| CPC G06Q 20/3674 (2013.01) [G06F 21/316 (2013.01); G06F 21/32 (2013.01); G06Q 20/3678 (2013.01); G06Q 20/3821 (2013.01); G06Q 20/401 (2013.01); G06Q 20/4016 (2013.01); H04L 9/50 (2022.05); G06Q 2220/10 (2013.01); H04L 2209/56 (2013.01)] | 21 Claims |

|
1. A method of controlling creation of a non-fungible token on a blockchain comprising:
verifying, via at least one processor, a user requesting creation of the non-fungible token on the blockchain;
generating, via the at least one processor, verification information that identifies the user and indicates successful verification of the user;
creating, via the at least one processor, the non-fungible token on the blockchain and modifying code of a smart contract of the blockchain by the at least one processor to include the verification information and to control publishing on the blockchain;
receiving, via the at least one processor, notification that the non-fungible token is a fraudulent non-fungible token indicating improper ownership;
identifying, via the at least one processor, the user corresponding to the fraudulent non-fungible token based on the verification information of the modified smart contract and storing an indication associating the verification information of the user with the fraudulent non-fungible token;
receiving, via the at least one processor, a second request from a second user for creating a second non-fungible token on the blockchain;
generating, via the at least one processor, verification information that identifies the second user and indicates successful verification of the second user; and
controlling creation of the second non-fungible token on the blockchain, via the at least one processor, by executing the modified smart contract, wherein the modified smart contract performs actions including:
comparing verification information of the second user to the verification information associated with the fraudulent non-fungible token based on the indication; and
preventing creation of the second non-fungible token on the blockchain for the second user based on the verification information of the second user corresponding to the verification information associated with the fraudulent non-fungible token.
|