Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SYSTEMS AND METHODS FOR ESTABLISHING COMMUNICATIONS VIA BLOCKCHAIN
Document Type and Number:
WIPO Patent Application WO/2019/227225
Kind Code:
A1
Abstract:
There is disclosed herein methods and systems of establishing real-time communications and p2p social media blockchain, including the steps of determining if a transaction request was sent, populating a blockchain data packet, initiating a mining process, determining if consensus has been achieved amongst a plurality of users, sending the initiator an error message if there is no consensus, or sending an incoming message notification to an intended one of the users if there is consensus, determining availability of intended recipient, and, sending the initiator a notification of unavailability if the intended recipient is unavailable or generating an encryption key and initiating a P2P connection process if the intended recipient is available.

Inventors:
LIFSON DAVID (CA)
BEREZOVSKIY MIKHAIL (CA)
DABYDEEN MICHAEL (CA)
LIN DAN YI (CA)
BERTANHA MAURICIO (CA)
Application Number:
PCT/CA2019/050750
Publication Date:
December 05, 2019
Filing Date:
May 30, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SKRUMBLE TECH INC (CA)
International Classes:
H04L12/16; G06F16/27; H04L9/06; H04L9/32; H04L12/12
Domestic Patent References:
WO2019119278A12019-06-27
WO2017145003A12017-08-31
WO2018154489A12018-08-30
Foreign References:
US20190163887A12019-05-30
US20190140844A12019-05-09
CN109542863A2019-03-29
CN108390891A2018-08-10
CN108200174A2018-06-22
US20180109541A12018-04-19
US20170132615A12017-05-11
CA2992458A12017-01-19
CN108923932A2018-11-30
CN109194570A2019-01-11
US20180205725A12018-07-19
Attorney, Agent or Firm:
THURLOW, Matthew (CA)
Download PDF:
Claims:
Claims.

1. A computer-implemented method of establishing real-time communications and p2p social media blockchain, the method comprising:

a. determining if a transaction request was sent;

b. populating a blockchain data packet;

c. initiating a mining process;

d. determining if consensus has been achieved amongst a plurality of users;

e. sending the initiator an error message if there is no consensus, or sending an incoming message notification to an intended one of the users if there is consensus; f. determining availability of intended recipient;

g. sending the initiator a notification of unavailability if the intended recipient is unavailable or generating an encryption key and initiating a P2P connection process if the intended recipient is available.

2. A method according to claim 1 further comprising generating a transaction ID before determining if a request was sent.

3. A method according to claim 1, wherein the initiating a P2P connection process comprises

opening a stream for transmission of communication between the initiator and the recipient.

4. A method according to claim 3, wherein the opening comprises establishing a connection wherein an IP address of the initiator and the recipient is revealed to the other and a secure web socket connection is established therebetween.

5. A method according to claim 4, wherein the socket connection comprises a high -capacity rich communication bridge.

6. A method according to claim 3, further comprising encryption of the transmission, comprising separation of the transmission into a plurality of pieces and distributing and storing the pieces on disparate servers.

7. A method according to claim 6, further comprising retrieval of the pieces from the servers and reassembly thereof into the transmission based on a positive result of a key authentication process.

8. A method according to claim 7, wherein a length of time to store the transmission and permissible size thereof are dictated by a usage level of the sender and/or the recipient.

9. A method according to claim 3, further comprising storage of the transmission, comprising

storage on a cloud -based server limited access.

10. A method according to claim 9, wherein the storage of the transmission is initiated by an

administrator.

11. A method according to claim 3, further comprising distributing to the users rewards comprising tokens, based on the users meeting criteria.

12. A method according to claim 11, wherein the criteria comprises one or more of minimum

threshold numbers or volumes of initialized transmissions, promoted initialization by others, mining activities, authentication activities.

13. A method according to claim 3, wherein the transmission comprises one or more of messaging, audio, images, voice calls, video calls, file transfers, group conferencing, screen sharing, instructions for internet of things devices, video devices, audio devices, home and other automation devices.

14. A method according to claim 3, wherein the transmission further comprises a contract

engagement and payment for services rendered thereunder.

15. A method according to claim 3, further comprising establishing one or more P2P and/or group interaction points through which one or more of the users may broadcast media and/or send and/or receive payments.

16. A method according to claim 1, wherein the determining if consensus has been achieved further comprises:

a. receiving a communication request comprising a data payload from a first user intended to reach a communications device of the intended recipient;

b. reviewing the data payload to determine any next actions;

c. sending a notification to acknowledge the transaction.

17. A method according to claim 6, wherein the determining further comprises mining consensus authentication and validation.

18. A method according to claim 7, wherein the mining further comprises providing incentives to one or more master node server hosts and/or mining community partners to speed the determining.

19. A method according to claim 1 further comprising sending a notification by:

a. determining a transaction type;

b. determining an intended party;

c. assembling a notification payload;

d. sending a notification to the intended party.

20. A method according to claim 2, wherein the determining a transaction type comprises reading details of a blockchain transaction and/or a transaction request.

21. A method according to claim 1, wherein the determining an intended party comprises querying a correlation database to assess correlation between a device ID and a public key.

22. A method according to claim 2, wherein the assembling comprises compiling data to be provided to intended party, wherein the data comprises one or more of initiating party device ID, intended party public key, matching server address, and hash increment.

23. A method according to claim 1, further comprising reading a notification payload to determine next action(s) and based on the payload,

24. A method according to claim 1, wherein if there is no consensus, the method further comprises conducting an application polling process.

25. A method according to claim 3, wherein the P2P connection process comprises:

a. deriving a key based on one or more traits of the initiator and/or the intended recipient.

26. A method according to claim 25, wherein the deriving a plurality of keys from a master key, comprising: collecting from each of the users elements comprising:

a. a public key to a wallet where the users hold network tokens, b. a secure passcode,

c. a pseudonym, creating from the elements a derivative and generating from the derivative a unique private network user identification and a public identification for each of the users, encrypting communications between the users based on a further derivative of the network user identification of each of the users participating in the communications, the further derivative comprising a seed key for the encrypting

27. Computer readable media containing instructions for performing the steps of the method of claim 1

28. Computer readable media according to claim 27, wherein the instructions are provided in a format for use as a component of or adjunct to one or more third-party software applications.

29. A computer-implemented system arranged to perform the method of claim 1.

30. A non-transitory computer-readable storage medium containing instructions for causing a

processor to:

a. determine if a transaction request was sent by a user;

b. populating a blockchain data packet based on the request;

c. initiate a mining process;

d. determine if consensus has been achieved amongst the user and a recipient;

e. send the user an error message if there is no consensus, or sending an incoming message notification to the recipient if there is consensus;

f. determine availability of the recipient;

g. send the user a notification of unavailability if the recipient is unavailable or generating an encryption key and initiating a P2P connection process if the recipient is available.

31. The medium of claim 30, wherein the instructions further comprise the step of connecting to a blockchain after step a.

32. Computer implemented methods of user identity management in blockchain services comprising authenticating a first packet of a network connection request from a source using cryptographic identity tokens inserted into a packet header at the client and authenticated by a validating node, wherein unauthorized traffic is dropped at a transport level, and whereby no

acknowledgement or feedback is sent to the source if the request does not yield a positive result in the authentication.

33. A method according to claim 31, wherein the authentication further comprises separating internal traffic between peer and validating node functions, and further comprises assembling an audit trail comprising details of all authorized and unauthorized connection attempts to the blockchain.

34. Computer implemented methods and systems of encrypting a communication, wherein the

encrypting comprises:

a. defining a first set of cryptographic transforms and enabling definition of at least a

second set of cryptographic transforms comprising an additive stream cipher for encryption,

b. a keyed-hash based function for message authentication,

c. and an implicit index for sequencing/synchronization based on an RTP sequence number.

35. Computer implemented communication systems and methods comprising:

a. carrying a payload of information from a first group of users to a second group of users to establish a secure peer-to-peer (P2P) communication,

b. a plurality of nodes adapted to communicate with one another via a hashed messaging protocol, wherein the nodes comprise peer nodes and validating nodes, wherein the peer nodes are adapted to broadcast, receive and transfer blocks of transaction data, and the validating nodes are adapted to create blocks of transaction data,

c. wherein the protocol comprises a hashing algorithm comprises incrementation of a first identifier field comprising a version identification (VID) which indicates to other users what version of the application is being used, and a second identifier field comprising an incrementation identification (IID) which indicates to other legs of the communications which hashing algorithm to use.

Description:
SYSTEMS AND METHODS FOR ESTABLISHING COMMUNICATIONS VIA BLOCKCHAIN

Cross-Reference to Related Applications:

The present application claims priority to United Stated Provisional Patent Application No. 62/678,186, filed 30 May 2018, which is herein incorporated by reference in its entirety.

Field:

The present disclosure relates generally to blockchain technology and more particularly to improved systems and methods of establishing, supporting and securing peer-to-peer (“P2P”) communications via blockchain systems and infrastructure.

Background:

Users of electronic communication systems and software view it as imperative that they can communicate securely and, in effect, exert control over their data (be it personal or otherwise). Some problems with known systems and methods are rooted in at least the following areas: (i)

communication systems with centralized servers pose data security challenges; (ii) platforms are not private, can be blocked or compromised and users do not own their data; (iii) marginalized

communities seek but cannot access free or at least affordable discussion and trusted connections.

Risks of Centralized Servers

The Internet has revolutionized the way people communicate and connect. Video chats are possible with the click of a button, businesses can operate and collaborate internationally, banks facilitate international transfers of trillions of dollars, and reaching out to the president of a country is just a tweet away. With e-commerce, an item could be manufactured in Guangzhou, and sold by a company in New York to a woman in Sydney. Social media has changed the face of communication, news reporting and entertainment. The Internet has succeeded in connecting nearly everyone on its network, but its use also raises concerns regarding privacy and data security.

It is very difficult to use the Internet without yielding on privacy or being at risk for hacking or other malicious actions. There is a critical need for a decentralized, substantially impenetrable network through which users can communicate and connect securely without having to worry about their personal information being compromised.

Even users of ostensibly legitimate sites regularly (albeit sometimes unwittingly) submit to terms-of- service agreements that give companies license to share their personal data with other institutions, from advertisers to governments. For instance, some offer major consumer services for free by sharing user data such as browser activity and search history or selling user data and activity such as post likes and comments to advertisers. When visiting social media or e-commerce websites, it is a common occurrence for advertisements to reflect the above-mentioned data or even conversations that were had verbally and seemingly offline, which raises specific concerns about digital eavesdropping and user privacy.

Communication applications are used to manage massive amounts of data traffic every day. However, these extremely high volumes of data are typically routed through a centralized server with one main point of contact. In this kind of centralized system, breaching a single point of contact is easier and could give malicious parties access to a mass amount of the network’s data. This would allow hackers to steal and tamper with information.

Privacy & Data Ownership:

Numerous sources of information and discussion forums available on the Internet today, so people use several different communication platforms to leam and have discussions about blockchain and other important topics. This leads to a very fragmented and disconnected community experience. Use of various platforms like Facebook™, WhatsApp™, WeChat™, and others to collaborate and share information provide centralization; but make it difficult to have a consistent and trustworthy global standard. However, such platforms and ones like them are not immune to data and content blocking and unauthorized access. Such platforms may also have limitations on them in various jurisdictions.

Moreover, specific forums focused on the discussion of new technology and other topics may have other forms of censorship. One such example is dedicated forums for discussion on cryptocurrency like Bitcoin talk or threads on the Reddit platform. A critical barrier to entry for people interested in cryptocurrency and blockchain technology more generally is a lack of information about the legality of cryptocurrency trading. These forums often have limitations when it comes to accuracy, credibility and trust, since they are mostly comprised of personal opinions and not always backed by verifiable facts.

People also turn to video sharing platforms like YouTube™ for information and education on the cryptocurrency ecosystem (and almost everything else). This content has the problem of being unidirectional, untrustworthy and biased as they mostly cover individual preferences, providing only a superficial view on any topic. Also, since these communication platforms use centralized networks, they face all the previously discussed dangers of hacking, social engineering and other security vulnerabilities. Access for Marginalized Communities

Constant apprehension and data insecurity inhibit users from creating sustainable online communities and sharing meaningful information in conversations. A challenge of online engagement is developing relationships while protecting user identity, creating comfort, security, and developing actionable activities. People need untethered access to public forums and platforms to exercise their fundamental human right to speak freely, and not feel concerned with intermediaries and unknown third parties having access to their private information. Simply discussing common interests, sharing stories and networking helps to bring people together. When people are connected, they feel unguarded and comfortable enough to share genuine and honest ideas, personal information and establish meaningful relationships.

With sometimes marginalized communities seeking forums for free discussion, it can be difficult to find an open and streamlined medium to share new ideas. One example of a community in need of connectivity and global access is the cryptocurrency community. Public perception of a cryptocurrency is one of the biggest deciding factors behind its adoption and value. While only around nine years old, cryptocurrencies are now at a stage of rapid growth and expansion with currently thousands of different currencies and applications. In such a budding environment, it is increasingly difficult for blockchain technology companies to showcase new ideas and for potential users to connect and learn more about the latest community developments. One way for blockchain advocates to engage with potential users and the public is through direct communication.

Known online communities and communication platform options display clear flaws and

vulnerabilities. Current solutions are fragmented, disconnected and unreliable, which creates scope for improvement to enhance trust and connectivity worldwide. Through a solution like a substantially globally accessible online community, unified, secure communication would increase and expand opportunities for bringing people together.

Peer to peer communications are extremely common; however, there is a need for a blockchain that can carry the information required to establish a communications session. It will be appreciated that “communications” as discussed herein are not necessarily limited to, for example, text, audio and video but may, in some instances, also include financial and other discourse and/or other P2P exchanges.

Blockchain in a broad conception may address some security concerns, but there are significant technical limitations regarding data storage and connection speeds which must also be addressed to meet user requirements regarding speed and overall quality of user experience.

As such, there is a need for a novel, peer to peer communication systems and methodology to bring the security and the secure, ledger-based infrastructure of blockchain and secure, distributed and encrypted rich media communication together. There is also a need for a secure communication network could truly provide essential mediums for anyone from anywhere in the world to come together. They could simply speak freely, share information and transfer data without the implication of being hacked or someone else being privy to their personal information. A global blockchain community would help improve communication worldwide, whether it be between current blockchain users or anyone who needs to connect with someone using a secure network.

Drawings: Embodiments are illustrated by way of example in the accompanying figures, in which:

Figure 1A is a block diagrams showing steps in an exemplary method;

Figure 1B is a schematic representation of key derivation and transmission in methods disclosed herein;

Figure 2 is a schematic representation of an exemplary file separation an storage in methods disclosed herein; Figure 3 is a block diagram showing steps in a method of communications initiation;

Figure 4 is a block diagram showing steps in a method of communications acceptance;

Figure 5 is a block diagram showing steps in a further method of communications acceptance.

Figure 6 is a schematic representation of systems and methods of communications disclosed herein; and,

Figure 7 is a schematic and block diagrammatic representation of a further embodiments of systems disclosed herein.

Brief Summary

There is disclosed herein a computer-implemented method of establishing real-time communications and p2p social media blockchain. The method includes determining if a transaction request was sent;

populating a blockchain data packet; initiating a mining process; determining if consensus has been achieved amongst a plurality of users; sending the initiator an error message if there is no consensus, or sending an incoming message notification to an intended one of the users if there is consensus;

determining availability of intended recipient; sending the initiator a notification of unavailability if the intended recipient is unavailable or generating an encryption key and initiating a P2P connection process if the intended recipient is available.

In another disclosed aspect, the method further comprises generating a transaction ID before determining if a request was sent. In another disclosed aspect, the initiating a P2P connection process comprises opening a stream for transmission of communication between the initiator and the recipient.

In another disclosed aspect, the opening comprises establishing a connection wherein an IP address of the initiator and the recipient is revealed to the other and a secure web socket connection is established therebetween. In another disclosed aspect, the socket connection comprises a high-capacity rich communication bridge.

In another disclosed aspect, the method further comprises encryption of the transmission, comprising separation of the transmission into a plurality of pieces and distributing and storing the pieces on disparate servers.

In another disclosed aspect, the method further comprises retrieval of the pieces from the servers and reassembly thereof into the transmission based on a positive result of a key authentication process.

In another disclosed aspect, a length of time to store the transmission and permissible size thereof are dictated by a usage level of the sender and/or the recipient.

In another disclosed aspect, the method further comprises storage of the transmission, comprising storage on a cloud-based server limited access. In another disclosed aspect, the storage of the transmission is initiated by an administrator.

In another disclosed aspect, the method further comprises distributing to the users rewards comprising tokens, based on the users meeting criteria.

In another disclosed aspect, the criteria comprises one or more of minimum threshold numbers or volumes of initialized transmissions, promoted initialization by others, mining activities, authentication activities.

In another disclosed aspect, the transmission comprises one or more of messaging, audio, images, voice calls, video calls, file transfers, group conferencing, screen sharing, instructions for internet of things devices, video devices, audio devices, home and other automation devices. In another disclosed aspect, the transmission further comprises a contract engagement and payment for services rendered thereunder.

In another disclosed aspect, the method further comprises establishing one or more P2P and/or group interaction points through which one or more of the users may broadcast media and/or send and/or receive payments.

In another disclosed aspect, the determining if consensus has been achieved further comprises: receiving a communication request comprising a data payload from a first user intended to reach a communications device of the intended recipient; reviewing the data payload to determine any next actions; sending a notification to acknowledge the transaction. In another disclosed aspect, the determining further comprises mining consensus authentication and validation.

In another disclosed aspect, the mining further comprises providing incentives to one or more master node server hosts and/or mining community partners to speed the determining.

In another disclosed aspect, the methods further comprise sending a notification by: determining a transaction type; determining an intended party; assembling a notification payload; sending a notification to the intended party.

In another disclosed aspect, the determining a transaction type comprises reading details of a blockchain transaction and/or a transaction request.

In another disclosed aspect, the determining an intended party comprises querying a correlation database to assess correlation between a device ID and a public key.

In another disclosed aspect, the assembling comprises compiling data to be provided to intended party, wherein the data comprises one or more of initiating party device ID, intended party public key, matching server address, and hash increment. In another disclosed aspect, the method further comprises reading a notification payload to determine next action(s) and based on the payload.

In another disclosed aspect, if there is no consensus, the method further comprises conducting an application polling process. In another disclosed aspect, the P2P connection process comprises deriving a key based on one or more traits of the initiator and/or the intended recipient.

In another disclosed aspect, the method further comprises deriving a plurality of keys from a master key, comprising: collecting from each of the users elements comprising: public key to a wallet where the users hold network tokens, a secure passcode, a pseudonym, creating from the elements a derivative and generating from the derivative a unique private network user identification and a public identification for each of the users, encrypting communications between the users based on a further derivative of the network user identification of each of the users participating in the communications, the further derivative comprising a seed key for the encrypting.

There is disclosed herein computer readable media containing instructions for performing the steps of the methods described above. In another disclosed aspect, the computer readable media are provided in a format for use as a component of or adjunct to one or more third-party software applications.

There is also disclosed herein a computer-implemented system arranged to perform the method disclosed herein.

There is disclosed herein a non-transitory computer-readable storage medium containing instructions for causing a processor to: determine if a transaction request was sent by a user; populating a blockchain data packet based on the request; initiate a mining process; determine if consensus has been achieved amongst the user and a recipient; send the user an error message if there is no consensus, or sending an incoming message notification to the recipient if there is consensus; determine availability of the recipient; send the user a notification of unavailability if the recipient is unavailable or generating an encryption key and initiating a P2P connection process if the recipient is available.

There is also disclosed herein computer implemented methods of user identity management in blockchain services comprising authenticating a first packet of a network connection request from a source using cryptographic identity tokens inserted into a packet header at the client and authenticated by a validating node, wherein unauthorized traffic is dropped at a transport level, and whereby no acknowledgement or feedback is sent to the source if the request does not yield a positive result in the authentication.

In another disclosed aspect, the authentication further comprises separating internal traffic between peer and validating node functions, and further comprises assembling an audit trail comprising details of all authorized and unauthorized connection attempts to the blockchain.

There is also disclosed herein computer implemented methods and systems of encrypting a

communication, wherein the encrypting comprises: defining a first set of cryptographic transforms and enabling definition of at least a second set of cryptographic transforms comprising an additive stream cipher for encryption, a keyed-hash based function for message authentication, and an implicit index for sequencing/synchronization based on an RTP sequence number.

There is also disclosed herein computer implemented communication systems and methods comprising: carrying a payload of information from a first group of users to a second group of users to establish a secure peer-to-peer (P2P) communication, a plurality of nodes adapted to communicate with one another via a hashed messaging protocol, wherein the nodes comprise peer nodes and validating nodes, wherein the peer nodes are adapted to broadcast, receive and transfer blocks of transaction data, and the validating nodes are adapted to create blocks of transaction data, wherein the protocol comprises a hashing algorithm comprises incrementation of a first identifier field comprising a version identification (VID) which indicates to other users what version of the application is being used, and a second identifier field comprising an incrementation identification (IID) which indicates to other legs of the communications which hashing algorithm to use.

Detailed Description

Decentralized networks like the blockchain do not store information in one central location, which makes it almost virtually impossible for cybercriminals to hack. As soon as information is recorded in a blockchain’s distributed ledger it cannot be erased, changed, relocated or tampered with in any way. Attacking one central server is no longer enough to gain control over the entire system. This consensus- based immutability of a decentralized network creates a transparent and secure framework with vast implications.

These traits would be advantageous in respect of communication solutions and identity management opportunities on a decentralized network. Given the huge scope of applications for blockchain technology use, and the transparency and security those applications will offer, enhanced services and platforms that enable these services to be more accessible to the public have the opportunity for significant growth.

Trust has always been a fundamental currency of both communication and commerce. Every second new online transactions occur between strangers around the world, usually through a third party enabling the communication transaction, and trust needs to be manufactured between the user and host to complete the operation. Whether a message is sent, or a payment is made, the sender has no choice but to trust that the intermediary will deliver the transaction to the intended recipient safely. With a distributed blockchain ledger, users can securely and directly connect and perform transactions with each other, without having to rely on an intermediary or worry about protecting their privacy.

Blockchain and decentralized networks offer a way to confidently operate in a trust-less environment using its distributed ledger to create transparency and consensus -driven, tamper-proof logs of transactions. Every transactional‘block’ is verified by the entire network and then immutably linked to the‘chain’ to provide unparalleled security and accountability. Additionally, there is an overwhelming need to improve identity management protocols on the web. The need to verify one’s identity is now essential for numerous online accounts and transactions, including, for example, your personal home address, contact information, financial information and more.

Distributed ledgers offer enhanced methods for verifying identity, without having to share contact details, along with the possibility to digitize personal information. The dual -encryption mechanism on a blockchain with public and private keys enables applications to digitally verify the identity of the people using them and eliminates the risk of false key propagation and data tampering or theft.

As noted above, there is a need for, and disclosed herein is, a solution that leverages blockchain’ s distributed ledger properties and connects users substantially directly, eliminating the need to place trust in an intermediary or an unknown party. A decentralized communication solution will mean users can securely and directly connect and transact with one another, without having to worry about their privacy.

There is disclosed herein a computer-implemented method 100 of establishing real-time communications and p2p social media blockchain (as shown in Figure 1; Figure 7 displays an alternate embodiment wherein 200-formative reference numbers are used to denote similar features referred to by lOO-formative numbers in Figure 1). The method 100 includes determining if a transaction request was sent 106, after generating a transaction identification or ID; populating a blockchain data packet 108; initiating a mining process 110; determining if consensus 112 has been achieved amongst a plurality of users. If no consensus has been reached, the initiator will be sent an error message 114 if there is no consensus, or an incoming message notification 116 will be sent to a recipient if there is consensus.

Determining if consensus has been achieved 112 includes receiving a communication request comprising a data payload 108 from the user (sender) 102 intended to reach a communications device of the intended recipient 126. The data payload 108 is reviewed to determine next actions and a notification may be sent to acknowledge the transaction (e.g, 116). The determining 112 may also include mining consensus authentication and validation. Mining may also include providing incentives to one or more master node server hosts and/or mining community partners to speed the determining 112. Availability of intended recipient will be determined 118, and the initiator 102 sent a notification of unavailability 120 if the intended recipient is unavailable. If the recipient is available, an encryption key will be generated and a P2P connection process initiated 124.

As shown schematically in Figures 1B and 6, initiating the connection process 124 (and graphically represented by transition from diamond pointer A in Fig 1A to the like identified item in Figure 1B) includes opening a stream 136 for transmission of communication between the initiator 102 and the recipient 126. The transmission may include, for example, one or more of messaging, audio, images, voice calls, video calls, file transfers, group conferencing, screen sharing, instructions for internet of things devices, video devices, audio devices, home and other automation devices. The transmission may also include a contract engagement and payment for services rendered thereunder, or establishment od one or more P2P and/or group interaction points through which one or more of the users may broadcast media and/or send and/or receive payments.

In another disclosed aspect, the opening 136 comprises establishing a connection wherein an IP address of the initiator 102 and the recipient 126 is revealed to the other and a secure web socket connection 136 is established therebetween. In some embodiments, the connection comprises a high-capacity rich communication bridge 136.

As shown in Figure 2, the method may also comprise encryption of the transmission. For example, by separation 146 of the transmission into a plurality of pieces 150 and distributing and storing the pieces on disparate servers 152. The method may further comprise retrieval of the pieces 150 from the servers 152 and reassembly thereof into the transmission based on a positive result of a key authentication process. A length of time to store the transmission and permissible size thereof may be dictated by a usage level of the sender and/or the recipient and graduated permission /privilege levels related to such usage. The method 100 may also include storage of the transmission, including, for example, storage on a cloud- based server with access limited to users with key-based permissions. Storage of the transmission may, in some embodiments, be initiated by an administrator so empowered.

The method may also include distributing to the users 102, 126 rewards comprising tokens, based on the users meeting criteria, which may include usage thresholds, volumes of initialized transmissions, promoted initialization by others, mining activities, authentication activities.

In another disclosed aspect, the methods 100 may also include sending a notification 116 by, for example, determining a transaction type 204 (in Figure 7), determining an intended party; assembling a notification payload; and sending a notification to the intended party. Determining a transaction type may include reading details of a related blockchain transaction and/or a transaction request. Determining an intended party comprises querying a correlation database 218 to assess correlation between a device ID and a public key. Assembling a notification payload 108 include compiling data to be provided to intended party, wherein the data comprises one or more of initiating party device ID, intended party public key, matching server address, and hash increment. The notification payload may be read to determine next action(s) and based on the payload. If there is no consensus, the method further comprises conducting an application polling process 1 l4b (see Figure 3).

The P2P connection process includes deriving a key based on one or more traits of the initiator and/or the intended recipient. This may includes deriving a plurality of keys from a master key. This includes collecting from each of the users’ elements including a public key to access a wallet where the users hold network tokens, as well as a secure passcode and a pseudonym. From the elements, a derivative is created from which there is derived a unique private network user identification and a public identification for each of the users. These identifications are used to encrypt communications between the users based on a further derivative of the network user identification of each of the users participating in the

communications, the further derivative comprising a seed key for the encrypting.

As discussed above, there are disclosed herein systems and methods 100 of providing a secure, communication-centric blockchain, including decentralized communication application, as well as, in some embodiments, a communication layer for developers to add into any application. With no middle entity, centralized server host or other intermediary to censor, block or manipulate any data, the disclosed systems and methods 100 allow for open, global private communication and transactions that are truly community owned and operated. This is accomplished via systems and methods 100 disclosed herein which facilitate rich multimedia, quick transaction times, security and, for example, in-app financial exchanges. The disclosed systems 100 and methods 100 function to carry a payload 108 of information that is required to establish a peer-to-peer (P2P) communication, or financial transaction ledger data. An aim of the disclosed systems 100 and methods 100 is to achieve required consensus as quickly as possible. Although transactions per second (“TPS”) is critical, disclosed systems 100 may be scaled to an eventual 1000 TPS or beyond. Systems and methods disclosed 100 herein provide an ability to implement leading decentralized communication features such as group and peer-to-peer messaging, calling, video, file transfers and more with one blockchain network protocol.

By quickly achieving required consensus, any lag typically associated with blockchain transactions is obfuscated from the user experience. The net effect is the speedy, seamless experience demanded by users, with the unparalleled security and authentication provided by blockchain technology. This empowers use and creation of secure and powerful applications that meet and exceed the expectations of today’s usability standards.

The systems disclosed herein comprise, in some embodiments, a P2P network structure, in which nodes can communicate with each other through a hashed messaging protocol. In this structure, there are two different types of nodes: peer nodes and validating nodes. A peer node can broadcast, receive and transfer transactions or blocks, while a validating node can create blocks of data.

The systems and methods 100 disclosed herein may comprise, in some embodiments, a communication centric public blockchain. Such embodiments, which benefit all token holders, do not necessarily belong to any single organization or individual and aim to embracing the blockchain token community, to facilitate system growth, adoption and advancement. The systems and methods may also include aspects of enhancing security with communications technology solutions, incorporating a blockchain ledger supporting secure communications transactions; however, one skilled in the art will appreciate that applications of disclosed systems and methods are not necessarily so limited. Disclosed systems and methods include embodiments with applicability well beyond applications for traditional individuals or groups of users. This includes, for example, establishing communications for Internet of things (“iOT”) applications that require a high degree of security. Examples include implementation into body worn cameras for police and first responders. This allows high security encryption and promotes accountability for such service providers. Further applications are contemplated herein including at least carrier telecommunications, military, security, first responders, iOT, secure real time video applications such as iptv and other applications that require security, encryption and blockchain accountability.

The disclosed systems and methods enable real-time, commercial-grade communication with user identities authenticated on the blockchain by providing a secure key that may be a randomized derivative of each participant’s public key. Access to communications would be limited to the actual participants themselves. There is no middle entity in between to censor, block or manipulate any data. This will enable open, substantially global, private communication that is in effect community operated. This creates opportunities for users to add decentralized communication elements into any blockchain ecosystem and/or build applications with decentralized communication features. The disclosed systems and methods may be regulated with, for example, distributed SSL protocol and rich- media WebRTC based communication technologies.

The systems disclosed herein provide for use of a unique consensus -based algorithm and

pseudonymous identification measures where users set their own usernames, users will maintain ownership/control of their information, data and communication transactions. Users will have the opportunity to bring together large groups of people into online communities or have one-on-one conversations with another user and keep that information completely private and secure. The network allows users to interact using seamless messaging, calling, video, file transfers, and more and improve users access to communication, identity management, and unlimited secure communication

transactions. The disclosed systems 100 and methods 100 incorporate unique and novel security technology to solve and/or substantially mitigate security risks of current Internet-based

communication systems through its distributed ledger authentication and interaction with Applicant’s patented SSL to rich media protocols.

Features exhibited by systems and methods disclosed herein may in some embodiments include at least messaging, audio calling, video calling, file transfers, group conferencing, screen sharing, user-controlled storage, data encryption, and pseudonymous identification.

As discussed herein, most electronic communication networks are based upon centralized servers.

Independent of the communication protocols that are used, they all function in essentially the same way. That is, with an information packet that contains handshake and exchange of meta information to establish the communication’s media stream. The server will then establish and mediate that communication. The disclosed systems and methods cut out the centralized server.

Systems and methods disclosed herein comprise in some embodiments a blockchain optimized for today’s modem communication needs of rich multimedia, quick transaction times, security and in-app financial exchanges. As noted above, functions include to carry a payload 108 of information that is required to establish a peer-to-peer (P2P) communication or, for example and without limitation, financial transaction ledger data. An example of the additional payload requirements are data fields that allow the peer to peer communications to be established. This includes fields that identify the session identification (SID). This field is required and becomes linked to the“b” leg username (see, for example Figure 4). This is used to not only identify the current session but allows the user 102 to see the complete conversation history between the parties.

Obfuscation of the IP and NAT transversal info is accomplished by using a hashing algorithm that increments. Incrementation of the algorithm (shown schematically in Figure 7) is achieved through two identifier fields. The first is the version identification (VID) which tells the other users what version of the application is being used. The second is the incrementation identification (IID) which alerts the other legs of the communication to which hashing algorithm to use. Hashing algorithms may be updated with each new release of software, as may be appreciated by one skilled in the art. In some embodiments, interactions between users of versions of software that are more than a defined number of releases apart from each other (e.g., two, in some embodiments; but, this separation value may differ in other embodiments) will generate an error. This is done to ensure users have the latest application software and can enjoy the benefits thereof.

A hashed download link is also included for embodiments aimed at serving needs of users in geographic locations that might not have access to traditional application stores. This link may constantly change to ensure access for marginalized and/or technologically remote populations. This link will be hashed using the same technique of VID and IID data to further confuse any attempt by third parties (e.g., authorities, hackers) to leam the link destination(s). Additionally, addresses of validating nodes will be hashed in the same way; that is, using the VID and IID.

Identity-Based Security

The systems and methods 100 disclosed herein employ user identity management in blockchain services via implemented identity-based end-to-end security which extends from the blockchain client to the blockchain fabric. This approach allows for identity-based network segmentation and traffic separation, which enables multiple users to securely share the same blockchain infrastructure, reduces the risk of DDoS attacks, and enables automated regulatory compliance audits.

Some embodiments disclosed herein may employ Skrumble Network Transport Access Control (SKTAC) technologies, implemented using software application library endpoints Skrumble Network. This approach can be generalized to protect many different types of commercial applications, beyond the messaging and other communications applications discussed in great detail. SKTAC features include permission control and confidentiality, un-linkable identity privacy for blockchain participants, a modular and easily auditable consensus protocol, and provision for improved scalability. In some disclosed embodiments, SKTAC features include at least some of the following:

• new methods for identity-based network security, which extends end-to-end from the client to the blockchain fabric. This is realized by authenticating the first packet of a network connection request using cryptographic identity tokens, which are inserted into the packet header by the Skrumble Network application at the client, and later authenticated by a validating node. All unauthorized traffic (including port scans) is dropped at the transport level, so the traffic source does not receive any acknowledgment or feedback which might be used for reconnaissance or enumeration as the first step in a cyber-attack. In this manner, services are isolated and protected from unauthorized access; this helps prevent cyber attacks, enables blockchain services, and forms the basis for a zero trust blockchain network.

• SKTAC also provides for identity-based network segmentation and traffic separation, which reduces the risk of cyber-attacks. Using the First Packet Authentication described previously serves to separate internal traffic between peers and validating node functions used in the disclosed systems and methods. Audit trails for all authorized and unauthorized connection attempts to the blockchain are maintained and can be easily audited using software to parse the log contents.

Without authentication any unauthorized user will receive the message that this site cannot be reached, and no further information is available.

Securing The Conversation

There is also disclosed herein an encryption scheme for encoding all aspects of a communication. This includes, for example, voice, video and even the files that might be exchanged and stored. The encryption scheme is derived from the data that is traded anonymously via the blockchain. This ensures the highest level of encryption, privacy and user ownership of the data.

Disclosed embodiments may employ, for example, Secure Real-time Transport Protocol (SKRTP), a profile of the Real-time Transport Protocol (RTP), which provides confidentiality, message

authentication, and replay protection to the RTP traffic and to the control traffic for RTP, the Real-time Transport Control Protocol (RTCP). SKRTP provides a framework for encryption and message authentication of RTP and RTCP streams. SKRTP defines a set of cryptographic transforms, and it allows new transforms to be introduced in the future. With appropriate key management, SKRTP is secure for unicast and multicast RTP applications.

SKRTP can achieve high throughput and low packet expansion. SKRTP proves to be a suitable protection for heterogeneous environments (mix of wired and wireless networks). To get such features, default transforms are described, based on an additive stream cipher for encryption, a keyed-hash based function for message authentication, and an“implicit” index for sequencing/synchronization based on the RTP sequence number for SKRTP and an index number for Secure RTCP (SRTCP).

Some security goals of SKRTP are to ensure: (i) confidentiality of the RTP and RTCP payloads; and (ii) integrity of the entire RTP and RTCP packets, together with protection against replayed packets. These security services may, in some embodiments, be optional and independent from each other, except that SRTCP integrity protection is mandatory (malicious or erroneous alteration of RTCP messages could otherwise disrupt the processing of the RTP stream).

Other features for this protocol include:

(a) Low bandwidth cost, i.e., a framework preserving RTP header compression efficiency, and, asserted by the pre-defmed transforms:

a. A low computational cost, b. A small footprint (i.e., small code size and data memory for keying information and replay lists),

c. Limited packet expansion to support the bandwidth economy goal,

d. Independence from the underlying transport, network, and physical layers used by RTP, high tolerance to packet loss and re-ordering.

These properties ensure that SKRTP is a suitable protection scheme for RTP/RTCP in both wired and wireless scenarios. SKRTP provides for some additional features that have been introduced to lighten the burden on key management and to further increase security. These features may include:

• A single“master key” can provide keying material for confidentiality and integrity

protection, both for the SKRTP stream and the corresponding SRTCP stream. This is achieved with a key derivation function, providing“session keys” for the respective security primitive, securely derived from the master key.

• In addition, the key derivation can be configured to periodically refresh the session keys, which limits the amount of ciphertext produced by a fixed key, available for an adversary to crypto -analyze.

• “Salting keys” are used to protect against pre -computation and time-memory tradeoff attacks.

The encryption defined in the SKRTP map the SKRTP packet index and secret key into a pseudo random keystream segment. Each keystream segment encrypts a single RTP packet. The process of encrypting a packet consists of generating the keystream segment corresponding to the packet, and then bit-wise exclusive that keystream segment onto the payload of the RTP packet to produce the

Encrypted Portion of the SKRTP packet. In case the payload size is not an integer multiple of n_b bits, the excess (least significant) bits of the keystream are simply discarded. Decryption may be done substantially the same way, except with swapping the roles of the plaintext and ciphertext.

The definition of how the keystream is generated, given the index, depends on the cipher and its mode of operation. Below, examples of two such keystream generators are defined. An example NULL cipher is also defined, to be used when encryption of RTP is not required.

The initial octets of each keystream segment may be reserved for use in a message authentication code, in which case the keystream used for encryption starts immediately after the last reserved octet. The initial reserved octets are called the“keystream prefix”, and the remaining octets are called the “keystream suffix”.

In this example, the number of octets in the keystream prefix is denoted as

SKRTP PREFIX LENGTH. The keystream prefix is indicated by a positive, non-zero value of SKRTP PREFIX LENGTH. This means that, even if confidentiality is not to be provided, the keystream generator output may still need to be computed for packet authentication, in which case the default keystream generator (mode) shall be used.

The cipher is the Advanced Encryption Standard (AES), Segmented Integer Counter Mode AES. Let E (k,x) be AES applied to key k and input block x. Conceptually, AES consists of encrypting successive integers. The actual definition is somewhat more complicated, to randomize the starting point of the integer sequence. Each packet is encrypted with a distinct keystream segment, which may be computed as provided in the following example:

A keystream segment is the concatenation of the 1 8 -bit output blocks of the AES cipher in the encrypt direction, using key k = k_e, in which the block indices are in increasing order. Symbolically, each keystream segment looks like:

E(k, IV) || E(k, IV + 1 mod 2 L 128) || E(k, IV + 2 mod 2 L 128) ...

Where the 128 -bit integer value IV is defined by the SSRC, the SKRTP packet index i, and the SKRTP session salting key k_s, as below:

IV = (k_s * 2 L 16) XOR (SSRC * 2 L 64) XOR (i * 2 L 16)

Each of the three terms in the XOR-sum above is padded with as many leading zeros as needed to make the operation well-defined, considered as a 128 -bit value.

The inclusion of the SSRC allows the use of the same key to protect distinct SKRTP streams within the same RTP session.

In the case of SRTCP, the SSRC of the first header of the compound packet MUST be used, i SHALL be the 31 -bit SRTCP index and k_e, k_s is replaced by the SRTCP encryption session key and salt.

Note that the initial value, IV, is fixed for each packet and is formed by“reserving” 16 zeroes in the least significant bits for the purpose of the counter. The number of blocks of keystream generated for any fixed value of IV must not exceed 2 L 16 to avoid keystream re-use, see below. The AES has a block size of 128 bits, so 2 L 16 output blocks are sufficient to generate the 2 L 23 bits of keystream needed to encrypt the largest possible RTP packet. This restriction on the maximum bit-size of the packet that can be encrypted ensures the security of the encryption method by limiting the effectiveness of probabilistic attacks.

Key Derivation

Key derivation reduces the burden on the key establishment. As many as six different keys may be needed per crypto context (e.g., SKRTP and SRTCP encryption keys and salts, SKRTP and SRTCP

authentication keys), but these are derived from a single master key in a cryptographically secure way. Thus, the key management protocol needs to exchange only one master key (plus master salt when required), and then SKRTP itself derives all the necessary session keys. Multiple applications of the key derivation function will give security benefits if / when enabled, and prevent an attacker from obtaining large amounts of ciphertext produced by a single fixed session key. If the attacker was able to collect a large amount of ciphertext for a certain session key, they might be helped in mounting certain attacks.

Multiple applications of the key derivation function provide backwards and forward security in the sense that a compromised session key may not necessarily compromise other session keys derived from the same master key. This means that the attacker who can recover a certain session key, is not able to have access to messages secured under previous and later session keys (even if derived from the same master key).

Unique Session ID & Data Management Using Disclosed Network’s Protocols

The disclosed systems will in some embodiments comprise a blockchain enabled technological ecosystem enabling a decentralized and substantially anonymous communication ecosystem. These systems will utilize real-time communication protocols over peer-to-peer connections using web browsing and other software applications.

Security protocols will be delivered through a novel key derivative algorithm using the blockchain technology disclosed herein. Upon joining the network, users will be asked to enter the public key to the wallet where they hold their network tokens. Additionally, they will be asked to enter a secure passcode and a pseudonym (i.e., private user name). A derivative of these elements will be used to generate their unique private network user ID and a Public ID. In some embodiments, a QR code and link will be generated for facilitated sharing of the users’ Public ID.

User conversations will be encrypted using a derivative of the private network user ID keys from each participant as the seed key for the encryption. The derivative algorithm will randomly select from the associated Network keys in the session based on the participants involved, such that no two keys will be the same. This ensures an added layer of security as no two conversations will use the same key which makes Network conversations virtually impossible to decrypt using pattern-based

methodologies. For example, a randomized combination of User A’s private Network User ID key and User B’s private Network User ID key will come together to form the conversation seed key and conversation ID.

When a communication is established between users, the network blockchain will replace the handshake protocol that happens on a traditional communication network. In the network, Session Description Protocol (SDP) messages will use the blockchain to establish each session, acting as the handshake and signal for communication to commence, and Real-Time Transport Protocol (RTP) stream for the media (voice, video, message, etc.) to begin transmission.

Once a connection is established between peers, the IP addresses of the users are revealed only to each other and a secure web socket connection will be established to open an interactive communication session between the users’ devices to exchange real-time session data for messages, file transfers and notifications. This allows for data to be instantly distributed resulting in a low-latency connection.

Communications on the network will be P2P and will have the ability to access an ad-hoc high capacity rich communication bridge for voice and video conferencing for larger number of participants.

Embodiments of the technology disclosed herein may be built to operate on any modem browser, in addition to functioning as a standalone application for most mobile and tablet devices (e.g., iOS™ and Android™ operating systems) and computers (e.g., Mac™ and PC systems). The standalone application versions may offer additional functionality over the browser-based version(s).

Network Communication Authentication Blockchain Protocols

There is disclosed a blockchain that establishes unique and secure ad-hoc communication sessions. The blockchain may be utilized in several aspects of embodiments of the disclosed application, including to:

(a) Establish the initial communication session; and,

(b) Synchronize user pseudonyms with the Network User ID.

Both functions will require mining efforts to deliver consensus validation and authentication. Reward and outreach programs incentivize master node server hosts, as well as its mining community and partners to actively support the project, to ensure Network consensus resolution times are optimized.

High Future Data Capacity & Speed

Currently, when users conduct activities using existing blockchain based applications, new transaction and data are saved and stored. The more transactions being saved means slower loading times. For example, a standard financial transaction on known platforms may take about twenty seconds to reach consensus. With an increase in communication transaction volumes, disclosed systems and methods having a need for every message, call, video call and file transfer to be considered another transaction would lead to slowdowns in performance for each user. Disclosed systems and methods will in some embodiments will utilize the Practical Byzantine Fault Tolerance (PBFT) consensus algorithm, to offer a balance between performance and scalability. For transactions to be settled in real-time, disclosed systems and methods will aim to achieve communication setup in less than about ten seconds, supported by incentivized mining efforts. To ensure and/or increase chances of optimized loading times, these protocols will incorporate sharding technology to, for example, separate very large databases into smaller, faster, more easily managed parts. When data is needed, instead of one record loading at a time, data will load as one layered database by pulling up information in pieces from each shard.

Exclusive Encrypted Keys For File Storage On Decentralized Network

The disclosed systems and methods will provide decentralized file storage by utilizing an algorithm that uses unique session identification and randomized key data per user to ensure file information is encrypted. With this algorithm, there can be ensured the direct file transfer between users and only users who have participated in the conversations will be permitted access. Suitable methods of hybrid storage strategy may include, for example and without limitation, those disclosed in Applicant’s U.S. Patent Applications, the contents of which are herein incorporated by reference. Using this hybrid approach, files may be encrypted using an algorithm that derived from the unique session ID and its seed key. Once encrypted, the individual files will be sliced into several pieces, distributed and stored on disparate servers. These files can only be re-assembled with the appropriate key. Therefore, if any file server is to be compromised, the data obtained will be unintelligible, further providing secure data storage for all users.

Moreover, features such as the length of time to store and file sizes allowed will be determined by the usage level that the user has unlocked based upon the number of tokens in their wallet.

High Capacity Rich Communication Bridge

As but one example, for voice and video conferences containing more than 6 participants, anonymous ad-hoc sessions may be established through dedicated bridges that may be situated in key strategic area globally and authenticated via the unique session ID and the derived key. The disclosed systems and methods may use, for example, a scheme of IP tunneling to an address, changing randomly selected from a very large pool, that is only revealed during the secure socket connection made between users once they are connected. Per the protocol for connecting to the bridge, users will verify connectivity. Should connectivity not be reached, the user may increment to the next agreed-upon address. These protocols may allow for larger scale voice and video conferencing, messaging, screen sharing, file transfers and notifications. To unlock features such as the ability to add a greater number of participants or the length of time allowed may be determined by what usage level the user has unlocked based upon the number of tokens in their wallet or by other comparative means.

The systems and methods disclosed herein may, in some embodiments, provide the option for group & peer-to-peer messages to be saved and stored. Conversation records may be stored using file servers in the cloud. Only users with the unique conversation key who participated in the original conversation will be permitted to access the saved information. When a group message is created, the administrator of that conversation will be given the option to save the records. Select functionality will be unlocked based, for example, on certain token ownership amounts. When other participants attempt to enter the conversation, they will first be notified that the administrator has selected to save the conversation. Participants can opt not to partake. When participating in a conversation with two participants, there will be two-party consent requirement. Each participant will need to agree to save the conversation for records to be saved and stored.

There are also disclosed herein additional functionalities such as, for example, a unique algorithm and implementation thereof that creates encryption keys based on participants in a discussion, and other factors, to differentiate every conversation. With the intention of connecting anyone, anywhere in the world, users will be able to easily create large community groups. To maintain an anonymous protocol, users will preferably operate through pseudonymous identification. The disclosed systems may also provide for users to receive notifications when other users have taken screenshots or otherwise sought to record or copy communications such as, for example, a screen share or video. Users have access to live video groups and encrypted, decentralized file and data transfer.

The disclosed systems may preferably work and be provided with open source SDKs to encourage third party developers to build new blockchain technologies and applications to interface with the disclosed systems.

One skilled in the art will appreciate that, while numerous benefits and improvements are disclosed herein, advantages of the decentralized, secure and anonymous communication platform include, for example, the following: (a) disclosed systems cannot be blocked by conventional firewalls; (ii) disclosed systems has user-controlled record storage, and once deleted, data will not be stored on any server; and, (iii) superior encryption of every conversation, message and file. There will be no central point to block using a firewall because every user and every conversation is distinctive. This ensures complete anonymity, and unlimited access to the disclosed systems from substantially anywhere in the world. Only jurisdictions where all outside Internet access is blocked will access be limited.

SKM is a utility token that may offer a certain class of membership based on the number of tokens owned. These membership privileges may enable access to various features and actions on the systems disclosed herein. Initial usage may be free, and the token may, in some embodiments, serve as means of access to unlock premium features, membership levels or utilize various extra functionalities. Non limiting examples are listed below.

Example Use Cases for SKM Utility Token User A in Canada wants to begin a video call with User B in Thailand. Enabling video could be a premium feature. User A and User B would need to possess the set number of SKM utility tokens to perform the requested video call.

User A in France wants to send a file to User B in Brazil. The file exceeds the initial allowed file size requirements. User A must possess a certain token amount to send a larger size file than their current access permits.

User A in Colombia who wants to select to save a conversation they are about to have with User B in Australia. User Controlled Record Storage could be a premium feature. User B has confirmed they will participate in a saved

conversation. Both users may then need to possess a token for storage.

User A in Germany wants to send a file to User B in the United States, but

User A does not want User B to share the file with anyone. User A possesses a certain amount of token and will receive a notification if the file is

transferred.

User A in Finland wants to send a file to User B in Scotland using a gated access key so only User B can access the file. User A owns a certain amount of tokens, User B is sent the file in pieces and only the access key given to User B from User A can unlock the file.

User Rewards:

In some embodiments, users may receive surprise or expected token rewards based on specific criteria. For example, a member who has initialized a certain amount of conversations may receive an extra amount of tokens. There may also be random airdropped rewards for groups to promote community contributors. Further, users helping mine, authenticate and promote the network community may also have opportunities to receive rewards.

The disclosed systems and methods may be augmented or otherwise altered to incorporate or, in whole or in part, facilitate the function of freelance marketplace (s) and/or virtual showroom(s) with a view to achieving, for example, a self-sustainable ecosystem. The disclosed systems and methods may also be susceptible of publishing implementations thereof and application program interfaces (APIs) with open access to facilitate creation of add-on products under proscribed terms. The SKM token may be utilized by users across the many different applications within the disclosed ecosystem and those applications built separately on top. These various applications may also be incentivized for offerings through SKM tokens. Therefore, the ecosystem may grow and become sustainable through an innovative platform development, cost and reward system.

Systems and methods disclosed herein also provide users with a space to share their own data and send encrypted, secure files. Users may send files using a gated access key, which means files are sent in pieces from one user to another. The user receiving the file will be given a secret access code to unlock the gated content and bring the file back into one piece. Users may also place notifications on the files they send. This is to ensure that if a file the sender does not want downloaded or transferred to another conversation is in fact downloaded or transferred, the necessary user(s) will receive an alert substantially immediately.

ECOSYSTEM ADDITIONS FOR SKRUMBLE NETWORK

The SKM tokens will be consumed by all the users across different applications via the Skrumble Network. The various applications will also be incentivized through their offerings through SKM tokens. Therefore, the ecosystem will become sustainable through innovative platform development, cost and reward system.

Systems and methods disclosed herein may also further comprise:

In-Context & Secure Online Payment Gateways

Most payment gateways are complicated, require high levels of technical expertise to set up and involve a separate and unrelated application or format. Networks disclosed herein may include an in conversation end- to-end encrypted payment system. Be it through peer-to-peer money transfers within a conversation, e-commerce payments without leaving the page or simply communication methods like private messages, call and files.

Freelance Marketplace

In recent years, there has been an increasing number of Internet-based platforms centered around the idea of hiring freelancers for limited work and signing off on their expected wages. Disclosed Networks may include support for a freelance marketplace powered by smart contracts. Interested parties can easily select a freelancer, set the jobs parameters, and the freelancer will be paid accordingly when the requirements of the contract are fulfilled.

In-Conversation Smart Contract

Smart contracts are vital for conducting transactions and business remotely. The disclosed Networks may also include functionality for users to fill out and sign off on during their conversations and communication transactions. Be it agreeing to terms of service for lawyers and clients, documenting project expectations for remote workers, hiring a freelancer from the above-mentioned freelancer marketplace, or any type of transaction that requires the approval of interested parties. As an example, terms would get set, the smart contract in signed in-conversation and when the partnership is fulfilled, each party receives what was promised in contract.

Virtual Showrooms

Utilizing video, messaging and presentation capabilities, the disclosed Networks can provide functionality to include simple P2P or group interaction points. These points of contact may be to provide users a platform to broadcast live video, share talents and receive in-conversation payments for their content.

By way of overview, components of the systems disclosed herein may in some embodiments comprise those detailed in Table 1, immediately below:

Table 1:

The steps in the exemplary method shown in Figures 1A and 1B represent a defined sequence of events; however, ancillary functions may, in some embodiments, change order. Depending on the particulars of such changes, embodiments exhibiting some but not all listed functions may be provided. The many components of the systems disclosed herein are adaptable and extensible. For example, the storage component be used in a stand-alone fashion.. In another example, the technology disclosed herein allows for augmented functionality through the use of Virtual and Augmented Reality devices. Additionally, a subset of this technology can be used for devices that require secure communications in the Internet of Things space where a high degree of encryption is needed such as, for example, real-time video from police, military or other security cameras.

While various embodiments in accordance with the principles disclosed herein have been described above, it should be understood that they have been presented by way of example only, and are not limiting. Thus, the breadth and scope of the invention(s) should not be limited by any of the above- described exemplary embodiments, but should be defined only in accordance with the claims and their equivalents issuing from this disclosure. Furthermore, the above advantages and features are provided in described embodiments, but shall not limit the application of such issued claims to processes and structures accomplishing any or all of the above advantages.

It will be understood that the principal features of this disclosure can be employed in various embodiments without departing from the scope of the disclosure. Those skilled in the art will recognize, or be able to ascertain using no more than routine experimentation, numerous equivalents to the specific procedures described herein. Such equivalents are considered to be within the scope of this disclosure and are covered by the claims. Additionally, the section headings herein are provided as organizational cues. These headings shall not limit or characterize the invention(s) set out in any claims that may issue from this disclosure.

Specifically and by way of example, although the headings refer to a“Field” such claims should not be limited by the language under this heading to describe the so-called technical field. Further, a description of technology in the“Background” section is not to be construed as an admission that technology is prior art to any invention(s) in this disclosure. Neither is the“Summary” to be considered a characterization of the invention(s) set forth in issued claims. Furthermore, any reference in this disclosure to“invention” in the singular should not be used to argue that there is only a single point of novelty in this disclosure. Multiple inventions may be set forth according to the limitations of the multiple claims issuing from this disclosure, and such claims accordingly define the invention(s), and their equivalents, that are protected thereby. In all instances, the scope of such claims shall be considered on their own merits in light of this disclosure, but should not be constrained by the headings set forth herein.

The use of the word“a” or“an” when used in conjunction with the term“comprising” in the claims and/or the specification may mean“one,” but it is also consistent with the meaning of“one or more,”“at least one,” and“one or more than one.” The use of the term“or” in the claims is used to mean“and/or” unless explicitly indicated to refer to alternatives only or the alternatives are mutually exclusive, although the disclosure supports a definition that refers to only alternatives and“and/or.” Throughout this application, the term“about” is used to indicate that a value includes the inherent variation of error for the device, the method being employed to determine the value, or the variation that exists among the study subjects.

As used in this specification and claim(s), the words“comprising” (and any form of comprising, such as “comprise” and“comprises”),“having” (and any form of having, such as“have” and“has”),“including” (and any form of including, such as“includes” and“include”) or“containing” (and any form of containing, such as“contains” and“contain”) are inclusive or open-ended and do not exclude additional, un-recited elements or method steps. Methods herein described are exemplary, and performance is intended by software (e.g., stored in memory and/or executed on hardware), hardware, or a combination thereof. Hardware modules may include, for example, a general-purpose processor, and/or analogous equipment. Software modules (executed on hardware) may be expressed in a variety of coded software languages comprising object-oriented, procedural, or other programming language and development tools.

Some embodiments described herein relate to devices with a non-transitory computer-readable medium (also can be referred to as a non-transitory processor-readable medium or memory) having instructions or computer code thereon for performing various computer-implemented operations, including those of methods disclosed herein. The computer-readable medium (or processor-readable medium) is non- transitory in the sense that it does not include transitory propagating signals per se (e.g., a propagating electromagnetic wave carrying information on a transmission medium such as space or a cable). The media and computer code (also can be referred to as code) may be those designed and constructed for the specific purpose or purposes. Examples of non -transitory computer-readable media include, but are not limited to storage media and hardware devices that are specially configured to store and execute program code.

All of the systems and/or methods disclosed and claimed herein can be made and executed without undue experimentation in light of the present disclosure. While the compositions and methods of this disclosure have been described in terms of preferred embodiments, it will be apparent to those of skill in the art that variations may be applied to the compositions and/or methods and in the steps or in the sequence of steps of the method described herein without departing from the concept, spirit and scope of the disclosure. All such similar substitutes and modifications apparent to those skilled in the art are deemed to be within the spirit, scope and concept of the disclosure as defined by the appended claims

References

The following documents are hereby incorporated herein by reference in their entirety:

Cendrowski, Scott (April 14, 2017). Fortune Magazine. China’s WeChat is a censorship juggernaut. Retrieved on January 26, 2018 from http://fortune.com/20l7/04/l4/china-wechat-tencent-censorshi p- 709-crackdown/

Coin Market Cap (2018). Cryptocurrency Market Capitalizations. Retrieved on January 21, 2018 from https : //coinmarketcap . com/all/views/all/

CyberScout (December 27, 2017). Identity Theft Resource Center. Data Breach Reports. Retrieved on January 24, 2017 from https://www.id- theftcenter .org/images/breach/2017Breaches/DataBreachReport_2017.pdf

Facebook (2018). Making ads better and giving your more control. Retrieved on January 26, 2018 from https://www.faeebook.eom/help/585318558251813 ?ref=notif&notif_t=oba

Google (2018). How Ads Work. Retrieved on January 26, 2018 from https://privacy.google.com/how- ads-work.html

Greenberg, Andy (January 10, 2018). Wired. WhatsApp security flaws could allow snoops to slide into group chats. Retrieved on January

25, 2018 from https://www.wired.com/story/whatsapp-security-flaws-encrypti on-group-chats/

Hollerith, David (November 6, 2017). Bitcoin Magazine. Survey polls American awareness of cryptocurrencies and ICOs. Retrieved on January 20, 2018 from

https://bitcoinmagazine.com/articles/survey-polls-america n-awareness-cryptocurrencies-and-icos/

Martin, Ellen (October 2017). The Next Web. Why more people will use blockchain -based payment platforms over banks in the future. Retrieved on January 18, 2018 from

https://thenextweb.com/contributors/20l7/09/07/blockchain -vs-banks/

Pascual, Al, Marchini, Kyle & Miller, Sarah (February 1, 2017). 2017 Identity Fraud: Securing the Connected Life. Retrieved on January 20, 2018 from https://www.javelinstrategy.com/coverage- area/2017 -identity -fraud

Perlroth, Nicole & Haag, Matthew (April 29, 2017). The New York Times. Hacker leaks episodes from Netflix show and threatens other networks. Retrieved on January 24, 2018 from htps://www.nytimes.com/20l7/04/29/business/media/netflix-hac k-orange-is-the-new-black.html

Pullen, John Patrick (November 21, 2017). Fortune Magazine. Jennifer Lawrence reveals why she didn’t sue Apple over her nude photo leak. Retrieved on January 24, 2017 from

htp://fortune.com/20l7/l l/2l/jennifer-lawrence-apple-lawsuit-nude-photo-leak/

Sabin, Dyani (January 3, 2018). Futurism. Everything you need to know about cryptocurrency and why it’s the future of money. Retrieved on January 17, 2018 from htps://futurism.com/cryptocurrency- future -money-bitcoin/

Sethi, Rahul (September 26, 2017). After Google and Facebook, WhatsApp banned in China. Retrieved on January 26, 2018 from htps://www.indiatoday.in/technology/news/story/after-google- and- facebook-whatsapp-banned-in-china-l052534-2017-09-26

Sherr, Ian (March 23, 2018). CNET. Facebook, Cambridge Analytics and data mining: What you need to know. Retrieved on March 26, 2018 from htps://www.cnet.com/news/facebook-cambridge- analytica-data-mining-and-trump-what-you-need-to-know/

Toronto Star (January 13, 2018). World News. As protests wane, Iran lifts ban on messaging app Telegram. Retrieved on January 24, 2018 from htps://www.thestar.com/news/world/20l8/0l/l3/as- protests-wane-iran-lifts-ban-on-messaging-app-telegram.html

WeChat (2018). WeChat Help Center. Why doesn’t my prior chat log appear when I log in to WeChat from a new device? Retrieved on January 26, 2018 from htps://help.wechat.com/cgi-bin/micromsg- bin/oshelpcenter?t=help_center/topic_detail&opcode=2& ;id=l208H7b2mai- 1410242meeYj &lang=en&plat=android&Channel=helpcenter

Yannik (June 26, 2017). Updated January 9, 2018. How long do Ethereum transactions take? Retrieved on February 1, 2018 from htps://support.metalpay.eom/hc/en-us/articles/H50003738l4-Ho w-long-do- Ethereum-transactions-take-

A