Search

US-20260127586-A1 - SYSTEMS AND METHODS FOR TRAVERSING DISTRIBUTED LEDGER DATA STRUCTURE FOR GENERATING DECENTRALIZED CREDIT SCORE DATA OBJECTS

US20260127586A1US 20260127586 A1US20260127586 A1US 20260127586A1US-20260127586-A1

Abstract

A blockchain / distributed ledger based approach for traversing distributed ledger data structures for generating cryptographically verifiable presentation data objects is proposed herein. The approach can be utilized as a mechanism for using a combination of cryptographically generated verifiable credential data objects with cryptographically generated verifiable presentation data objects, verifying characteristics of a user or a computational process, such as whether a user is a graduate of a particular educational institution, whether the user has a transaction history that warrants a score greater than a threshold, or whether the user has sufficient access credentials to access a controlled resource. Zero knowledge proofs are proposed as a mechanism for generating verifiable proofs to protect sensitive verifiable credential data objects. The score can be generated using a black box machine learning model.

Inventors

  • Wei Ming Zhuang
  • Renyuan Tan
  • Junbao Duan
  • Fei Pang

Assignees

  • HSBC SOFTWARE DEVELOPMENT (GUANGDONG) LIMITED

Dates

Publication Date
20260507
Application Date
20251219
Priority Date
20241231

Claims (20)

  1. 1 . A computer implemented method for interfacing with a blockchain node to traverse a distributed ledger data structure for generating a signed verifiable credential token data object usable for credit score estimation, the method comprising: receiving, at the blockchain node, a request data message from a user to interface with a verifiable credential generation computational process configured to generate a de-centralized, self-managed identity certificate for a public key wallet address corresponding to the user, the verifiable credential generation computational process coupled with a signing authority private key stored thereon that is not accessible by any external processes used for signing the de-centralized, self-managed identity certificate; traversing, by the verifiable credential generation computational process executing a block explorer process, the distributed ledger data structure to identify a quantity of data objects stored on the distributed ledger data structure corresponding to the public key wallet address and a plurality of confirmed transactions corresponding to the public key wallet address; upon a determination that the quantity of the data objects stored on the distributed ledger data structure corresponding to the public key wallet address is greater than a pre-defined threshold and that there is a continuous pattern in the plurality of confirmed transactions corresponding to the public key wallet address greater than a pre-determined duration of time, generate, by the verifiable credential generation computational process data object, a verifiable credential token data object having at least an expiry time field digitally signed using the signing authority private key; and outputting the signed verifiable credential token data object for storage, the signed verifiable credential token data object being configured for downstream electronic transmission as a component of a verifiable presentation data object to a verifier computing system that is configured to verify the verifiable credential token data object against both the expiry time field and a signing authority public key that corresponds to the signing authority private key, and upon a successful verification of the verifiable presentation data object, the expiry time field and the signing authority public key, the verifier computing system is configured to permit access to a controlled resource.
  2. 2 . The method of claim 1 , wherein the verifiable credential generation computational process is instantiated as an interactive smart contract data object persisted on a blockchain virtual machine providing a decentralized virtual environment for executing state change code consistently across distributed ledger data structures stored on corresponding blockchain nodes, the interactive smart contract data object automatically causing block traversal of transaction records associated with the public key wallet address generating the signed verifiable credential token data object that is stored locally on local memory of a portable computing device associated with the user, and the portable computing device includes one or more electronic transmitters that transmit the signed verifiable credential token data object to the verifier computing system during a physical transaction.
  3. 3 . The method of claim 1 , wherein the signed verifiable credential token data object further includes one or more data fields each representing one or more data values associated with the quantity of the data objects or the plurality of confirmed transactions, and wherein the verifier computing system is further configured to modify access to the controlled resource based upon the one or more data values.
  4. 4 . The method of claim 3 , wherein the modified access to the controlled resource based upon the one or more data values includes the verifier computing system automatically adjusting one or more values associated with parameters of a proposed electronic transaction, the parameters including at least one of a loan amount, an interest rate, eligibility for modified service options.
  5. 5 . The method of claim 3 , wherein the modified access to the controlled resource based upon the one or more data values includes the verifier computing system automatically injecting additional user interface paths into a user interface flow data structure controlling the rendering of user interface screens on a user interface coupled to the verifier computing system.
  6. 6 . The method of claim 3 , wherein the modified access to the controlled resource based upon the one or more data values includes the verifier computing system automatically removing additional user interface paths from a user interface flow data structure controlling the rendering of user interface screens on a user interface coupled to the verifier computing system.
  7. 7 . The method of claim 1 , wherein the verifier computing system is configured for offline verification through storing, on local data storage of the verifier computing system, the signing authority public key of the verifiable credential generation computational process.
  8. 8 . The system of claim 2 , wherein the verifier computing system is configured for online verification through retrieving, from the smart contract data object, the signing authority public key by querying a public address persisted by the smart contract data object.
  9. 9 . The method of claim 8 , wherein a transaction request data message from a user to interface the verifier computing system includes both the verifiable credential token data object and a pointer to the public address persisted by the smart contract data object.
  10. 10 . The method of claim 3 , wherein the verifiable credential generation computational process is configured to privately store or access a risk model for generating the one or more data values associated with the quantity of the data objects or the plurality of confirmed transactions.
  11. 11 . A computer implemented system adapted for interfacing with a blockchain node to traverse a distributed ledger data structure for generating a signed verifiable credential token data object usable for credit score estimation, the system comprising: a computer processor operating in conjunction with computer memory and non-transitory computer data storage, the computer processor configured to: receive, at the blockchain node, a request data message from a user to interface with a verifiable credential generation computational process configured to generate a de-centralized, self-managed identity certificate for a public key wallet address corresponding to the user, the verifiable credential generation computational process coupled with a signing authority private key stored thereon that is not accessible by any external processes used for signing the de-centralized, self-managed identity certificate; traverse, by the verifiable credential generation computational process executing a block explorer process, the distributed ledger data structure to identify a quantity of data objects stored on the distributed ledger data structure corresponding to the public key wallet address and a plurality of confirmed transactions corresponding to the public key wallet address; upon a determination that the quantity of the data objects stored on the distributed ledger data structure corresponding to the public key wallet address is greater than a pre-defined threshold and that there is a continuous pattern in the plurality of confirmed transactions corresponding to the public key wallet address greater than a pre-determined duration of time, generate, by the verifiable credential generation computational process data object, a verifiable credential token data object having at least an expiry time field digitally signed using the signing authority private key; and output the signed verifiable credential token data object for storage, the signed verifiable credential token data object being configured for downstream electronic transmission as a component of a verifiable presentation data object to a verifier computing system that is configured to verify the verifiable credential token data object against both the expiry time field and a signing authority public key that corresponds to the signing authority private key, and upon a successful verification of the verifiable presentation data object, the expiry time field and the signing authority public key, the verifier computing system is configured to permit access to a controlled resource.
  12. 12 . The system of claim 11 , wherein the verifiable credential generation computational process is instantiated as an interactive smart contract data object persisted on a blockchain virtual machine providing a decentralized virtual environment for executing state change code consistently across distributed ledger data structures stored on corresponding blockchain nodes, the interactive smart contract data object automatically causing block traversal of transaction records associated with the public key wallet address generating the signed verifiable credential token data object that is stored locally on local memory of a portable computing device associated with the user, and the portable computing device includes one or more electronic transmitters that transmit the signed verifiable credential token data object to the verifier computing system during a physical transaction.
  13. 13 . The system of claim 11 , wherein the signed verifiable credential token data object further includes one or more data fields each representing one or more data values associated with the quantity of the data objects or the plurality of confirmed transactions, and wherein the verifier computing system is further configured to modify access to the controlled resource based upon the one or more data values.
  14. 14 . The system of claim 13 , wherein the modified access to the controlled resource based upon the one or more data values includes the verifier computing system automatically adjusting one or more values associated with parameters of a proposed electronic transaction, the parameters including at least one of a loan amount, an interest rate, eligibility for modified service options.
  15. 15 . The system of claim 13 , wherein the modified access to the controlled resource based upon the one or more data values includes the verifier computing system automatically injecting additional user interface paths into a user interface flow data structure controlling the rendering of user interface screens on a user interface coupled to the verifier computing system.
  16. 16 . The system of claim 13 , wherein the modified access to the controlled resource based upon the one or more data values includes the verifier computing system automatically removing additional user interface paths from a user interface flow data structure controlling the rendering of user interface screens on a user interface coupled to the verifier computing system.
  17. 17 . The system of claim 11 , wherein the verifier computing system is configured for offline verification through storing, on local data storage of the verifier computing system, the signing authority public key of the verifiable credential generation computational process.
  18. 18 . The system of claim 12 , wherein the verifier computing system is configured for online verification through retrieving, from the smart contract data object, the signing authority public key by querying a public address persisted by the smart contract data object.
  19. 19 . The system of claim 18 , wherein a transaction request data message from a user to interface the verifier computing system includes both the verifiable credential token data object and a pointer to the public address persisted by the smart contract data object.
  20. 20 . A non-transitory computer readable medium, storing computer interpretable instructions, which when executed by a computer processor, cause the computer processor to execute a computer implemented method for interfacing with a blockchain node to traverse a distributed ledger data structure for generating a signed verifiable credential token data object usable for credit score estimation, the method comprising: receiving, at the blockchain node, a request data message from a user to interface with a verifiable credential generation computational process configured to generate a de-centralized, self-managed identity certificate for a public key wallet address corresponding to the user, the verifiable credential generation computational process coupled with a signing authority private key stored thereon that is not accessible by any external processes used for signing the de-centralized, self-managed identity certificate; traversing, by the verifiable credential generation computational process executing a block explorer process, the distributed ledger data structure to identify a quantity of data objects stored on the distributed ledger data structure corresponding to the public key wallet address and a plurality of confirmed transactions corresponding to the public key wallet address; upon a determination that the quantity of the data objects stored on the distributed ledger data structure corresponding to the public key wallet address is greater than a pre-defined threshold and that there is a continuous pattern in the plurality of confirmed transactions corresponding to the public key wallet address greater than a pre-determined duration of time, generate, by the verifiable credential generation computational process data object, a verifiable credential token data object having at least an expiry time field digitally signed using the signing authority private key; and outputting the signed verifiable credential token data object for storage, the signed verifiable credential token data object being configured for downstream electronic transmission as a component of a verifiable presentation data object to a verifier computing system that is configured to verify the verifiable credential token data object against both the expiry time field and a signing authority public key that corresponds to the signing authority private key, and upon a successful verification of the verifiable presentation data object, the expiry time field and the signing authority public key, the verifier computing system is configured to permit access to a controlled resource.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS This application claims priority to and the benefit of Chinese Application No. 202411999844.1, filed December 31, 2024, the contents of which are incorporated into the present application by reference. FIELD Embodiments of the present disclosure relate to the field of cryptographic data object generation, and more specifically, embodiments relate to systems and methods for traversing distributed ledger data structures for generating cryptographically verifiable presentation data objects. INTRODUCTION A challenge with the credit rating process of traditional credit institutions arises in relation to the difficulty of consolidating and modelling user data in non-uniform data formats from various platforms as the different data formats require complex cleaning of the user data, which consumes manpower and material resources. Furthermore, because the user data is stored on various platforms (e.g., data relating to vehicle ownership, real estate rights, intellectual property, etc.), it is difficult for users to directly use all the data as each platform may have permission restrictions that prevent users from using the data in other applications, resulting in users losing control over the user data that should belong to them. For example, data from various asset platforms, such as the user’s vehicle ownership information and real estate rights, will be in different data formats than the user’s social identity data (e.g., educational background, work background, etc.) and would be difficult to consolidate for modelling the user’s credit status. Some third-party payment platforms have built their own credit systems, the main data sources of which come from transaction data generated by the platforms themselves, as well as some additional asset liability data and interpersonal relationships data related to users within the platform’s service ecosystem that are used for modelling and assessing users’ credit status. However, these systems have a limited application range and it is difficult to be widely applied to broader situations. A potential reason for the deficiencies of these traditional approaches is limitations in the data sources used to obtain user data which cannot fully reflect and represent the credit status of users. SUMMARY A blockchain / distributed ledger based approach for traversing distributed ledger data structures for generating cryptographically verifiable presentation data objects is proposed herein. The approach can be utilized in practical implementations as a mechanism for using a combination of cryptographically generated verifiable credential data objects with cryptographically generated verifiable presentation data objects, which are used to verify characteristics of a user or a computational process, such as whether a user is a graduate of a particular educational institution, whether the user has a transaction history that warrants a score greater than a threshold, or whether the user has sufficient access credentials to access a controlled resource. Verifiable presentation data objects can be generated or transmitted automatically in response to or triggered by verification request data request messages, such as by an incoming message from a verifier device requesting verification. A verifier device, for example, could be a payment terminal that provides student discounts, or the payment terminal could be configured to modify a user interface flow based different credit options that may be made available, for example, if the user’s credit score is greater than a particular threshold. Alternatively, the system, instead of serving a user, may also be utilized to generate verifiable presentation data objects that are used for determining whether a process has sufficient computing process permissions to be able to access a virtual controlled resource. In this example, a computing process may have a verifiable credential data object that provides access level 5 generated by a certificate authority, and a verifiable presentation data object is generated when the process is interrogated for permissions before access. The approach described herein provides a computational mechanism that serves as a unified identity management system that is represented using cryptographic data objects, and the verifiable proofs that are generated can be used for carrying out transactions, obtaining access to specific features only available to individuals with elevated credentials or permissions. As an applied, non-limiting use case, the data architecture provided herein, for example, can be used to evaluate the credit of the user’s unified identity, and a verifiable credit certificate can be issued to the user. This credit certificate can also be used in other systems, providing users with differentiated services based on credit levels. DESCRIPTION OF THE FIGURES In the figures, embodiments are illustrated by way of example. It is to be expressly understood that the de