Secure Data Interactions Performed by an Internet of Things (IoT) Device

In response to receiving a tagging request to map a first non-fungible token (NFT) to a first user device, a processor transmits an authorization request to a second user device to map the first NFT to the first user device. In response to receiving an approval of the request, the processor transmit...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: BALASUBRAMANIAN, Prabhakaran, KRISHNAN, Subburathinam, JAINI, Yugandhar, KHUTTUMOLU, Durga Prasad P
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In response to receiving a tagging request to map a first non-fungible token (NFT) to a first user device, a processor transmits an authorization request to a second user device to map the first NFT to the first user device. In response to receiving an approval of the request, the processor transmits a request to a minting server of an NFT blockchain network to generate the first NFT for the first user device. The processor stores a token ID of the generated first NFT in a memory. In response to receiving a second authorization from the first user device to perform a data interaction, the processor requests the NFT blockchain network based on the token ID, verification of the first user device. In response to receiving an indication that the first user device is verified, the processor processes the data interaction.