CPC G06Q 20/382 (2013.01) [G06Q 20/1235 (2013.01); G06Q 20/405 (2013.01); H04L 9/006 (2013.01); H04L 9/3239 (2013.01); H04L 9/50 (2022.05); H04L 2209/56 (2013.01)] | 14 Claims |
1. A computer-implemented method of manipulating data structures to model a digital asset and its evolution with respect to the rights of a plurality of parties, the method comprising:
determining, by one or more computing devices, the rights of the plurality of parties with respect to the digital asset, wherein the digital asset is disposable through execution of a first function instance, the first function instance including at least a first choice defined therein for disposition of the digital asset;
generating, by the one or more computing devices, a proposed transaction configured to update an append-only ledger maintained by a plurality of distinct nodes of a computer network, the proposed transaction comprising:
(i) a cryptographic authorization by a first of the plurality of distinct nodes authorizing immediate and future ledger execution impacts of the proposed transaction,
(ii) data identifying an authorizing subset of the plurality of nodes that can cryptographically authorize the immediate and future ledger execution impacts of the proposed transaction, and
(iii) data identifying a private subset of the plurality of nodes entitled to receive information pertaining to the transaction,
validating, by the one or more computing devices, that each of the authorizing nodes has provided its cryptographic authorization of the proposed transaction; and
executing, by the one or more computing devices, the first function instance and storing results of the executed first function instance as a committed transaction in the append-only ledger.
|