US 12,244,715 B2
Using secondary blockchain addresses to prevent malicious transfers
Anoop Gopi, Herndon, VA (US); Lesley Newton, Richmond, VA (US); and Christina Song, McLean, VA (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on Nov. 21, 2022, as Appl. No. 18/057,694.
Prior Publication US 2024/0171399 A1, May 23, 2024
Int. Cl. H04L 9/08 (2006.01); H04L 9/00 (2022.01); H04L 9/32 (2006.01)
CPC H04L 9/3213 (2013.01) [H04L 9/0866 (2013.01); H04L 9/50 (2022.05)] 20 Claims
OG exemplary drawing
 
1. A system for using secondary cryptography-based storage applications to prevent malicious transfers of control of cryptographic tokens from a primary cryptography-based storage application, the system comprising:
one or more processors; and
a non-transitory, computer-readable storage medium storing instructions that when executed by the one or more processors cause the one or more processors to perform operations comprising:
receiving a first blockchain function request for transferring control of one or more cryptographic tokens from a source cryptography-based storage application associated with a user to a target cryptography-based storage application associated with a requestor of the first blockchain function request, wherein the first blockchain function request comprises a source address of the source cryptography-based storage application and a target address of the target cryptography-based storage application;
determining that the source address is a secondary cryptographic address associated with a primary cryptographic address that controls the one or more cryptographic tokens;
in response to determining that the source address is the secondary cryptographic address, determining, based on the source address and the target address, that the source cryptography-based storage application is permitted to transfer control of the one or more cryptographic tokens to the target cryptography-based storage application;
identifying the primary cryptography-based storage application that corresponds to the source cryptography-based storage application;
generating a second blockchain function request for transferring control of the one or more cryptographic tokens controlled by the primary cryptography-based storage application to be controlled by the source cryptography-based storage application;
transmitting the second blockchain function request to be executed by a blockchain node; and
based on the second blockchain function request being successful, transmitting the first blockchain function request to be executed by the blockchain node.