Abstract: |
A distributed ledger, e.g., blockchain, enabled operating environment includes a user device that accesses services of a service device by leveraging the decentralized blockchain. For example, a user device can lock/unlock a door (e.g., service device) by interfacing with a smart contract stored on the decentralized blockchain. The user device provides parameters, such as payment, that satisfies the variables of the smart contract such that the user device can access the service device. The service device regularly retrieves information stored in the smart contract on the decentralized blockchain. For example, the retrieved information can specify that the user device is authorized to access the service device or that the service device is to provide a service. Therefore, given the retrieved information, the service device provides the service to the user device. |
Inventor: |
Jentzsch, Christoph (Mittweida, DE); Jentzsch, Simon (Mittweida, DE); Tual, Stéphane (Twickenham, GB) |
Applicant: |
Slock.it GmbH (Mittweida, DE) |
Face Assignee: |
N/A |
Filed: |
2020-04-09 |
Issued: |
2020-10-01 |
Claims: |
21 |
|
US20200314095
|
21. A method comprising:
(0)
(7)
|
|
22. The method of claim 1, further comprising:
(0)
(3)
|
|
23. The method of claim 2, further comprising, further responsive to detecting that the expiration condition of the state channel has been met:
(0)
(1)
|
|
24. The method of claim 2, wherein verifying that the user device is authorized to access the service device based on the user identifier included in the signed message comprises:
(0)
(3)
|
|
25. The method of claim 4, wherein extracting the user identifier comprises:
(0)
(1)
|
|
26. The method of claim 1, wherein verifying that the electronically signed request satisfies a condition for access comprises:
(0)
(2)
|
|
27. The method of claim 1, wherein one or more parameters of the electronically signed request include one of a payment, availability dates, or availability times. (0)
|
|
28. The method of claim 1, wherein updates to the permission data structure are provided to one of the user device, the service device, or a proxy device to update the permission data structure. (0)
|
|
29. The method of claim 1, wherein a request of the plurality requests is to lock or unlock a device. (0)
|
|
30. A non-transitory computer readable storage medium comprising memory with instructions encoded thereon, the instructions, when executed, causing one or more processors to perform operations, the instructions comprising instructions to:
(0)
(7)
|
|
31. The non-transitory computer-readable medium of claim 10, the instructions further comprising instructions to:
(0)
(3)
|
|
32. The non-transitory computer-readable medium of claim 11, the instructions further comprising instructions to, further responsive to detecting that the expiration condition of the state channel has been met:
(0)
(1)
|
|
33. The non-transitory computer-readable medium of claim 11, wherein the instructions to verify that the user device is authorized to access the service device based on the user identifier included in the signed message comprise instructions to:
(0)
(3)
|
|
34. The non-transitory computer-readable medium of claim 13, wherein the instructions to extract the user identifier comprise instructions to:
(0)
(1)
|
|
35. The non-transitory computer-readable medium of claim 10, wherein the instructions to verify that the electronically signed request satisfies a condition for access comprise instructions to:
(0)
(2)
|
|
36. The non-transitory computer-readable medium of claim 10, wherein one or more parameters of the electronically signed request include one of a payment, availability dates, or availability times. (0)
|
|
37. The non-transitory computer-readable medium of claim 10, wherein
(0)
(1)
|
|
38. The non-transitory computer readable storage medium of claim 10,
(0)
(1)
|
|
39. A system comprising:
(0)
(2)
|
|
40. The system of claim 19, the operations further comprising:
(0)
(3)
|
|