US 12,293,358 B2
Mitigation of cryptographic asset attacks
Christopher Esquibel, Wilmington, DE (US); and Emily Herrick, Wilmington, DE (US)
Assigned to FOOLPROOF LABS LLC, Wilmington, DE (US)
Filed by Foolproof Labs LLC, Wilmington, DE (US)
Filed on Sep. 13, 2023, as Appl. No. 18/466,510.
Claims priority of provisional application 63/406,397, filed on Sep. 14, 2022.
Prior Publication US 2024/0086905 A1, Mar. 14, 2024
Int. Cl. G06Q 20/38 (2012.01); G06Q 20/02 (2012.01); G06Q 20/36 (2012.01); G06Q 30/018 (2023.01); G06Q 30/0645 (2023.01); G06Q 40/03 (2023.01); H04L 9/00 (2022.01); H04L 9/32 (2006.01)
CPC G06Q 20/3825 (2013.01) [G06Q 20/02 (2013.01); G06Q 20/3674 (2013.01); G06Q 40/03 (2023.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
identifying, via one of one or more computing devices, a first cryptographic token in a first digital wallet, the first cryptographic token is configured to provide access to a particular resource;
generating, via one of the one or more computing devices, a second cryptographic token bound to the first cryptographic token;
transferring, via one of the one or more computing devices, the second cryptographic token to a second digital wallet based on the first cryptographic token; and
accessing, via one of the one or more computing devices, the particular resource based on the second cryptographic token being in the second digital wallet.