| CPC G06Q 20/4014 (2013.01) [G06Q 20/3825 (2013.01); G06Q 20/389 (2013.01); G06Q 20/4016 (2013.01)] | 3 Claims |

|
1. A computer-implemented method, the method comprises:
establishing, by a computing entity of a computing system, a set of required cryptography-authenticated public benefit asset information for subsequent selection of a set of public benefit credit assets based on a request to identify the set of public benefit credit assets, wherein a particular public benefit credit asset of the set of public benefit credit assets assigns a corresponding credit level from a corresponding payer identifier (ID) to a corresponding owner ID associated with the particular public benefit credit asset, wherein the establishing the set of required cryptography-authenticated public benefit asset information for subsequent selection of the selected set of public benefit credit assets based on the request to identify the set of public benefit credit assets includes:
interpreting the request to identify the set of public benefit credit assets to identify the particular public benefit credit asset of the set of public benefit credit assets and to identify the corresponding credit level from the corresponding payer ID to the corresponding owner ID associated with the particular public benefit credit asset;
applying a cryptography test to a public benefit credit establishment message associated with the particular public benefit credit asset; and
when a result of the cryptography test indicates that the particular public benefit credit asset has an authenticated status:
identifying a smart contract based on the particular public benefit credit asset as a portion of the set of required cryptography-authenticated public benefit asset information;
identifying, by the computing entity, a secure first token on an object distributed ledger representing the set of public benefit credit assets based on the set of required cryptography-authenticated public benefit asset information, wherein the identifying the secure first token includes:
accessing content of the object distributed ledger to obtain a candidate token;
applying a cryptography test to the candidate token; and
when a result of the cryptography test indicates that the candidate token has an authenticated status:
determining whether the candidate token includes a smart contract that matches the required cryptography-authenticated public benefit asset information, and indicating the candidate token is the secure first token when the candidate token includes the smart contract that matches the required cryptography-authenticated public benefit asset information; and
establishing, by the computing entity, control over the secure first token representing the set of public benefit credit assets on the object distributed ledger to produce an updated secure first token, wherein only a device possessing control over the secure first token may modify the secure first token, wherein the establishing the control over the secure first token includes:
obtaining a copy of the object distributed ledger,
hashing the updated set of smart contracts utilizing a receiving public key of the object distributed ledger to produce a next transaction hash value,
encrypting the next transaction hash value utilizing a private key of the computing entity to produce a next transaction signature,
generating a next block of a blockchain of the object distributed ledger to include the updated set of smart contracts and the next transaction signature, and
causing inclusion of the next block as the updated secure first token in the object distributed ledger.
|