| CPC H04L 9/3213 (2013.01) [H04L 9/3226 (2013.01); H04L 9/3239 (2013.01); H04L 9/50 (2022.05)] | 18 Claims |

|
1. An authenticating NFT evaluating apparatus, comprising:
at least one memory;
a component collection stored in the at least one memory;
at least one processor disposed in communication with the at least one memory, the at least one processor executing processor-executable instructions from the component collection, the component collection storage structured with processor-executable instructions, comprising:
obtain, via the at least one processor, from a requestor, an NFT authentication request datastructure structured to specify an authenticating NFT identifier and authorization data;
determine, via the at least one processor, an owner blockchain address associated with the authenticating NFT identifier by sending a first blockchain transaction to an authenticating NFT smart contract deployed on a blockchain;
evaluate, via the at least one processor, the authorization data to verify that the authorization data establishes control over the owner blockchain address associated with the authenticating NFT identifier;
obtain, via the at least one processor, an NFT metadata datastructure associated with the authenticating NFT identifier by sending a second blockchain transaction to the authenticating NFT smart contract deployed on the blockchain;
determine, via the at least one processor, by querying the NFT metadata datastructure, a master hash associated with the authenticating NFT identifier;
determine, via the at least one processor, by querying the NFT metadata datastructure, a set of source asset datastructures associated with the authenticating NFT identifier;
determine, via the at least one processor, for each respective source asset datastructure in the set of source asset datastructures, a hash of source asset data associated with the respective source asset data-structure;
generate, via the at least one processor, a master hash from the determined hashes of source asset data associated with the set of source asset data-structures;
verify, via the at least one processor, that the retrieved master hash matches the generated master hash; and
provide, via the at least one processor, an authentication success indication to the requestor.
|