US 12,131,270 B2
Dampening token allocations based on non-organic subscriber behaviors
Scott Augustine, Austin, TX (US); and Martin Floreani, Austin, TX (US)
Assigned to Rokfin, Inc., Austin, TX (US)
Filed by Rokfin, Inc., Austin, TX (US)
Filed on Jan. 26, 2023, as Appl. No. 18/101,961.
Application 18/101,961 is a continuation of application No. 17/236,853, filed on Apr. 21, 2021, granted, now 11,593,721.
Application 17/236,853 is a continuation of application No. 16/950,580, filed on Nov. 17, 2020, granted, now 11,017,329, issued on May 25, 2021.
Application 16/950,580 is a continuation in part of application No. 16/783,062, filed on Feb. 5, 2020, granted, now 11,276,014, issued on Mar. 15, 2022.
Application 16/783,062 is a continuation of application No. 16/588,635, filed on Sep. 30, 2019, granted, now 10,600,009, issued on Mar. 24, 2020.
Claims priority of provisional application 63/086,487, filed on Oct. 1, 2020.
Claims priority of provisional application 62/833,597, filed on Apr. 12, 2019.
Claims priority of provisional application 62/781,442, filed on Dec. 18, 2018.
Prior Publication US 2023/0169413 A1, Jun. 1, 2023
Int. Cl. G06F 21/10 (2013.01); G06F 16/182 (2019.01); G06F 16/27 (2019.01); G06F 16/901 (2019.01); G06F 16/9536 (2019.01); G06F 21/16 (2013.01); G06Q 10/02 (2012.01); G06Q 20/36 (2012.01); G06Q 30/02 (2023.01); H04L 9/06 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01); H04L 67/50 (2022.01); H04L 9/00 (2022.01)
CPC G06Q 10/02 (2013.01) [G06F 16/1837 (2019.01); G06F 16/27 (2019.01); G06F 16/9024 (2019.01); G06F 16/9536 (2019.01); G06F 21/10 (2013.01); G06F 21/16 (2013.01); G06Q 20/3672 (2013.01); G06Q 30/02 (2013.01); H04L 9/0637 (2013.01); H04L 9/0643 (2013.01); H04L 9/3213 (2013.01); H04L 63/1425 (2013.01); H04L 67/535 (2022.05); H04L 9/50 (2022.05)] 19 Claims
OG exemplary drawing
 
1. A tangible, non-transitory, machine-readable medium storing instructions that when executed effectuate operations comprising:
determining that a set of users have burned a first type of cryptographic tokens and, in response, providing the set of users a second type of cryptographic tokens;
receiving the second type of cryptographic tokens and, in response, causing the set of users to have access to computing assets;
determining that a disequilibrium exists between the first type of cryptographic tokens and the second type of cryptographic tokens; and
in response to the determination, minting additional instances of the first type of cryptographic tokens, wherein the operations further comprise:
allocating the additional instances of the first type of cryptographic token to providers of the computing assets.