message,via the blockchain, from a first eWallet of a first user to a secondeWallet of a second user.

In some embodiments, the first eWallet includes at least one secondgraphical user interface configured to allow the first user to indicatea maximum number of computational steps to be taken to transmit the atleast one message, via the blockchain, to the second eWallet of thesecond user.

In some embodiments, the at least one first computing device of thefirst-type CSP is further configured to: secretly keep at least oneprivate key of the at least one crypto-token and restrict a user towithdraw the at least one crypto-token to a corresponding value of atleast one pre-determined cryptocurrency, at least one predetermined FIATcurrency, or both.

In some embodiments, the at least one first computing device of thefirst-type CSP is further configured to track a monetary value of the atleast one crypto-token based, at least in part, on a monetary value ofthe at least one position in the at least one non-crypto asset.

In some embodiments, the eWallet further includes at least one secondgraphical user interface configured to display a monetary value of theat least one crypto-token based, at least in part, on a monetary valueof the at least one position in the at least one non-crypto asset.

BRIEF DESCRIPTION OF THE DRAWINGS

At least one embodiment of the disclosure is herein described, by way ofexample only, with reference to the accompanying drawings. With specificreference now to the drawings in detail, the embodiments shown are byway of example and for purposes of illustrative discussion ofembodiments of the disclosure. In this regard, the description takenwith the drawings makes apparent to those skilled in the art howembodiments of the disclosure may be practiced. To facilitateunderstanding, identical reference numerals have been used, wherepossible, to designate identical elements that are common to thefigures. The figures are not drawn to scale and may be simplified forclarity.

FIGS. 1-15 depict various aspects in accordance with at least somenon-limiting embodiments of the present disclosure.

DETAILED DESCRIPTION OF ILLUSTRATIVE EXAMPLES

Embodiments of the present description, briefly summarized above anddiscussed in greater detail below, can be understood by reference to theillustrative embodiments of the description depicted in the appendeddrawings. It is to be noted, however, that the appended drawingsillustrate only typical embodiments and are therefore not to beconsidered limiting of its scope, for the present disclosure may admitto other equally effective embodiments.

Throughout the specification, the following terms take the meaningsexplicitly associated herein, unless the context clearly dictatesotherwise. The phrases “in one embodiment” and “in some embodiments” asused herein do not necessarily refer to the same embodiment(s), thoughit may. Furthermore, the phrases “in another embodiment” and “in someother embodiments” as used herein do not necessarily refer to adifferent embodiment, although it may. Thus, as described below, variousembodiments of the description may be readily combined, withoutdeparting from the scope or spirit of the description. Further, when aparticular feature, structure, or characteristic is described inconnection with an implementation, it is submitted that it is within theknowledge of one skilled in the art to affect such feature, structure,or characteristic in connection with other implementations whether ornot explicitly described herein. It is contemplated that elements andfeatures of one embodiment may be beneficially incorporated in otherembodiments without further recitation.

The term “based on” is not exclusive and allows for being based onadditional factors not described, unless the context clearly dictatesotherwise. In addition, throughout the specification, the meaning of“a,” “an,” and “the” include plural references. The meaning of “in”includes “in” and “on.”

It is understood that at least one aspect/functionality of variousembodiments described herein can be performed in real-time and/ordynamically. As used herein, the term “real-time” is directed to anevent/action that can occur instantaneously or almost instantaneously intime when another event/action has occurred. For example, the “real-timeprocessing,” “real-time computation,” and “real-time execution” allpertain to the performance of a computation during the actual time thatthe related physical process (e.g., a user interacting with anapplication on a mobile device) occurs, in order that results of thecomputation can be used in guiding the physical process.

As used herein, the term “dynamically” means that events and/or actionscan be triggered and/or occur without any human intervention. In someembodiments, events and/or actions in accordance with the presentdescription can be in real-time and/or based on a predeterminedperiodicity of at least one of: nanosecond, several nanoseconds,millisecond, several milliseconds, second, several seconds, minute,several minutes, hourly, several hours, daily, several days, weekly,monthly, etc.

As used herein, the term “runtime” corresponds to any behavior that isdynamically determined during an execution of a software application orat least a portion of software application.

In some embodiments, the inventive specially programmed computingsystems with associated devices are configured to operate in thedistributed network environment, communicating over a suitable datacommunication network (e.g., the Internet, etc.) and utilizing at leastone suitable data communication protocol (e.g., IPX/SPX, X.25, AX.25,AppleTalk™, TCP/IP (e.g., HTTP), etc.). Of note, the embodimentsdescribed herein may, of course, be implemented using any appropriatehardware and/or computing software languages. In this regard, those ofordinary skill in the art are well versed in the type of computerhardware that may be used, the type of computer programming techniquesthat may be used (e.g., object-oriented programming), and the type ofcomputer programming languages that may be used (e.g., C++, Objective-C,Swift, Java, Javascript, etc.). The aforementioned examples are, ofcourse, illustrative and not restrictive.

The material disclosed herein may be implemented in software or firmwareor a combination of them or as instructions stored on a machine-readablemedium, which may be read and executed by one or more processors. Amachine-readable medium may include any medium and/or mechanism forstoring or transmitting information in a form readable by a machine(e.g., a computing device). For example, a machine-readable medium mayinclude read only memory (ROM); random access memory (RAM); magneticdisk storage media; optical storage media; flash memory devices;electrical, optical, acoustical or other forms of propagated signals(e.g., carrier waves, infrared signals, digital signals, etc.), andothers.

In another form, a non-transitory article, such as a non-transitorycomputer readable medium, may be used with any of the examples mentionedabove or other examples except that it does not include a transitorysignal per se. It does include those elements other than a signal per sethat may hold data temporarily in a “transitory” fashion such as RAM andso forth.

As used herein, the terms “computer engine” and “engine” identify atleast one software component and/or a combination of at least onesoftware component and at least one hardware component which aredesigned/programmed/configured to manage/control other software and/orhardware components (such as the libraries, software development kits(SDKs), objects, etc.).

Examples of hardware elements may include processors, microprocessors,circuits, circuit elements (e.g., transistors, resistors, capacitors,inductors, and so forth), integrated circuits, application specificintegrated circuits (ASIC), programmable logic devices (PLD), digitalsignal processors (DSP), field programmable gate array (FPGA), logicgates, registers, semiconductor device, chips, microchips, chip sets,and so forth. In some embodiments, the one or more processors may beimplemented as a Complex Instruction Set Computer (CISC) or ReducedInstruction Set Computer (RISC) processors; x86 instruction setcompatible processors, multi-core, or any other microprocessor orcentral processing unit (CPU). In various implementations, the one ormore processors may be dual-core processor(s), dual-core mobileprocessor(s), and so forth.

Examples of software may include software components, programs,applications, computer programs, application programs, system programs,machine programs, operating system software, middleware, firmware,software modules, routines, subroutines, functions, methods, procedures,software interfaces, application program interfaces (API), instructionsets, computing code, computer code, code segments, computer codesegments, words, values, symbols, or any combination thereof.Determining whether an embodiment is implemented using hardware elementsand/or software elements may vary in accordance with any number offactors, such as desired computational rate, power levels, heattolerances, processing cycle budget, input data rates, output datarates, memory resources, data bus speeds and other design or performanceconstraints.

One or more aspects of at least one embodiment may be implemented byrepresentative instructions stored on a machine-readable medium whichrepresents various logic within the processor, which when read by amachine causes the machine to fabricate logic to perform the techniquesdescribed herein. Such representations, known as “IP cores” may bestored on a tangible, machine readable medium and supplied to variouscustomers or manufacturing facilities to load into the fabricationmachines that make the logic or processor.

As used herein, the term “user” shall have a meaning of at least oneuser.

For example, a typical decentralized ledger may consist of alist/database of immutable, shared, exactly replicated and synchronizeddata portions which are geographically spread across multiple sites,while maintaining integrity, availability and resiliency. Unlike atypical centralized system, there is no central administrator or singlepoint of control.

In some embodiments, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure areconfigured to provide real-time information and reduced errors and costsof infrastructure as compared to a typical centralized system. In someembodiments, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure areconfigured to offer one or more functions of centralized decisionmaking, mutability of contracts, linking crypto markets to value of theregulated, well developed and stable economies, etc.

In some embodiments, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure withassociated devices are configured to affect transactions involvingBitcoins and other cryptocurrencies into one another and also into (orbetween) so-called FIAT money or FIAT currency and vice versa.

In some embodiments, the exemplary asset-tokenized distributedblockchain-type ledger implementations of the present disclosure withassociated devices are configured to operate in geographicallydistributed database form (e.g., a blockchain, Ethereum environment,etc.). In some embodiments, the exemplary inventive asset-tokenizeddistributed blockchain-type ledger implementations of the presentdisclosure with associated devices are configured to ensure theintegrity of data by generating a chain of data blocks linked togetherby cryptographic hashes of the data records in the data blocks. Forexample, a cryptographic hash of at least a portion of data recordswithin a first block, and, in some cases, combined with a portion ofdata records in previous blocks is used to generate the block addressfor a new digital identity block succeeding the first block. As anupdate to the data records stored in the one or more data blocks, a newdata block is generated containing respective updated data records andlinked to a preceding block with an address based upon a cryptographichash of at least a portion of the data records in the preceding block.In other words, the linked blocks form a blockchain that inherentlyincludes a traceable sequence of addresses that can be used to track theupdates to the data records contained therein. The linked blocks (e.g.,the exemplary blockchain) may be distributed among multiple networknodes (e.g., running one or more servers administering the exemplaryblockchain) within a computer network such that each node may maintain acopy of the blockchain. Malicious network nodes attempting to compromisethe integrity of the database must recreate and redistribute theblockchain faster than the honest network nodes, which, in most cases,is computationally infeasible. In other words, data integrity isguaranteed by the virtue of multiple network nodes in a network having acopy of the same blockchain. Typically, a central trust authority istherefore not required to vouch for the integrity of the distributeddatabase hosted by multiple nodes in the network. In some embodiments,the exemplary inventive asset-tokenized distributed blockchain-typeledger implementations of the present disclosure with associated devicesare configured to utilize at least one smart contracts-basedadministrative layer to administer blockchain-type distributed networksof the present disclosure.

In some embodiments, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure mayutilize smart contracts that are computer processes that facilitate,verify and/or enforce negotiation and/or performance of one or moreparticular activities among users/parties. For example, an exemplarysmart contract may be configured to be partially or fully self-executingand/or self-enforcing. In some embodiments, the exemplary inventiveasset-tokenized distributed blockchain-type ledger implementations ofthe present disclosure may utilize smart contract architecture that canbe implemented by replicated asset registries and contract executionusing cryptographic hash chains and Byzantine fault tolerantreplication. For example, each node in a peer-to-peer network orblockchain distributed network may act as a title registry and escrow,thereby executing changes of ownership and implementing sets ofpredetermined rules that govern transactions on the network. Forexample, each node may also check the work of other nodes and in somecases, as noted above, function as miners or validators.

In some embodiments, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure includea combination of hardware and software designed to issue and performexchange transactions with tokens whose value is kept fixed against thatof the real assets (stocks, bonds, futures, commodities, indices,currencies, etc.). In some embodiments, the exemplary inventiveasset-tokenized distributed blockchain-type ledger implementations ofthe present disclosure include one or more dual-exchangecryptographically-secured platforms (“DECSPs”). For example, anexemplary inventive DECSP may include 1) one or more first-typecryptographically-secured platform (“first-type CSP”) that may beconfigured to issue crypto-tokens (digital crypto-tokens), alsoreferenced herein as “tokens”, and/or perform crypto-exchangeoperations, and 2) one or more second-type cryptographically-securedplatform (“second-type CSP”) that may be configured to link the tokenprice with the price of the underlying asset(s) by, for example, withoutlimitation, buying or selling contract(s) for difference at one or moreelectronic marketplaces of non-crypto assets such as, withoutlimitation, electronic trading network (ECN) or over-the-counter, thirdmarket, or other off-exchange electronic trading venue (e.g., NASDAQ,NYSE, closed private trading exchanges, dark pool, etc.). For example,if a user buys an asset-linked token “smartABC” at an exemplaryfirst-type CSP (“Exchange Platform A”), the Exchange Platform Aelectronically informs an exemplary second-type CSP (“Exchange PlatformB”) which would automatically and electronically submit an order, forexample, without limitation, to buy a contract-for-difference (CFD) inthe ABC asset to a computer of one or more of the traditional exchanges.For example, when the user wants to sell the token smartABC, theExchange Platform B would automatically submit another instruction thatwould close the ABC contract's position.

In some embodiments, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure areconfigured to allow the user to acquire the asset-linked tokens (e.g.,smart ABC tokens) in any suitable manner such as, without limitation,using FIAT currencies, electronic money, cryptocurrencies, and/orexchanged for other tokens. In some embodiments, the exemplary inventiveasset-tokenized distributed blockchain-type ledger implementations ofthe present disclosure are configured to generate the asset-linkedtokens of the present disclosure utilizing one or more blockchains suchas, without limitation, Bitshares, Ethereum, etc. In some embodiments,the exemplary inventive asset-tokenized distributed blockchain-typeledger implementations of the present disclosure are configured to onlyallow transactions between verified users who, for example, withoutlimitation, have passed one or more KYC procedures (104) as detailed,for example, in one or more disclosures enclosed below.

In some embodiments, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure areconfigured to allow to peg digital asset prices (prices of theasset-linked tokens) to the underlying asset(s).

FIG. 1 illustrate an illustrative architecture of an exemplary inventiveDECSP of the exemplary asset-tokenized distributed blockchain-typeledger implementation of the present disclosure. For example, accordingto FIG. 1, the exemplary inventive DECSP may include, withoutlimitation, the exemplary Exchange Platform A (101) and the exemplaryExchange Platform B (102). For example, the Exchange Platform A isconfigured/programmed to issue the asset-linked tokens in an exemplarythe blockchain (103) (e.g., Bitshares, Ethereum, etc.) and allows userto perform buy, sell and/or other suitable exchange transactions. Forexample, prices of the asset-linked tokens are pegged to prices ofunderlying real assets provided by the exemplary Exchange Platform B(102). For example, if the market price of an asset ABC is X US dollars(USD), the exemplary Exchange Platform A may issue the asset-linkedtoken (e.g., the exemplary smartABC token) at a price of (X+C) USD,where “C” is a commission/transaction fee. For example, when the userbuys some amount of the smartABC tokens at the Exchange Platform A, theExchange Platform A automatically sends an indication/message to theExchange Platform B to open, for example, a long position in the ABSasset at the same value. For example, when the same user (or anotheruser who may have obtained the smartABC tokens from the original user)sells the smartABC tokens back to the Exchange Platform A, the ExchangePlatform B would automatically close the respective long position in thereal asset ABC.

In the exemplary inventive asset-tokenized distributed blockchain-typeledger implementations of the present disclosure may utilize anexemplary blockchain, as shown in FIG. 2, that may include nodes 201(where each node 201 represents one or more computing devices) thatmanage a blockchain ledger (202).

In some embodiments, one or more computers of the exemplary ExchangePlatform A may manage and optionally store electronic wallets(eWallets), and the token flow between such eWallets. For example, theexemplary Exchange Platform A may be configured to issue theasset-linked tokens for one or more particular asset based, at least inpart, on a current price recorded for the particular asset. In someembodiments, the exemplary Exchange Platform A may be programmed todynamically/automatically adjust a quantity of the issued asset-linkedtokens at an initial issuance step (e.g., up to the total number of theunderlying shares of a stock);

In some embodiments, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure areconfigured such that users of the exemplary Exchange Platform A may notaccess to their asset-linked tokens For example, the exemplary ExchangePlatform A may be configured to generate a graphical user interface(e.g., a web interface, specific computer, and/ or mobile-deviceapplication (with the own electronic address)) that shows a number ofowned tokens and allow the user an ability to sell the tokens (all orsome quantity) back to the Exchange Platform A.

In some embodiments, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure areconfigured such that computer(s) of the exemplary Exchange Platform Amay keep (store) all private keys for the user.

FIG. 3 provides an exemplary workflow of interactions between theexemplary Exchange Platform A and the exemplary Exchange Platform B whena user obtains (e.g., buys) (301) the smartABC tokens from the exemplaryExchange Platform A, and disposes (e.g., sells) (302) at least a portionof the same smartABC tokens to the exemplary Exchange Platform A.

Illustrative Examples of Some Inventive Methods of the Blockchain-DrivenIssuance of the Asset-Linked Tokens of the Present Disclosure

For example, in some embodiments, the exemplary inventiveasset-tokenized distributed blockchain-type ledger implementations ofthe present disclosure are configured to issue a limited quantity of theasset-linked tokens. For example, without limitation, the limitedquantity may be defined based at least one of:

i) asset (e.g., all stock issued by a company ABC, car(s), building(s),etc.),ii) asset type (e.g., stock, bond, building, car, etc.),iii) a combination of assets, oriv) any combination thereof.

For example, the asset-let linked tokens may be a limited quantity oftokens that may exist within the realm of an existing coin and/orblockchain (e.g., Ether, Bitcoin, Ripple, etc.). For example, in someembodiments, the exemplary Exchange Platform A may issue theasset-linked tokens of the present disclosure based, at list in part, onan exemplary methodology of the User-Issued Assets of the Bitshares(https://bitshares.org) which are custom tokens registered on theBitshares platform. For example, a user-issuer of such a User-Issuedasset may publicly name, describe, and distributes such tokens, and canspecify customized requirements, such as an approved whitelist ofaccounts permitted to hold the tokens, or the associated trading andtransfer fees. For example, the exemplary Exchange Platform A may beconfigured to utilize, at least in part of its operation, BitShares'software routine(s) (BitShares Blockchain Foundation, Slovenia) such as,without limitation, from Bitshares' github routine library (e.g., seeasset.py) to issue the asset-linked tokens of the present disclosure.

For example, in some embodiments, the exemplary Exchange Platform A mayissue the asset-linked tokens of the present disclosure based, at listin part, on an exemplary methodology of the ERC20 contract of theEthereum blockchain (Solidity). For example, the exemplary ExchangePlatform A, when issuing the asset-linked tokens of the presentdisclosure based, at least in part, on the Ethereum methodology, may beconfigured to store asset(s)'s prices in the Ethereum blockchain. Forexample, the exemplary Exchange Platform A may be configured to, atleast, without limitation, convert data string to a hexadecimal formusing a suitable converter, and then, use the resulted hexadecimalnumber in the data field, for example, in the Solidity code(contract-oriented programming language for writing smart contracts) bystarting the string with “0x”. An illustrative, non-limiting example ofsuch string is 0x537461636b45786368616e6765.

For example, in some embodiments, the exemplary inventiveasset-tokenized distributed blockchain-type ledger implementation of thepresent disclosure utilizing an exemplary Ethereum-based blockchain, theexemplary Exchange Platform A may be configured to store transactions assigned data packages of messages to be sent from one account to anotheraccount on the blockchain. For example, an illustrative transaction maycontain identification of a recipient of the message; a signatureidentifying the sender (proving the intention to send the message viathe blockchain to the recipient); a “VALUE” field (e.g., identifying anamount of wei to transfer from the sender to the recipient (e.g.,10{circumflex over ( )}18 Wei=1 Ether); a data field (which can containthe message sent to a smart contract); a startGAS value (whichrepresents a maximum number of computational steps the transactionexecution is allowed to take (metering unit of Ethereum Virtual Machine(EVM) or the World Computer; and a GASprice value (which represents thefee the sender is willing to pay for gas (for example, one unit of gasmay corresponds to the execution of one atomic instruction (acomputational step) (e.g., for example, a multiplication (MUL) consumes5 gas and an addition (ADD) consumes 3 gas).

An Illustrative, Non-Limiting Asset-Tokenized DistributedBlockchain-Type Ledger Implementation #1 of the Present Disclosure

For example, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementation #1 of the present disclosure maybe in the form of a centralized exchange without asset-linked tokenswithdrawal capability on the part of users/clients. For example, when aclient deposits USD or BTC amounts, these funds are transferred to thepossession of the exemplary Exchange Platform A and managed as recordsin the ledger of the present disclosure. For example, when a userpurchases a asset (e.g., a quantity of shares in a company ABC), theexemplary Exchange Platform A issues new smartABC token(s) and makes anew record in the blockchain/ledger database. For example, the smartABCtoken(s) is/are visible on the blockchain, but private keys remain inthe possession of the exchange, so the client/user cannot withdraw theirsmartABC token(s). In this type of implementation, withdrawal may beavailable only for FIAT and classical cryptocurrencies (e.g., USD, EUR,BTC, ETH, etc.).

An Illustrative, Non-Limiting Asset-Tokenized DistributedBlockchain-Type Ledger Implementation #2 of the Present Disclosure

For example, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementation #2 of the present disclosure maybe in the form of a centralized exchange allowing an asset withdrawalcapability to users/clients. At least some embodiments of theimplementation #2 of the present disclosure may be configured to conductanti-money laundering procedure(s) and offer their clients an option todirectly trade and/or exchange their assets via, for example, withoutlimitation, trading and/or exchanging their respective asset-linkedtoken(s) (e.g., trading smartABC token(s) for smartDEF token(s),corresponding to trading at least portion of the corresponding ABC assetfor at least portion of the DEF asset).

An Illustrative, Non-Limiting Asset-Tokenized DistributedBlockchain-Type Ledger Implementation #3 of the Present Disclosure

For example, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementation #3 of the present disclosure maybe in the form of a centralized exchange allowing an asset withdrawalcapability to users/clients and storing/posting a price feed (a digitalorder book of asset prices) in the ledger/blockchain of the presentdisclosure.

An Illustrative, Non-Limiting Asset-Tokenized DistributedBlockchain-Type Ledger Implementation #4 of the Present Disclosure

For example, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementation #4 of the present disclosure maybe in the form of a combination of a hybrid exchange (e.g., adecentralized storage of tokenized assets and the centralized orderbook). For example, some embodiments of the implementation #4 of thepresent disclosure may be configured in accordance with one or moreimplementations detailed herein. For example, he exemplary inventiveasset-tokenized distributed blockchain-type ledger implementation #4 ofthe present disclosure may be configured to allow the order executiononly when users are online and the tokenized assets of the presentdisclosure may be stored on the users' side.

An Illustrative, Non-Limiting Asset-Tokenized DistributedBlockchain-Type Ledger Implementation #5 of the Present Disclosure

For example, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementation #5 of the present disclosure maybe in the form of a combination of a distributed blockchain-typeledger/blockchain for storing the tokenized assets and a distributedblockchain-type ledger/blockchain for transactions (the decentralizedexecution).

At least some embodiments of at least one of the illustrativeimplementations #1 to #5 T may be configured to implement a mandatoryKYC procedure.

At least some embodiments of at least one of the illustrativeimplementations #1 to #5 T may be configured so that tokenized assetsissued by the exemplary Exchange Platform A are tokens on the exemplaryblockchain of the present disclosure.

At least some embodiments of at least one of the illustrativeimplementations #1 to #5 T may be configured so that tokenized assetdeposits are stored in the decentralized blockchain-typeledger/blockchain.

At least some embodiments of at least one of the illustrativeimplementations #1 to #5 T may be configured so that regularcryptocurrency deposits (e.g., BTC, ETH) are stored in the decentralizedblockchain-type ledger/blockchain.

At least some embodiments of at least one of the illustrativeimplementations #1 to #5 T may be configured to allow Possibility todeposit/withdraw cryptocurrencies.

At least some embodiments of at least one of the illustrativeimplementations #1 to #5 T may be configured so that orders are executedin the decentralized manner (i.e., various trading venues).

At least some embodiments of at least one of the illustrativeimplementations #1 to #5 T may be configured so that the price feed(order book) is stored in the decentralized blockchain-typeledger/blockchain.

At least some embodiments of at least one of the illustrativeimplementations #1 to #5 T may be configured to invoke an open API toobtain real life market date on assets.

An Illustrative, Non-Limiting Example of Transactions Related toTokenized Asset of the Present Disclosure

The illustrative example is based on at least the following assumptions:

i) a tokenized ABC asset,ii) the smartABC token already exists and is stored in the memoryaddress of the exemplary Exchange Platform A,iii) a user has passed a verification procedure (e.g., KYC procedure).iv) the user has opened an account with the exemplary Exchange PlatformA in either FIAT currency (USD) or cryptocurrency (BTC) (e.g., the userdeposited 500$ to their account), andiv) a transaction fee is 1%.

The exemplary inventive asset-tokenized distributed blockchain-typeledger implementation of the present disclosure may be configured sothat one or more of the following activities can take place to executetransactions:

1) after the user logs in, a software platform of the exemplaryimplementation may display a list of available asset-linked tokens forbuying and their prices (the exemplary Exchange Platform A receivesprices directly from the Exchange Platform B and the price of thesmartABC token is equal to the price of ABC asset);2) the software platform of the exemplary implementation may beprogrammed to receive an indication that the user wants (e.g., the userclicks on “buy” button) to buy the smartABC token at the price of $200(the same as the price of ABC asset at the Exchange Platform B);3) the software platform of the exemplary implementation may beprogrammed to display one or more options for buying and the quantity(e.g., the user selects to buy 1 smartABC token);4) the software platform of the exemplary implementation may beprogrammed to calculate price for the purchase ($200×1=$200);5) the software platform of the exemplary implementation may beprogrammed to calculate the transaction fee (purchaseprice×1%=$200×0.01=$2);6) the software platform of the exemplary implementation may beprogrammed to calculate the final price that the user should pay (e.g.,purchase price+fee=$200+$2=$202);7) the software platform of the exemplary implementation may beprogrammed to display final price and its constituents (e.g., calculatedprice and fee);8) the software platform of the exemplary implementation may beprogrammed to receive the user acceptance of the buy transaction; and9) the software platform of the exemplary implementation may beprogrammed to perform one or more of the following activities to executethe and record transaction in the exemplary distributed leger/blockchainof the present disclosure and cause to adjust the state of the user'seWallet accordingly:a) withdrawing funds from USD account (the remaining balance is$500−$202=$298),b) transferring 1 smartABC token from, for example, when ABC assets is agroup of shares, a corporate's memory address to the created customeraddress;c) creating a record in the blockchain containing the fact oftransferring the ABC asset and its price for the current timestamp; andd) initiating, by the exemplary Exchange Platform B, a suitable tradingorder for achieve a particular position in the ABC asset.Table 1 provides an exemplary implementation of a smart contractstructured to effectuate storing and posting the price information tothe exemplary blockchain of the present disclosure.

TABLE 1 function transfer2(address _to, uint256 _value, string _price)returns (bool success) { //Default assumes totalSupply can't be over max(2{circumflex over ( )}256 − 1). //If your token leaves out totalSupplyand can issue more tokens as time goes on, you need to check if itdoesn't wrap. //Replace the if with this one instead. //if(balances[msg.sender] >= _value && balances[_to] + _value >balances[_to]) { if (balances[msg.sender] >= _value && _value > 0) {balances[msg.sender] −= _value; balances[_to] += _value;Transfer(msg.sender, _to, _value); Price(msg.sender, _to, _price); return true;  } else { return false; } }

FIG. 4 provides an illustrative flowchart of the exemplary ExchangePlatform A in accordance with at least one embodiment of the presentdisclosure.

FIG. 5 provides an illustrative architecture (hardware-software) andillustrative data flows of an exemplary implementation in accordancewith at least one embodiment of the present disclosure. For example, thedeposit of digital currency by the user to the Exchange Platform A(buying a token) is shown by the data flows 1 and 2 in FIG. 5 (see alsoFIG. 6). The withdrawal process is illustrated by the data flow 3. Theuser is provided a memory address of his/her eWallet application (3.1)and the exemplary Exchange Platform A obtains from the user such address(3.2) (e.g., via scanning QR code, inserting a number, or manually entryby the user). In some embodiments, the exemplary Exchange Platform Acommunicates the proposed transaction through the Proxy and BlockchainAPI units to the exemplary blockchain (3.3-3.7). In some embodiments,the exemplary Blockchain API returns a response (3.8) on the status ofthe transaction (e.g., pending, confirmed, or failed). For example, whenthe transaction status becomes successful, the Proxy unit may beconfigured to send a confirmation (3.9) to the exemplary ExchangePlatform A application.

In some embodiments, the exemplary Proxy unit may be operationallyconnected to the exemplary Database #1 where the data related to theuser's interaction with the exemplary Exchange Platform A is stored(e.g., information about user's account(s) and activity (e.g.,transactions, addressed, balances)).

In some embodiments, the exemplary Blockchain API may be operationallyconnected to (e.g., programmed to query) the exemplary Database #2 wherethe blockchain related information is stored: eWallets, addresses,transactions, etc. For example, the exemplary Blockchain API unit(hardware and/or software), without limitation, is configured to atleast perform operations with eWallets and digital currency addressessuch as, without limitation, obtaining new addresses for depositingdigital currencies by users, initializing transactions, providingcurrency flows between “hot” and “cold” eWallets (for example, the hoteWallets may belong to the exemplary implementation of the presentdisclosure, although they may be “logically” structured as being signedto users; the cold eWallets may physically belong to users, (e.g.,separate devices (e.g., USB, smart phone) and/or software).

In some embodiments, the exemplary Proxy unit is in the form of a hub(hardware and/or software) which, for example, without limitation, isconfigured to at least maintain users' accounts, control the balance andstatus information, etc.

FIG. 6 provides an illustrative flowchart of an exemplary digital assetdeposit procedure in accordance with at least one embodiment of thepresent disclosure. For example, when a user wants to deposit digitalcurrency (e.g., buy tokens), the exemplary implementation of the presentdisclosure may be configured to provide the list of available digitalcurrencies (e.g., users open the application and request the list). Forexample, the exemplary implementation of the present disclosure may beconfigured to send a request to the exemplary Proxy unit, whichretrieves the list from the Database (e.g., FIG. 5) and sends the listback to the application interface. For example, the exemplaryimplementation of the present disclosure may be configured to display,vial one or more specifically programmed GUI(s), the list of availabledigital currencies to the user. When the exemplary implementation of thepresent disclosure receives the user's selection of desirable digitalcurrency, the Proxy unit may request address to which the selecteddigital assets will be deposited provided by the exemplary BlockchainAPI. For example, the exemplary Blockchain API may permanently link theuser's digital presence with the generated address which may be alsoused for the next funding. For example, in some embodiments, if the userrequests a new address (e.g., the user wishes to buy a token having zerobalance of that token), the new one will be generated. For example, theexemplary Blockchain API may be configured to send the memory address tothe exemplary implementation of the present disclosure allowing the userto initiate the transfer. For example, the exemplary implementation ofthe present disclosure may be programmed to notify the user when thetransaction is added to the block of the exemplary blockchain/ledger.For example, upon receiving a request from the user, the exemplary Proxyunit may be configured to request the transaction's status from theexemplary Blockchain API (e.g., the exemplary blockchain of the presentdisclosure may be configured to monitor all corporate addresses andaddresses assigned to users). For example, the exemplary implementationof the present disclosure may be further programmed to update the user'sbalance and notify the user about the successful funding.

In some embodiments, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure may beconfigured to filter transactions based on transaction value and type ofgoods prior to acceptance rules. In some embodiments, the exemplaryinventive asset-tokenized distributed blockchain-type ledgerimplementations of the present disclosure may a) compare and/or rate: 1)signatures-of-trust of the exemplary sub-entity submitted by variousentities of the network-of-trust and/or 2) own signature-of-trust of theexemplary sub-entity with one or more signatures-of-trust of theexemplary sub-entity submitted by other entities, and b) then accept orreject a particular transaction based at least in part on the comparisonand/or rating.

In some embodiments, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure withassociated devices represent technological solutions that, for example,without limitation, reduce volume of data being transacted over theexemplary asset-tokenized distribute ledger/blockchain. In someembodiments, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure withassociated devices represent technological solutions that, for example,without limitation, reduce amount of processing power. For example,given that the number of issued tokens may be rather large (e.g., 10,100, 1000, 2000, or more), the exemplary inventive asset-tokenizeddistributed blockchain-type ledger implementations of the presentdisclosure with associated devices provide safety in storing digitalassets and controlling flows between eWallet of various types (e.g.,cold and hot). For example, the exemplary inventive asset-tokenizeddistributed blockchain-type ledger implementations of the presentdisclosure with associated devices may be configured to allow users tobuy/sell/trade real assets in digitized form combining benefits of bothtypes. For example, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure withassociated devices may be configured to allow users to buy/sell/tradereal assets in jurisdictions where direct transactions with some typesof real assets are not possible.

In some embodiments, the exemplary inventive asset-tokenized distributedblockchain-type ledger implementations of the present disclosure withassociated devices may be configured such that for example, withoutlimitation, the Exchange Platform B may be configured to executeleveraged and non-leveraged trading of real assets based on anelectronic exchange to which the Exchange Platform B may be connected(e.g., a particular exchange may provide only the option withoutleverage), the availability of funds, and/or may be set manually. Forexample, configured to the available option, the exemplary ExchangePlatform B may open a position in the ABC asset through one of theconnected electronic exchanges upon receiving an indication/message fromthe exemplary Exchange Platform A that triggered when a user buys thesmartABC token. For example, at the same time, the exemplary inventiveasset-tokenized distributed blockchain-type ledger implementations ofthe present disclosure with associated devices may be configured to keepsuch operations hidden from the user, as they deal only with tokenssmartABC and the exemplary Exchange Platform A.

Illustrative Examples of Distributed Blockchain-Type LedgerImplementations Configured to Manage Know-Your-Customer (KYC)Certifications and/or Procedures to Prevent Money-Laundering and/orFraudulent Transactions

In some embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure areconfigured to provide real-time information and reduced errors and costsof infrastructure as compared to a typical centralized system. In someembodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure areconfigured to offer one or more functions of centralized decisionmaking, mutability of contracts, linking crypto markets to value of theregulated, well developed and stable economies, etc.

In some embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure withassociated devices are configured to, for example without limitation,prevent money laundering transactions (anti-money laundering (AML)enforcement) and/or fraudulent transactions, such as, withoutlimitation, transactions involving Bitcoins and other cryptocurrenciesinto one another and also into (or between) so-called FIAT money or FIATcurrency and vice versa.

For example, one or more entities (e.g., 201 of FIG. 2) can be managedby one or more financial institutions (e.g., banks) who may havepre-determined KYC procedures based at least in part on AML rules and/ordatabase(s) of suspicious activities, accounts, individuals, andcompanies—KYC-AML procedure(s). In some embodiments, exemplary KYC-AMLprocedure(s) are programmed to enforce compliance with anti-bribery andcorruption regulations, including Title 18, USC 1956, Title 18, USC1957, Title 18, USC 1960, Bank Secrecy Act, Anti-Money Laundering Act,Counter Terrorist Financing Act, Know Your Customer Act, The PatriotAct, Foreign Corrupt Practices Act (FCPA), Customer Information Program(CIP), similar laws/regulations and the like.

In some embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure withassociated devices are configured to operate in geographicallydistributed database form (e.g., a blockchain, Ethereum environment,etc.). In some embodiments, the exemplary inventive KYC-tailoreddistributed blockchain-type ledger implementations of the presentdisclosure with associated devices are configured to ensure theintegrity of data by generating a chain of data blocks linked togetherby cryptographic hashes of the data records in the data blocks. Forexample, a cryptographic hash of at least a portion of data recordswithin a first block, and, in some cases, combined with a portion ofdata records in previous blocks is used to generate the block addressfor a new digital identity block succeeding the first block. As anupdate to the data records stored in the one or more data blocks, a newdata block is generated containing respective updated data records andlinked to a preceding block with an address based upon a cryptographichash of at least a portion of the data records in the preceding block.In other words, the linked blocks form a blockchain that inherentlyincludes a traceable sequence of addresses that can be used to track theupdates to the data records contained therein. The linked blocks (e.g.,the exemplary blockchain) may be distributed among multiple networknodes (e.g., running one or more servers administering the exemplaryblockchain) within a computer network such that each node may maintain acopy of the blockchain. Malicious network nodes attempting to compromisethe integrity of the database must recreate and redistribute theblockchain faster than the honest network nodes, which, in most cases,is computationally infeasible. In other words, data integrity isguaranteed by the virtue of multiple network nodes in a network having acopy of the same blockchain. Typically, a central trust authority istherefore not required to vouch for the integrity of the distributeddatabase hosted by multiple nodes in the network.

In some embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure withassociated devices are configured to utilize at least one smartcontracts-based administrative layer to administer blockchain-typedistributed networks of the present disclosure.

In some embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure mayutilize smart contracts that are computer processes that facilitate,verify and/or enforce negotiation and/or performance of one or moreparticular activities among users/parties. For example, an exemplarysmart contract may be configured to be partially or fully self-executingand/or self-enforcing. In some embodiments, the exemplary inventiveKYC-tailored distributed blockchain-type ledger implementations of thepresent disclosure may utilize smart contract architecture that can beimplemented by replicated asset registries and contract execution usingcryptographic hash chains and Byzantine fault tolerant replication. Forexample, each node in a peer-to-peer network or blockchain distributednetwork may act as a title registry and escrow, thereby executingchanges of ownership and implementing sets of predetermined rules thatgovern transactions on the network. For example, each node may alsocheck the work of other nodes and in some cases, as noted above,function as miners or validators.

In some embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure areconfigured to assist, for example, an exemplary entity (e.g., financialinstitution, governmental agency, industry agency, company, etc.) toperform its customer due diligence. In some embodiments, the exemplaryinventive KYC-tailored distributed blockchain-type ledgerimplementations of the present disclosure are configured to allow theexemplary entity, via it controlled computing device, to sign one ormore public keys of each affiliated sub-entity (e.g., customer of afinancial institution, a subscriber of a publisher, etc.) with one ormore entity's own digital signature and, then, add or cause to add thecombined information to an exemplary blockchain.

For example, the exemplary entity either perform their own due diligenceor trust the signatures of other entity(ies). In some embodiments, theexemplary inventive KYC-tailored distributed blockchain-type ledgerimplementations of the present disclosure are configured to utilizenetwork-of-trusted nodes of a plurality of entities (e.g., financialinstitutions) to execute an exemplary KYC-tailored blockchain of thepresent disclosure. For example, in some embodiments, the exemplaryinventive KYC-tailored distributed blockchain-type ledgerimplementations of the present disclosure provide a functionality (e.g.,a smart contract) programmed to allow the exemplary entity to banaffiliated sub-entities (by e.g., a government) and add informationabout the ban to the exemplary KYC-tailored blockchain of the presentdisclosure.

In some embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure withassociated devices are configured to allow the exemplary entity such asa financial institution, to, for example, without limitation, managerisk(s) by making reasonable efforts to determine at least one of:

1) true identity of each affiliated sub-entity (e.g., customer),2) beneficial ownership of account(s),3) source(s) of funds,4) reasonableness of operations, and/or5) the like.

In some embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure withassociated devices are configured to allow entities to follow one ormore KYC guidelines to prevent entities from being used, intentionallyor unintentionally, by affiliated sub-entities for, for example, withoutlimitation, money laundering and/or fraudulent purpose. For example, insome embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure withassociated devices are configured to perform at least one of thefollowing operations: 1) collecting and analyzing identity information(e.g., OCR-recognition identity information from identity documents), 2)name matching against lists of known parties, 3) determination of thecustomer's risk, and etc.

In some embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure withassociated devices are configured such that the exemplary KYC-tailoredblockchain of the present disclosure does not store profiles of theaffiliated sub-entities (e.g., users' identities) and/or broadcastprofiles of the affiliated sub-entities to nodes of the exemplaryKYC-tailored blockchain; but, instead, the exemplary KYC-tailoredblockchain, in its blocks, stores each affiliated sub-entity's“signature-of-trust.” As referenced herein, the term“signature-of-trust,” in its hashed or non-hashed form, includesinformation stored in a KYC-tailored blockchain of the presentdisclosure and identifying at least: 1) at least one entity that hasperformed KYC-type due diligence procedure and 2) information regardingthe approved sub-entity.

In some embodiments, the KYC-information of a particularsignature-of-trust can be based at least in part on one or moresub-entity's identifying characteristics such as, but not limited to:

1) Personal Information:

i) Name,

ii) Home Address (e.g., current address, past address(es)),

iii) Phone Number(s),

iv) Credit Card number(s),

v) Bank Account Number(s),

vi) Date of Birth;

2) Security Information and Identification Trait:

i) Password(s),

ii) Numerical Passcode(s),

iii) Security Question(s),

iv) Fingerprint(s),

v) Swipe Pattern.

In some embodiments, other elements of KYC information may include abrowser fingerprint, a computer fingerprint, an IP address, geographicIP location information, information associated with a payment, and/or atyping pattern. For example, the browser fingerprint may include asub-entity agent, a screen resolution, a software plug-in, a time zone,a system language, whether Java is enabled, whether cookies are enabled,a site visited, or an IP address. In some embodiments, the computerfingerprint may include processor characteristic, a memory size of themachine, a value that is loaded at a key location, a value of a registryof a loaded operating system, an Ethernet MAC address, raw networkinginformation, network information, a loaded program, or a log file. Andthe network information may include a network provider, whether an IPaddress is consistent with a known IP address, geographical proximity ofan address registered with a payment instrument and the IP address asdetermined by an IP to geo-location service, whether or not a proxy isin use, whether a known bad IP address is in use, and whether the IPaddress is associated with a service provider who was associated withthe sub-entity in the prior transaction.

In some embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure withassociated devices are configured such that in addition to sub-entities'signatures of trust, the exemplary KYC-tailored blockchain of thepresent disclosure may store a “network-of-trust”-type information thatidentify, for example, without limitation, a trustworthiness of aparticular entity (e.g., data/statistics indicative of how often theparticular entity has, correctly and/or incorrectly, rated/classified aparticular affiliated sub-entity and/or a plurality of affiliatedsub-entities). For example, the exemplary inventive KYC-tailoreddistributed blockchain-type ledger implementations of the presentdisclosure with associated devices are configured such that at least twosegments of data circulated in the exemplary KYC-tailored blockchain:

1) results of KYC procedure approval of sub-entities by entities (e.g.,a user U is approved by an institution I) and2) the “network-of-trust” of entities (e.g., a user U is ratedpositively by institutions I1, I2, I3, . . . and negatively by J1, J2,J3, . . . ; and/or, an institution I has the misclassification ratio X %for the user U).

In some embodiments, a particular KYC procedure may involve, withoutlimitation, at least one or more verifications of:

1) Email address: unique code is emailed to the user which must beclicked on to validate access,2) Primary address: a pin number is mailed to address which much beentered upon login,3) Bank account/credit card: for example, utilizing a specificallyprogrammed API or another suitable service to: (i) make small deposit(s)to account(s) and/or (ii) withdraw small amount(s) from account(s)—whichmust be entered upon login,4) Driver's License: license number is entered and validated against DMVdatabase,5) Social Security Number: a sub-entity uploads a copy of their socialsecurity number, and6) Date of Birth: a sub-entity uploads a copy of their birthcertificate.

In some embodiments, as it shown in FIG. 2, the exemplary inventiveentity-controlled distributed blockchain-type ledger implementation ofthe present disclosure 200 may include entity nodes 201 (where each node201 represents one or more computing devices associated with aparticular entity) that manage the exemplary inventive KYC-tailoreddistribute ledger/blockchain 202 which is distributed among the nodes201. For example, a customer (an affiliated sub-entity) provides one ormore identification documents to a first entity 201 (e.g., a bank) by,for example, without limitation invoking an exemplary smart contractprogrammed to open an account with the first entity 201 (e.g., a bank)using the exemplary KYC-tailored distributed ledger/blockchain oranother non-KYC-tailored blockchain. In turn, the first entity 701(e.g., a bank) performs the customer due diligence and, if the providedinformation is accepted, the computing device associated with the firstentity 201 signs (e.g., via one or more hash algorithms) the customer'spublic key with the first entity 201's digital signature and causes thecustomer's signature-of-trust to be added to the exemplary KYC-tailoreddistributed ledger. In turn, other entities of the network-of-trust maydecide to trust the first entity's generated signature-of-trust for theparticular sub-entity or to conduct their own due diligence (e.g.,recommendation purpose). Consequently, the exemplary KYC-tailoreddistributed ledger is based on the established “network-of-trust”between entities.

FIG. 7 illustrates an exemplary inventive KYC-tailored distributedblockchain-type ledger implementation of the present disclosure (700)with associated devices. For simplicity, only onesub-entity/user/customer (sub-entity A) is shown in FIG. 7. A personskilled in the arts would readily recognize that the variousimplementations of the present disclosure are not constrained by anumber of entities and a number of sub-entities. As FIG. 7 illustrates,some implementations of the present disclosure may include one or moreentities that are entitled, by the set-up of the network-of-trust, toban one or more sub-entities from engaging in any transaction and/orinteraction with any entity of the network-of-trust. As FIG. 7illustrates, some implementations of the present disclosure may includeone or more entities that are entitled, by the set-up of thenetwork-of-trust, to ban one or more sub-entities from engaging in anytransaction and/or interaction with one or more particular entities ofthe network-of-trust.

Referring back to FIG. 7, an exemplary inventive KYC-tailored distributeledger/blockchain 702, distributed among the nodes of entities 1, 2- - -N, stores one or more signatures-of-trust for each sub-entity associatedwith at least one entity of the network-of-trust. In some embodiments,varies entities of the network-of-trust may employ the same or differentKYC procedures to obtain the KYC information for thesignatures-of-trust.

In some embodiments, the exemplary inventive entity-controlleddistributed blockchain-type ledger implementation of the presentdisclosure (e.g., 200) may involve, for example, smart contracts andother programmed routines and data objects that are configured toexecute one or more dataflows, rules and/or operations shown in FIG. 8.

In some embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure withassociated devices are configured to function without a centralizeddatabase (i.e., database residing on one or more computing devicesassociated with a single entity).

FIG. 9 provides an exemplary architecture of a computing device (node900) associated with an exemplary entity (e.g., 901). For example, theexemplary computing device (node 900) associated with the exemplaryentity (e.g., 901) may execute a blockchain application (905) to receiveand/or broadcast sub-entities' signatures-of-trust to and/or from theexemplary KYC-tailored distributed ledger/blockchain and execute aKYC-procedure application (906) to at least one of:

1) obtain and/or confirm the KYC information,2) generate its own signatures-of-trust, or3) rate signatures-of-trust of other entity(ies).

Table 2 provides an exemplary code for an exemplary smart contract thatcontains a field identifying an illustrative signature-of-trust andillustrative KYC methods and that can be invoked, for example, withoutlimitation, by the KYC-procedure application (906).

TABLE 2 contract KYC { // KYC status value, compressed to uint8 enumKYCStatus { unknown, // 0: Initial status when nothing has been done forthe address yet cleared, // 1: Address cleared by KYC entity frozen //2: Address frozen by owner or KYC entity } // New KYC entity introducedevent AddedKYCEntity(address addr); // KYC entity updated eventUpdatedKYCEntity(address addr, address indexed by, uint8 rate); // KYCentity set account blocked event AccountFrozen(address addr, addressindexed by); // KYC entity set account status cleared eventAccountCleared(address addr, address indexed by); // KYC status mapmapping(address=>uint8) public addressKYCStatus; AddressSet.DatakycEntities; function addKYCEntity(address addr) public onlyEntity {if(!AddressSet.insert(kycEntities, addr)) { throw; }AddedKYCEntity(addr); }  function getAddressStatus(address addr) publicconstant returns  (uint8) { return uint8(addressKYCStatus[addr]); }function freezeAccount(address addr) public onlyOwnerOrPartner { varstatus = addressKYCStatus[addr]; if(status == uint8(KYCStatus.frozen)) {throw; } addressKYCStatus[addr] = uint8(KYCStatus.frozen);AccountFrozen(addr, msg.sender); } function clearAccount(address addr)public onlyOwnerOrPartner { var status = addressKYCStatus[addr];if(status == uint8(KYCStatus.cleared)) { throw; } addressKYCStatus[addr]= uint8(KYCStatus.cleared); AccountCleared(addr, msg.sender); } modifieronlyEntity( ) { if(!(AddressSet.contains(kycEntities, msg.sender))) {throw; } _; } }

In some embodiments, another example, the computing device(s) associatedwith the entity(ies) (e.g., via the KYC-procedure application 906 ofFIG. 9) may ban or confirm particular sub-entity by analyzingtransaction data, automatically rejecting some transactions andassigning some others for manual review while others for additionalautomatic review, according to a set of rules, automatically acceptingsome of the reviewed transactions also according to rules. For example,the review rules may accept transactions for the following reasons:Transaction uses prepaid cards and the bank has authorized thetransaction; there is a history of the card being used with the consumeraccount, and there is no history of chargebacks or refunds; the addressassociated with the consumer's phone number matches the billing addressassociated with the payment and the consumer responds affirmatively toan automated phone call; the shipping address matches the addressassociated with the consumer's phone number; there is a positive,non-fraud, match between the physical contact information provided inthe transaction and a third-party service; and there is a positive,non-fraud, match between the email contact information provided and thephysical contact information for the transaction in a third-partyservice.

In some embodiments, additional items may include but are not limited tosuch as a low transaction value, an in-depth KYC analysis has previouslybeen performed on the sub-entity, an element of the transaction is on awhitelist, the transaction is a subscription renewal for a transactionthat was previously non-fraudulent, a similar transaction, with the samesuspicious characteristics, was previously manually reviewed andaccepted by a human reviewer.

In some embodiments, another example, the computing device(s) associatedwith the entity(ies) (e.g., via the KYC-procedure application 906 ofFIG. 9) may be programmed to dynamically/automatically execute one ormore KYC-AML procedures and/or invoke one or more routines,dynamically/automatically executing the one or more KYC-AML procedures.Based on the outcome of the execution of the one or more KYC-AMLprocedures, the exemplary node of the entity can generatesignature-of-trust that may indicate that a particular sub-entity is abanned sub-entity (e.g., customer who is suspected in money laundering).For example, the institution's associated node may ban transactionsbased at least in part on, without limitation, an exemplary KYCprocedure that involves user's identity, beneficial ownership ofaccount(s), source of fund(s), past history, online activity(ies),velocity controls on remittance value. etc. For example, an exemplaryKYC compliance assessment may be performed at, prior to or after thetime a payee is associated with a sending account. In embodiments, theexemplary KYC compliance assessment may involve compliance with and/orassessing compliance with federal, state, local, international and otherlaw, rules and/or regulations. In embodiments, the exemplary KYCcompliance assessment may involve reviewing and/or determining volumeand/or velocity. In embodiments, the exemplary KYC compliance assessmentmay involve assessing compliance with volume and/or velocity controls,regulations and the like. For example, volume may include how much moneyis transferred in a transaction. For example, velocity may include howoften money is transferred. In embodiments, the exemplary KYC-AML and/orKYC-anti-fraud compliance assessment may be performed in order tosatisfy at least one of the Financial Crimes Enforcement Network, theOffice of Foreign Assets Control, a Treasury department or governmentbranch, a labor department or government branch, a justice department ofgovernment branch, a federal trade commission and the like. Inembodiments, the exemplary KYC-AML and/or KYC-anti-fraud complianceassessment may be performed in order to assess compliance with at leastone of AML acts and/or regulations. In some embodiments, for example, ata set interval (such as at least once per day), the computing device(s)associated with the one or more entity(ies) (e.g., via the KYC-procedureapplication 906 of FIG. 9) may interface with, for example, the USFinancial Crimes Enforcement Network (FinCEN) database and/or similarelectronic sources to download the current list of persons that wouldtrigger a suspicious activity report.

In some embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure may beconfigured to filter transactions based on transaction value and type ofgoods prior to acceptance rules. In some embodiments, the exemplaryinventive KYC-tailored distributed blockchain-type ledgerimplementations of the present disclosure may a) compare and/or rate: 1)signatures-of-trust of the exemplary sub-entity submitted by variousentities of the network-of-trust and/or 2) own signature-of-trust of theexemplary sub-entity with one or more signatures-of-trust of theexemplary sub-entity submitted by other entities, and b) then accept orreject a particular transaction based at least in part on the comparisonand/or rating.

In some embodiments, additional items may include but are not limited tosuch as a low transaction value, an in-depth KYC analysis has previouslybeen performed on the user, an element of the transaction is on awhitelist, the transaction is a subscription renewal for a transactionthat was previously non-fraudulent, a similar transaction, with the samesuspicious characteristics, was previously manually reviewed andaccepted by a human reviewer.

In some embodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure withassociated devices represent technological solutions that, for example,without limitation, reduce volume of data being transacted over theexemplary KYC-tailored distribute ledger/blockchain. In someembodiments, the exemplary inventive KYC-tailored distributedblockchain-type ledger implementations of the present disclosure withassociated devices represent technological solutions that, for example,without limitation, reduce amount of processing power that, for example,computing devices of associated entities would otherwise need to use toadminister their own KYC procedures.

Illustrative Examples of Computer Systems Implementing Blockchain-BasedHybrid Digital Instrument Exchanges and Methods of use Thereof

In the exemplary embodiments, settlement of trades is decentralized,while the order book is centralized, i.e. controlled by the electronicexchange. In some embodiments of a hybrid exchange, the procedure oftrades includes the following steps. The customers allocate amounts(deposits) for trading purposes. These deposits are blocked until allthe parties sign electronically their agreement to use them. Forexample, a user A wishes to sell coins X to a user B for coins Y. In thehybrid exchange approach, the desired amount of coins X is blocked, theexchange sets the price at which the trade will be executed, all parties(users A, B and exchange) sign electronically their agreement to executethe trade, then the trade is executed. More complicated schemes mayinvolve more participants.

FIG. 10 shows the architecture of an exemplary inventive hybrid digitalcurrency exchange 1000. In some embodiments, the users 1001 communicateto each other by means of a peer-to-peer network, set and performtransactions. In some embodiments, a digital currency exchange system1002 controls the order book and communicates with the users 1001 inorder to perform transactions (e.g., trades).

FIG. 11 shows an exemplary method 1100 by which transactions may beprocessed by the exemplary hybrid digital currency exchange 1000. Instep 1101, one of the users 1101 requests a transaction. In step 1102,the transaction request is broadcasted to the peer-to-peer network. Instep 1103, the peer-to-peer network validates the transaction and theuser's status. In step 1104, the transaction is verified by thepeer-to-peer network; in some embodiments, the transaction involvescryptocurrency, fiat currency, a contract, or other information. In step1105, after having been verified, the transaction is combined with othertransactions to create a new block of data for the ledger. In step 1106,the new block of data is added to the existing blockchain. In step 1107,the transaction and the method 1100 are complete.

FIG. 12 shows an exemplary process 1200 from the point of view of theexemplary hybrid digital currency exchange 1202. As shown in FIG. 12,the user A, 1201, wants to perform a transaction for digital currencypair X/Y (i.e., wants to buy coin X), and the user B, 1203, does thesame for the digital currency Y/X (i.e., wants to sell coin X). Thedigital currency exchange system 1202 blocks amounts allocated by bothusers, matches users to each other, and sets the price (e.g., the systemsets the order book by matching all available users). Then, all theparties (i.e., the user A, user B, and exchange system 1202) sign theagreement to perform a transaction and the transaction is completed viathe peer-to-peer network.

FIG. 13 shows an exemplary implementation scheme 1300 of the exemplaryhybrid digital currency exchange 1302. In some embodiments, theexemplary hybrid digital currency exchange 1302 includes a centralizedportion 1310 and a decentralized portion 1320. In some embodiments, thecentralized portion 1310 includes a matching engine 1312, the operationof which will be described hereinafter. In some embodiments, thematching engine 1312 may be configured to process limit orders. In someembodiments, the matching engine 1312 may be configured to processmarket orders. In some embodiments, the centralized portion 1310includes an order book 1314 including records of orders processed by theexemplary hybrid digital currency exchange 1302. In some embodiments,the centralized portion 1310 includes a private key 1316. In someembodiments, the decentralized portion 1320 includes a blockchain 1322.In some embodiments, the user A, 1301, has a private key 1330 and awallet 1332 storing, for example, but not limited to, a digitalcurrency. In some embodiments, the user B, 1303, has a private key 1340and a wallet 1342 storing, for example, but not limited to, a digitalcurrency. In some embodiments, the user A sends an order 1334 to thehybrid digital currency exchange 1302 and the user B sends an order 1344to the hybrid digital currency exchange 1302 to initiate a transaction.

FIG. 14 shows an exemplary scheme 1400 of an order matching book thatthe matching engine 1312 is configured to administer to match limitorders.

FIG. 15 shows an exemplary scheme 1500 of the matching engine 1312 asconfigured to process market orders. In step 1510, a FIFO (first-infirst-out) algorithm allocates a percentage (for example, withoutlimitation, which may be all) of an arriving order to time-prioritizedresting orders. In step 1520, a pro-rata algorithm allocates apercentage (which may be all) of arriving orders toquantity-prioritized/time-prioritized resting orders using a pro-ratedformula. In step 1530, the FIFO algorithm is used to allocate anyresidual quantity of an arriving order.

In various embodiments, the above-described matching algorithm may beimplemented in many different ways. In some embodiments, two majorfeatures of the algorithm are (1) split percentage allocations and (2)pro rata leveling allocation. In various embodiments, a certainpercentage of each matching order gets allocated first-in-first-out(FIFO) and the remainder is allocated pro rata, with additional rulesdue to rounding after the pro rata allocation. In some embodiments, thepercentage of matching orders that is allocated by FIFO is between 5%and 15%, or between 15% and 25%, or between 25% and 35%, or between 35%and 45%, or between 45% and 55%, or between 55% and 65%, or between 65%and 75%, or between 75% and 85%, or between 5% and 50%, or between 25%and 75%, or between 0% and 20%, or between 20% and 40%, or between 40%and 60%, or between 60% and 80%, or between 80% and 100%, or between 0%and 40%, or between 20% and 60%, or between 40% and 80%, or between 60%and 100%. One such rule is the pro rata leveling allocation, which canbe viewed as a sub-allocation within the algorithm. In some embodiments,after the pro rata allocation, any orders that did not receive a prorata fill are eligible for a one lot fill, with priority based on sizeand/or time in the case of multiple eligible orders for the same size.

The following example shows a soybean futures order matching process. Inthe example, an order book is as follows:

-   -   Order Book    -   Soybeans (ZS)    -   (Top Priority) Sell 10 Limit @ 1009.6    -   Sell 55 Limit @ 1009.6    -   Sell 10 Limit @ 1009.6    -   Sell 65 Limit @ 1009.6    -   Sell 85 Limit @ 1009.6    -   Total: 225 Contracts Offered    -   Incoming Buy 30 Limit @ 1009.6.

In this example, the contract has a Top Order allocation of 100% up to100 contracts. Consequently, the Top Order of 10 contracts is filledcompletely, and 20 contracts (i.e., the 30 contracts in the incomingbuy, less the Top Order of 10) remain to be matched. The 40% FIFO passbegins with 20 contracts remaining to be matched, and as a result 8contracts (i.e., 40% of 20) are matched to the top FIFO order remaining(i.e., the Sell 55 Limit @ 1009.6 offer), reducing its size on the orderbook to 47. The Pro Rata phase of the order match has 12 contractsremaining to be allocated (i.e., the 20 contracts remaining after theTop Order phase, less 8 contracts allocated in the FIFO pass) and 207contracts offered (i.e., the original total of 225 contracts offered,less the 18 contracts that were matched in the first two phases). Due torounding down, 9 contracts are filled Pro Rata (i.e., 4 contractsmatched to the Sell 85 offer based on 85/207*12=4.93, rounded down to 4;3 contracts matched to the Sell 65 offer based on 65/207*12=3.77,rounded down to 3; 2 contracts matched to the Sell 47 offer, originallythe Sell 55 offer, based on 47/207*12=2.72, rounded down to 2), and theresting order for 10 contracts receives a 1 lot Leveling fill since itdid not participate in (i.e., have any contracts filled during) the ProRata phase. The final 2 contracts are then allocated on a FIFO basis(i.e., to the offer that was originally the Sell 55 offer). This exampleillustrates how the combined algorithm offers opportunities for restingorders to be matched both on a size and speed basis, as well as theopportunity for passive fills in the leveling stage that marketparticipants may be overlooking. In various embodiments, other matchingalgorithms (e.g., FIFO, Lead Market Maker, Pro Rata, etc.) or acombination thereof may also be used.

Table 3 shows sample code implementing an exemplary smart contract thatmay be executed by the exemplary hybrid digital currency exchange 1000.It will be apparent to those of skill in the art that the sample codeprovided in Table 3 contains definitions of variables, classes,functions, etc., rather than a full working implementation.

TABLE 3 # Smart Contract describing the collection of data elementsnecessary for UserA, UserB and Exchange. contract Trade is mortal{mapping (address=>UserA) public UsersA mapping (address=>UserB) publicUsersB mapping (address=>Exchange) public Exchanges struct User A { boolUserAActive; uint UserALastUpdate; string UserAName; stringUserAAddress; address UserAAccount1; address UserAAccount2; } structUserB { bool UserBActive; uint UserBLastUpdate; string UserBName; stringUserBAddress; address UserBAccount1; address UserBAccount2; } structExchange { bool ExchangeActive; uint ExchangeLastUpdate; addressExchangeAddress; string ExchangeName; } struct Transaction { stringUserA; string UserB; string Exchange; uint32 AmountA; uint32 AmountB;uint32 Rate; string ReferenceMessage; bool UserAAgrees; boolUserBAgrees; bool ExchangeAgrees; } function SetUserA (string_UserAname, string _UserAaddress, address _UserAaccount1, address_UserAaccount2 ) { UserAName = _UserAname ; UserAAddress =_UserAaddress; UserAAccount1 = _UserAaccount1; UserAAccount2 =_UserAAccount2; } function SetUserB (string _UserBname, string_UserBaddress, address _UserBaccount1, address _UserBaccount2 ) {UserBName = _UserBname; UserBAddress = _UserBAddress; UserBAccount1 =_UserBaccount1; UserBAccount12= _UserBaccount2; } function SetAmounts(uint32 _amountA, uint32 _amountB){ AmountA = _amountA; AmountB =_amountB; } function SetRate (uint32 _rate){ Rate = _rate; } } contractmortal{ address public owner; function mortal( ) { owner = msg.sender; }modifier onlyOwner { if (msg.sender != owner) { throw; } else { - } }function kill( ) onlyOwner{ suicide(owner); } }

In some embodiments, the exemplary hybrid digital currency exchange 1302provides a high level of security. In some embodiments, the exemplaryhybrid digital currency exchange is difficult to hack. In someembodiments, the exemplary hybrid digital currency exchange is difficultto hack as compared to a standard exchange because all transactions areperformed in a distributed network and all funds are stored in adistributed manner (e.g., each participant owns its own funds). In someembodiments, the exemplary hybrid digital currency exchange requiresdecreased hardware resources as compared to a standard exchange becausefewer servers are required as transactions take place in the blockchain.

In some embodiments, once two of the users have agreed to and triggereda smart contract, execution of the smart contract may occurautomatically. In some embodiments, execution of the smart contract maybe triggered upon payment of some amount of a cryptocurrency. In someembodiments, a party who sells cryptocurrency triggers execution of asmart contract. In some embodiments, an exchange triggers execution of asmart contract by paying for the execution. In either of the two casesnoted above, paying cryptocurrency means triggering the smart contract.

In some embodiments, the exemplary hybrid digital currency exchange 1302generates a smart contract that resides on the blockchain. In someembodiments, the exemplary smart contract then interacts with all threeparties (e.g., the two users involved in the smart contract and theexchange) to execute the contract. In some embodiments, a smart contractrelates to real estate. In some embodiments, a smart contract relates toa computer program with any content executed in the blockchain. In someembodiments, the exemplary hybrid digital currency exchange 1302 maygenerate a smart contract in the following way. A first user A payscryptocurrency for some asset provided by a second user B at a price setby an exchange C (e.g., by matching orders of the first user A and thesecond user B). The contract is executed when all conditions are met:the amounts of funds provided by both users are sufficient, the price iscorrect (i.e. those signed by all parties), etc. If, following theprovided example, the exchange is hacked and the price is modified, thefirst user A will be refunded with their cryptocurrency and the seconduser B's asset (e.g., fiat currency) will be unblocked and returned totheir own electronic (or some other) account. In some embodiments,parties' identities are not disclosed one another, and only the digitalsignatures of the parties and the exchanges are involved.

Illustrative Examples Improved Digital Wallets and Methods of UsedThereof

As used herein, the terms “digital wallet,” “mobile wallets,” and“electronic wallet” (collectively, “eWallet”) refers to an electronicdevice (e.g., a computing device, memory storage device, a memorystorage computing device, etc.), an electronic service software, or acombination of the hardware and service/software that facilitate anentity (e.g., individual, company) to make electronic transactions(e.g., purchasing items on-line with a computer, using a smartphone topurchase something at a store, etc.). For example, an entity's bankaccount can also be linked to the eWallet. For example, eWallet may alsostore user's driver's license, health card, loyalty card(s), and/orother ID documents. For example, the exemplary eWallet may be configuredto causes the entity's credentials to pass to a merchant's terminalwirelessly via, for example, without limitation, near fieldcommunication (NFC). For example, the exemplary eWallet may beconfigured to also authenticate the holder's credentials. For example,the exemplary eWallet could verify the age of the buyer to the storewhile purchasing alcohol. For example, he exemplary eWallet could storeprivate keys for cryptocurrencies (e.g., Bitcoin, Ether, Ripple, etc.).

In some embodiments, the exemplary eWallets of the present disclosurewith associated devices are configured to affect transactions involvingcryptocurrencies into one another and also into (or between) so-calledFIAT money or FIAT currency and vice versa.

In some embodiments, the exemplary inventive eWallets of the presentdisclosure with associated devices are configured to operate withinexemplary distributed blockchain-type ledger implementations of thepresent disclosure which may be configured to operate in geographicallydistributed database form (e.g., a blockchain, Ethereum environment,etc.). In some embodiments, the exemplary inventive eWallets of thepresent disclosure with associated devices are configured to ensure theintegrity of data by cryptographic hashing the data records in the datablocks. For example, a cryptographic hash of at least a portion of datarecords within a first block, and, in some cases, combined with aportion of data records in previous blocks is used to generate the blockaddress for a new digital identity block succeeding the first block. Asan update to the data records stored in the one or more data blocks, anew data block is generated containing respective updated data recordsand linked to a preceding block with an address based upon acryptographic hash of at least a portion of the data records in thepreceding block. In other words, the linked blocks form a blockchainthat inherently includes a traceable sequence of addresses that can beused to track the updates to the data records contained therein. Thelinked blocks (e.g., the exemplary blockchain) may be distributed amongmultiple network nodes (e.g., running one or more servers administeringthe exemplary blockchain) within a computer network such that each nodemay maintain a copy of the blockchain. Malicious network nodesattempting to compromise the integrity of the database must recreate andredistribute the blockchain faster than the honest network nodes, which,in most cases, is computationally infeasible. In other words, dataintegrity is guaranteed by the virtue of multiple network nodes in anetwork having a copy of the same blockchain. Typically, a central trustauthority is therefore not required to vouch for the integrity of thedistributed database hosted by multiple nodes in the network. In someembodiments, the exemplary inventive eWallets of the present disclosurewith associated devices are configured to incorporate and/or interactwith at least one smart contracts-based administrative layer that mayinclude one or more smart contracts that are computer processes thatfacilitate, verify and/or enforce negotiation and/or performance of oneor more particular activities among entities (e.g., users/parties). Forexample, an exemplary smart contract may be configured to be partiallyor fully self-executing and/or self-enforcing. In some embodiments, theexemplary inventive asset-tokenized distributed blockchain-type ledgerimplementations of the present disclosure may utilize smart contractarchitecture that can be implemented by replicated asset registries andcontract execution using cryptographic hash chains and Byzantine faulttolerant replication. For example, each node in a peer-to-peer networkor blockchain distributed network may act as a title registry andescrow, thereby executing changes of ownership and implementing sets ofpredetermined rules that govern transactions on the network. Forexample, each node may also check the work of other nodes and in somecases, as noted above, function as miners or validators.

In some embodiments, the exemplary inventive eWallets of the presentdisclosure with associated devices are designed to issue and/or performexchange transactions with tokens whose value is kept fixed against thatof the real assets (stocks, bonds, futures, commodities, indices,currencies, etc.). In some embodiments, the exemplary inventive eWalletsof the present disclosure with associated devices are configured toparticipate in transactions one or more DECSPs.

In some embodiments, the exemplary inventive eWallets of the presentdisclosure with associated devices may operate within an exemplaryblockchain, as shown in FIG. 2, that may include nodes 201 (where eachnode 201 represents one or more computing devices) that manage ablockchain ledger (202).

In some embodiments, the exemplary inventive eWallets of the presentdisclosure with associated devices are configured such that users maynot access (e.g., ability to withdraw) their tokens. For example, theexemplary inventive eWallet may be configured to cause to generate agraphical user interface (GUI) (e.g., a web interface, specificcomputer, and/ or mobile-device application (with the own electronicaddress)) that shows a number of owned tokens and allow the user anability to manipulate (e.g., sell) the tokens (all or some quantity)back to a token issuer and/or another designated party.

In some embodiments, the exemplary inventive eWallets of the presentdisclosure with associated devices are configured such that theinventive eWallets keeps all private keys for the user.

In some embodiments, the exemplary inventive eWallets of the presentdisclosure with associated devices may participate in issuance of tokensbased, at list in part, on an exemplary methodology of the User-IssuedAssets of the Bitshares (https://bitshares.org, BitShares BlockchainFoundation, Slovenia) which are custom tokens registered on theBitshares platform. For example, a user-issuer of such a User-Issuedasset may publicly name, describe, and distributes such tokens, and canspecify customized requirements, such as an approved whitelist ofaccounts permitted to hold the tokens, or the associated trading andtransfer fees. For example, in some embodiments, the exemplary inventiveeWallets of the present disclosure with associated devices may beconfigured to utilize, at least in part of their operation, softwareroutine(s) such as, without limitation, from Bitshares' github routinelibrary to issue the asset-linked tokens of the present disclosure.

For example, in some embodiments, the exemplary inventive eWallets ofthe present disclosure with associated devices may participate inissuance of tokens based, at list in part, on software routine(s) suchas exemplary methodology of the ERC20 contract of the Ethereumblockchain (Solidity), as, for example, without limitation. For example,the issuance of tokens of the present disclosure based, at least inpart, on the Ethereum methodology, may be configured to store tokens'prices in the Ethereum blockchain. In some embodiments, the exemplaryinventive eWallets of the present disclosure with associated devices maybe configured to, at least, without limitation, convert data string to ahexadecimal form using a suitable converter, and then, use the resultedhexadecimal number in the data field, for example, in the Solidity code(contract-oriented programming language for writing smart contracts) bystarting the string with “0x”. An illustrative, non-limiting example ofsuch string is 0x537461636b45786368616e6765.

For example, in some embodiments, the exemplary inventive eWallets ofthe present disclosure with associated devices, utilizing an exemplaryEthereum-based blockchain, may be configured to store transactions assigned data packages of messages to be sent from one account to anotheraccount on the blockchain. For example, an illustrative transaction maycontain identification of a recipient of the message; a signatureidentifying the sender (proving the intention to send the message viathe blockchain to the recipient); a “VALUE” field (e.g., identifying anamount of wei to transfer from the sender to the recipient (e.g.,10{circumflex over ( )}18 Wei=1 Ether); a data field (which can containthe message sent to a smart contract); a startGAS value (whichrepresents a maximum number of computational steps the transactionexecution is allowed to take (metering unit of Ethereum Virtual Machine(EVM) or the World Computer; and a GASprice value (which represents thefee the sender is willing to pay for gas (for example, one unit of gasmay corresponds to the execution of one atomic instruction (acomputational step) (e.g., for example, a multiplication (MUL) consumes5 gas and an addition (ADD) consumes 3 gas).

For example, as shown in FIG. 5, in some embodiments, the exemplaryinventive eWallets of the present disclosure with associated devicesallow the user to deposit digital currency to the eWallets (e.g., buyinga token) in a manner shown by the data flows 1 and 2 in FIG. 5 (see alsoFIGS. 6A and 6B). The withdrawal process is illustrated by the data flow3. The user is provided a memory address of his/her eWallet application(3.1) via one or more ways (3.2) (e.g., via scanning QR code, insertinga number, or manually entry by the user). In some embodiments, theexemplary inventive eWallets of the present disclosure with associateddevices are configured to communicate the proposed transaction throughthe Proxy and Blockchain API units to the exemplary blockchain(3.3-3.7). In some embodiments, the exemplary Blockchain API returns aresponse (3.8) on the status of the transaction (e.g., pending,confirmed, or failed). For example, when the transaction status becomessuccessful, the Proxy unit may be configured to send a confirmation(3.9) to the exemplary inventive eWallets of the present disclosure.

In some embodiments, the exemplary Proxy unit may be operationallyconnected to the exemplary Database #1 where the data related to theuser's interaction with the exemplary inventive eWallet is stored (e.g.,information about user's account(s) and activity (e.g., transactions,addressed, balances)).

In some embodiments, the exemplary Database #2 may store the exemplaryinventive eWallets, addresses, transactions, etc. For example, theexemplary Blockchain API unit (hardware and software), withoutlimitation, is configured to at least perform operations with heexemplary inventive eWallets and digital currency addresses such as,without limitation, obtaining new addresses for depositing digitalcurrencies by users, initializing transactions, providing currency flowsbetween “hot” and “cold” eWallets (for example, the hot eWallets may bethe exemplary inventive eWallets and be part of, for example acrypto-exchange, although they may be “logically” structured as beingsigned to users; the cold eWallets may physically belong to users,(e.g., separate devices (e.g., USB, smart phone) and/or software).

In some embodiments, the exemplary Proxy unit is in the form of a hub(hardware and software) which, for example, without limitation, isconfigured to at least maintain users' accounts, control the balance andstatus information, etc.

In some embodiments, the illustrative flowchart of FIGS. 6A and 6B maybe also utilized to deposit digital asset via the improve eWallets ofthe present disclosure. For example, when a user wants to depositdigital currency (e.g., buy tokens) into an exemplary inventive eWallet,the exemplary implementation of the present disclosure may be configuredto provide the list of available digital currencies (e.g., users openthe application and request the list). For example, the exemplaryimplementation of the present disclosure may be configured to send arequest to the exemplary Proxy unit, which retrieves the list from theDatabase (e.g., FIG. 16) and sends the list back to the applicationinterface. For example, the exemplary implementation of the presentdisclosure may be configured to display the list of available digitalcurrencies to the user. When the exemplary implementation of the presentdisclosure receives the user's selection of desirable digital currency,the Proxy unit may request address to which the selected digital assetswill be deposited provided by the exemplary Blockchain API. For example,the exemplary Blockchain API may permanently link the user's digitalpresence with the generated address which may be also used for the nextfunding. For example, in some embodiments, if the user requests a newaddress (e.g., the user wishes to buy a token having zero balance ofthat token), the new one will be generated. For example, the exemplaryBlockchain API may be configured to send the memory address to theexemplary implementation of the present disclosure allowing the user toinitiate the transfer. For example, the exemplary implementation of thepresent disclosure may be programmed to notify the user when thetransaction is added to the block of the exemplary blockchain/ledger.For example, upon receiving a request from the user, the exemplary Proxyunit may be configured to request the transaction's status from theexemplary Blockchain API (e.g., the exemplary blockchain of the presentdisclosure may be configured to monitor all corporate addresses andaddresses assigned to users). For example, the exemplary implementationof the present disclosure may be further programmed to update the user'sbalance and notify the user about the successful funding.

In some embodiments, the exemplary inventive eWallets of the presentdisclosure with associated devices represent technological solutionsthat, for example, without limitation, reduce volume of data beingtransacted over distribute ledgers/blockchains. For example, in someembodiments, the exemplary inventive eWallets of the present disclosurewith associated devices represent technological solutions that, forexample, without limitation, reduce amount of processing power. Forexample, given that the number of issued tokens may be rather large(e.g., 10, 100, 1000, 2000, or more), the exemplary inventive eWalletsof the present disclosure provide safety in storing digital assets andcontrolling flows between each other eWallet and other types of eWallets(e.g., traditional cold and hot eWallets). For example, in someembodiments, the exemplary inventive eWallets of the present disclosurewith associated devices may be configured to allow users tobuy/sell/trade tokens that represent real assets in digitized formcombining benefits of both types.

In some embodiments, the exemplary inventive eWallets of the presentdisclosure may be designed to operate on a Bitcoin-based platform asrepresented by the illustrative software code detailed in Appendix A.

In some embodiments, the exemplary inventive eWallets of the presentdisclosure may be designed to operate on a Ethereum-based platform asrepresented by the illustrative software code detailed in Appendix B.

At least some aspects of the present disclosure will now be describedwith reference to the following numbered clauses.

Clause 1. A computer-based system comprising:

a dual-exchange cryptographically-secured platform (DECSP);

-   -   wherein the DECSP comprises:        -   1) a first-type cryptographically-secured platform            (first-type CSP) and        -   2) a second-type cryptographically-secured platform            (second-type CSP);        -   wherein the first-type CSP comprises at least one first            computing device;        -   wherein the second-type CSP comprises at least one second            computing device        -   wherein the at least one first computing device is            operationally connected to a blockchain and configured to at            least:            -   i) issue at least one digital cryptographical token                (crypto-token) associated with at least one non-crypto                asset,            -   ii) perform at least one blockchain-based activity with                the at least one crypto-token,            -   iii) automatically cause to cryptographically generate,                on a blockchain, at least one first blockchain immutable                record of the at least one blockchain-based activity                with the at least one crypto-token, and            -   iv) automatically transmit at least one instruction                associated with the at least one non-crypto asset to the                at least one second computing device of the second-type                CSP in response to an issuance of the at least one                crypto-token by the at least one first computing device                of the first-type CSP;        -   wherein the at least one second computing device of the            second-type CSP is configured to at least:            -   i) receive the at least one instruction associated with                the at least one non-crypto asset from the at least one                first computing device of the first-type CSP and            -   ii) automatically communicate with at least one                non-crypto asset electronic marketplace to execute at                least one transaction associated with the at least one                non-crypto asset based on the at least one instruction                to obtain at least one position in the at least one                non-crypto asset; and                wherein the at least one first computing device of the                first-type CSP, the at least one second computing device                of the second-type CSP, or both, are configured to                automatically link:

i) the at least one blockchain-based activity with the at least onecrypto-token and

2) the at least one position in the at least one non-crypto asset.

Clause 2. The system of Clause 1, wherein the at least one firstcomputing device of the first-type CSP, the at least one secondcomputing device of the second-type CSP, or both, comprise anon-transitory computer memory storing computer code that, whenexecuted, causes the at least one first computing device of thefirst-type CSP, the at least one second computing device of thesecond-type CSP, or both, to automatically execute at least oneknow-your-customer (KYC) determination.Clause 3. The system of Clauses 1-2, wherein the at least one firstcomputing device of the first-type CSP is further configured toautomatically cause to cryptographically generate, on the blockchain, atleast one second blockchain immutable record of the at least oneposition in the at least one non-crypto asset that is cryptographicallylinked to the at least one crypto-token.Clause 4. The system of Clauses 1-3, wherein the at least one firstcomputing device of the first-type CSP is further configured toautomatically verify a signature-of-trust of a node via which the atleast one first computing device receives, from a user device associatedwith a user, at least one first request to perform the at least oneblockchain-based activity with the at least one crypto-token.Clause 5. The system of Clause 1-4, further comprising:

at least one digital wallet (eWallet) comprising at least one firstgraphical user interface configured to allow a user to perform the atleast one blockchain-based activity based on a user instruction relatedto the at least one position in the at least one non-crypto asset.

Clause 6. The system of Clause 5, wherein the at least one firstcomputing device of the first-type CSP is further configured to transmitat least one message, via the blockchain, from a first eWallet of afirst user to a second eWallet of a second user.Clause 7. The system of Clause 6, wherein the first eWallet comprises atleast one second graphical user interface configured to allow the firstuser to indicate a maximum number of computational steps to be taken totransmit the at least one message, via the blockchain, to the secondeWallet of the second user.Clause 8. The system of Clauses 1-7, wherein the at least one firstcomputing device of the first-type CSP is further configured to:

secretly keep at least one private key of the at least one crypto-tokenand

restrict a user to withdraw the at least one crypto-token to acorresponding value of at least one pre-determined cryptocurrency, atleast one predetermined FIAT currency, or both.

Clause 9. The system of Clauses 1-8, wherein the at least one firstcomputing device of the first-type CSP is further configured to track amonetary value of the at least one crypto-token based, at least in part,on a monetary value of the at least one position in the at least onenon-crypto asset.Clause 10. The system of Clause 5-6, wherein the eWallet furthercomprises at least one second graphical user interface configured todisplay a monetary value of the at least one crypto-token based, atleast in part, on a monetary value of the at least one position in theat least one non-crypto asset.Clause 11. A computer-based method comprising:

administering a dual-exchange cryptographically-secured platform(DECSP);

-   -   wherein the DECSP comprises:        -   3) a first-type cryptographically-secured platform            (first-type CSP) and        -   4) a second-type cryptographically-secured platform            (second-type CSP);        -   wherein the first-type CSP comprises at least one first            computing device;        -   wherein the second-type CSP comprises at least one second            computing device        -   wherein the at least one first computing device is            operationally connected to a blockchain and configured to at            least:            -   i) issue at least one digital cryptographical token                (crypto-token) associated with at least one non-crypto                asset,            -   ii) perform at least one blockchain-based activity with                the at least one crypto-token,            -   iii) automatically cause to cryptographically generate,                on a blockchain, at least one first blockchain immutable                record of the at least one blockchain-based activity                with the at least one crypto-token, and            -   iv) automatically transmit at least one instruction                associated with the at least one non-crypto asset to the                at least one second computing device of the second-type                CSP in response to an issuance of the at least one                crypto-token by the at least one first computing device                of the first-type CSP;        -   wherein the at least one second computing device of the            second-type CSP is configured to at least:            -   i) receive the at least one instruction associated with                the at least one non-crypto asset from the at least one                first computing device of the first-type CSP and            -   ii) automatically communicate with at least one                non-crypto asset electronic marketplace to execute at                least one transaction associated with the at least one                non-crypto asset based on the at least one instruction                to obtain at least one position in the at least one                non-crypto asset; and                wherein the at least one first computing device of the                first-type CSP, the at least one second computing device                of the second-type CSP, or both, are configured to                automatically link:

i) the at least one blockchain-based activity with the at least onecrypto-token and

2) the at least one position in the at least one non-crypto asset.

Clause 12. The method of Clause 11, wherein the at least one firstcomputing device of the first-type CSP, the at least one secondcomputing device of the second-type CSP, or both, comprise anon-transitory computer memory storing computer code that, whenexecuted, causes the at least one first computing device of thefirst-type CSP, the at least one second computing device of thesecond-type CSP, or both, to automatically execute at least oneknow-your-customer (KYC) determination.Clause 13. The method of Clauses 11-12, wherein the at least one firstcomputing device of the first-type CSP is further configured toautomatically cause to cryptographically generate, on the blockchain, atleast one second blockchain immutable record of the at least oneposition in the at least one non-crypto asset that is cryptographicallylinked to the at least one crypto-token.Clause 14. The method of Clauses 11-14, wherein the at least one firstcomputing device of the first-type CSP is further configured toautomatically verify a signature-of-trust of a node via which the atleast one first computing device receives, from a user device associatedwith a user, at least one first request to perform the at least oneblockchain-based activity with the at least one crypto-token.Clause 15. The method of Clause 11-14, further comprising:

administering at least one digital wallet (eWallet) that comprises atleast one first graphical user interface configured to allow a user toperform the at least one blockchain-based activity based on a userinstruction related to the at least one position in the at least onenon-crypto asset.

Clause 16. The method of Clause 15, wherein the at least one firstcomputing device of the first-type CSP is further configured to transmitat least one message, via the blockchain, from a first eWallet of afirst user to a second eWallet of a second user.Clause 17. The method of Clause 16, wherein the first eWallet comprisesat least one second graphical user interface configured to allow thefirst user to indicate a maximum number of computational steps to betaken to transmit the at least one message, via the blockchain, to thesecond eWallet of the second user.Clause 18. The method of Clause 11-17, wherein the at least one firstcomputing device of the first-type CSP is further configured to:

secretly keep at least one private key of the at least one crypto-tokenand

restrict a user to withdraw the at least one crypto-token to acorresponding value of at least one pre-determined cryptocurrency, atleast one predetermined FIAT currency, or both.

Clause 19. The method of Clause 11-18, wherein the at least one firstcomputing device of the first-type CSP is further configured to track amonetary value of the at least one crypto-token based, at least in part,on a monetary value of the at least one position in the at least onenon-crypto asset.Clause 20. The method of Clause 15, wherein the eWallet furthercomprises at least one second graphical user interface configured todisplay a monetary value of the at least one crypto-token based, atleast in part, on a monetary value of the at least one position in theat least one non-crypto asset.

While a number of embodiments of the present description have beendescribed, it is understood that these embodiments are illustrativeonly, and not restrictive, and that many modifications may becomeapparent to those of ordinary skill in the art, including that variousembodiments of the inventive methodologies, the inventive systems, andthe inventive devices described herein can be utilized in anycombination with each other. Further still, the various steps may becarried out in any desired order (and any desired steps may be added,and/or any desired steps may be eliminated).

What is claimed is:
 1. A computer-based system comprising: adual-exchange cryptographically-secured platform (DECSP); wherein theDECSP comprises: 1) a first-type cryptographically-secured platform(first-type CSP) and 2) a second-type cryptographically-secured platform(second-type CSP); wherein the first-type CSP comprises at least onefirst computing device; wherein the second-type CSP comprises at leastone second computing device wherein the at least one first computingdevice is operationally connected to a blockchain and configured to atleast: i) issue at least one digital cryptographical token(crypto-token) associated with at least one non-crypto asset, ii)perform at least one blockchain-based activity with the at least onecrypto-token, iii) automatically cause to cryptographically generate, ona blockchain, at least one first blockchain immutable record of the atleast one blockchain-based activity with the at least one crypto-token,and iv) automatically transmit at least one instruction associated withthe at least one non-crypto asset to the at least one second computingdevice of the second-type CSP in response to an issuance of the at leastone crypto-token by the at least one first computing device of thefirst-type CSP; wherein the at least one second computing device ofsecond-type CSP is configured to at least: i) receive the at least oneinstruction associated with the at least one non-crypto asset from theat least one first computing device of the first-type CSP and ii)automatically communicate with at least one non-crypto asset electronicmarketplace to execute at least one transaction associated with the atleast one non-crypto asset based on the at least one instruction toobtain at least one position in the at least one non-crypto asset; andwherein the at least one first computing device of the first-type CSP,the at least one second computing device of the second-type CSP, orboth, are configured to automatically link: i) the at least oneblockchain-based activity with the at least one crypto-token and 2) theat least one position in the at least one non-crypto asset.
 2. Thesystem of claim 1, wherein the at least one first computing device ofthe first-type CSP, the at least one second computing device of thesecond-type CSP, or both, comprise a non-transitory computer memorystoring computer code that, when executed, causes the at least one firstcomputing device of the first-type CSP, the at least one secondcomputing device of the second-type CSP, or both, to automaticallyexecute at least one know-your-customer (KYC) determination.
 3. Thesystem of claim 1, wherein the at least one first computing device ofthe first-type CSP is further configured to automatically cause tocryptographically generate, on the blockchain, at least one secondblockchain immutable record of the at least one position in the at leastone non-crypto asset that is cryptographically linked to the at leastone crypto-token.
 4. The system of claim 1, wherein the at least onefirst computing device of the first-type CSP is further configured toautomatically verify a signature-of-trust of a node via which the atleast one first computing device receives, from a user device associatedwith a user, at least one first request to perform the at least oneblockchain-based activity with the at least one crypto-token.
 5. Thesystem of claim 1, further comprising: at least one digital wallet(eWallet) comprising at least one first graphical user interfaceconfigured to allow a user to perform the at least one blockchain-basedactivity based on a user instruction related to the at least oneposition in the at least one non-crypto asset.
 6. The system of claim 5,wherein the at least one first computing device of the first-type CSP isfurther configured to transmit at least one message, via the blockchain,from a first eWallet of a first user to a second eWallet of a seconduser.
 7. The system of claim 6, wherein the first eWallet comprises atleast one second graphical user interface configured to allow the firstuser to indicate a maximum number of computational steps to be taken totransmit the at least one message, via the blockchain, to the secondeWallet of the second user.
 8. The system of claim 1, wherein the atleast one first computing device of the first-type CSP is furtherconfigured to: secretly keep at least one private key of the at leastone crypto-token and restrict a user to withdraw the at least onecrypto-token to a corresponding value of at least one pre-determinedcryptocurrency, at least one predetermined FIAT currency, or both. 9.The system of claim 1, wherein the at least one first computing deviceof the first-type CSP is further configured to track a monetary value ofthe at least one crypto-token based, at least in part, on a monetaryvalue of the at least one position in the at least one non-crypto asset.10. The system of claim 5, wherein the eWallet further comprises atleast one second graphical user interface configured to display amonetary value of the at least one crypto-token based, at least in part,on a monetary value of the at least one position in the at least onenon-crypto asset.
 11. A computer-based method comprising: administeringa dual-exchange cryptographically-secured platform (DECSP); wherein theDECSP comprises: 3) a first-type cryptographically-secured platform(first-type CSP) and 4) a second-type cryptographically-secured platform(second-type CSP); wherein the first-type CSP comprises at least onefirst computing device; wherein the second-type CSP comprises at leastone second computing device wherein the at least one first computingdevice is operationally connected to a blockchain and configured to atleast: i) issue at least one digital cryptographical token(crypto-token) associated with at least one non-crypto asset, ii)perform at least one blockchain-based activity with the at least onecrypto-token, iii) automatically cause to cryptographically generate, ona blockchain, at least one first blockchain immutable record of the atleast one blockchain-based activity with the at least one crypto-token,and iv) automatically transmit at least one instruction associated withthe at least one non-crypto asset to the at least one second computingdevice of the second-type CSP in response to an issuance of the at leastone crypto-token by the at least one first computing device of thefirst-type CSP; wherein the at least one second computing device of thesecond-type CSP is configured to at least: i) receive the at least oneinstruction associated with the at least one non-crypto asset from theat least one first computing device of the first-type CSP and ii)automatically communicate with at least one non-crypto asset electronicmarketplace to execute at least one transaction associated with the atleast one non-crypto asset based on the at least one instruction toobtain at least one position in the at least one non-crypto asset; andwherein the at least one first computing device of the first-type CSP,the at least one second computing device of the second-type CSP, orboth, are configured to automatically link: i) the at least oneblockchain-based activity with the at least one crypto-token and 2) theat least one position in the at least one non-crypto asset.
 12. Themethod of claim 11, wherein the at least one first computing device ofthe first-type CSP, the at least one second computing device of thesecond-type CSP, or both, comprise a non-transitory computer memorystoring computer code that, when executed, causes the at least one firstcomputing device of the first-type CSP, the at least one secondcomputing device of the second-type CSP, or both, to automaticallyexecute at least one know-your-customer (KYC) determination.
 13. Themethod of claim 11, wherein the at least one first computing device ofthe first-type CSP is further configured to automatically cause tocryptographically generate, on the blockchain, at least one secondblockchain immutable record of the at least one position in the at leastone non-crypto asset that is cryptographically linked to the at leastone crypto-token.
 14. The method of claim 11, wherein the at least onefirst computing device of the first-type CSP is further configured toautomatically verify a signature-of-trust of a node via which the atleast one first computing device receives, from a user device associatedwith a user, at least one first request to perform the at least oneblockchain-based activity with the at least one crypto-token.
 15. Themethod of claim 11, further comprising: administering at least onedigital wallet (eWallet) that comprises at least one first graphicaluser interface configured to allow a user to perform the at least oneblockchain-based activity based on a user instruction related to the atleast one position in the at least one non-crypto asset.
 16. The methodof claim 15, wherein the at least one first computing device of thefirst-type CSP is further configured to transmit at least one message,via the blockchain, from a first eWallet of a first user to a secondeWallet of a second user.
 17. The method of claim 16, wherein the firsteWallet comprises at least one second graphical user interfaceconfigured to allow the first user to indicate a maximum number ofcomputational steps to be taken to transmit the at least one message,via the blockchain, to the second eWallet of the second user.
 18. Themethod of claim 1, wherein the at least one first computing device ofthe first-type CSP is further configured to: secretly keep at least oneprivate key of the at least one crypto-token and restrict a user towithdraw the at least one crypto-token to a corresponding value of atleast one pre-determined cryptocurrency, at least one predetermined FIATcurrency, or both.
 19. The method of claim 11, wherein the at least onefirst computing device of the first-type CSP is further configured totrack a monetary value of the at least one crypto-token based, at leastin part, on a monetary value of the at least one position in the atleast one non-crypto asset.
 20. The method of claim 15, wherein theeWallet further comprises at least one second graphical user interfaceconfigured to display a monetary value of the at least one crypto-tokenbased, at least in part, on a monetary value of the at least oneposition in the at least one non-crypto asset.