US 12,373,392 B2
Scalable, secure, efficient, and adaptable distributed digital ledger transaction network
Benjamin D. Maurer, Menlo Park, CA (US)
Assigned to Circle Internet Financial, LLC, Boston, MA (US)
Filed by CIRCLE INTERNET FINANCIAL, LLC, Boston, MA (US)
Filed on Oct. 17, 2022, as Appl. No. 18/047,201.
Application 18/047,201 is a continuation of application No. 17/242,891, filed on Apr. 28, 2021, abandoned.
Application 17/242,891 is a continuation of application No. 16/442,475, filed on Jun. 15, 2019, granted, now 11,126,593, issued on Sep. 21, 2021.
Prior Publication US 2023/0068589 A1, Mar. 2, 2023
Int. Cl. G06F 16/17 (2019.01); G06F 16/18 (2019.01); G06F 16/182 (2019.01); G06F 16/185 (2019.01); G06Q 20/06 (2012.01); H04L 9/06 (2006.01)
CPC G06F 16/1734 (2019.01) [G06F 16/182 (2019.01); G06F 16/185 (2019.01); G06F 16/1865 (2019.01); G06Q 20/0658 (2013.01); H04L 9/0637 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
generating a plurality of access limits for a user account within an authenticated data structure of a distributed digital ledger transaction network, each access key limit of the plurality of access limits being defined by a user of the user account and comprising one or more of an access key limit and a threshold number of access keys that are different than respective access key limits and threshold numbers of access keys of other access limits in the plurality of access limits;
identifying a first request for a first transaction associated with the user account and comprising a first access key, a cryptographic signature being applied to the first request using a private key associated with the user account;
determining that the first access key is subject a first access limit of the plurality of access limits, the first access limit comprising one or more of a first access key limit and a first threshold number of access keys; and
executing the first transaction in response to verifying the signature applied to the request using a public key associated with the user account and determining that the first transaction satisfies the one or more of the first access key limit and the first threshold number of access keys.