18145070. SYSTEMS AND METHODS FOR SHARING VALIDATED USER ACTIVITY simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR SHARING VALIDATED USER ACTIVITY

Organization Name

Capital One Services, LLC

Inventor(s)

Michael Mossoba of Great Falls VA (US)

Tyler Maiman of Melville NY (US)

Joshua Edwards of Philadelphia PA (US)

SYSTEMS AND METHODS FOR SHARING VALIDATED USER ACTIVITY - A simplified explanation of the abstract

This abstract first appeared for US patent application 18145070 titled 'SYSTEMS AND METHODS FOR SHARING VALIDATED USER ACTIVITY

Simplified Explanation: This patent application describes methods and systems for sharing cryptographic tokens based on a user's real-world actions through social media to confirm the authenticity of those actions.

  • Cryptographic tokens are generated and used to share validated user activity.
  • The system ensures that the tokens verify the user's activity.
  • Token data is extracted and posted to a social media platform for activity verification.
  • By using cryptographic tokens, the system can verify the user's activity.

Key Features and Innovation:

  • Sharing cryptographic tokens based on real-world actions through social media.
  • Generating and using cryptographic tokens to validate user activity.
  • Extracting token data for posting on social media platforms.
  • Verifying user activity through cryptographic tokens.

Potential Applications: This technology could be applied in industries where verifying user activity is crucial, such as finance, healthcare, and security.

Problems Solved: This technology addresses the challenge of confirming the authenticity of user activity in a secure and efficient manner.

Benefits:

  • Enhanced security through verified user activity.
  • Improved trust and credibility in user actions.
  • Streamlined verification process through cryptographic tokens.

Commercial Applications: The technology could be utilized in financial transactions, medical records management, and identity verification services, potentially revolutionizing how user activity is confirmed and validated.

Questions about Cryptographic Tokens: 1. How do cryptographic tokens enhance the security of user activity verification? 2. What are the potential risks associated with using cryptographic tokens for sharing user activity?


Original Abstract Submitted

Methods and systems are described herein for novel uses and/or improvements to sharing cryptographic tokens based on user's real-world actions through social media so those real-world actions may be confirmed as authentic (e.g., verified and/or validated). More specifically, methods and systems disclosed herein enable sharing validated user activity by generating and using cryptographic tokens. The system may ensure that the cryptographic tokens verify the user's activity. The system may extract token data of a cryptographic token to post to a social media platform for activity verification. Thus, by using cryptographic tokens of the user's activity data, the system is able to verify the user's activity.