Abstract: Embodiments of the present invention provide a system for utilizing one or more decentralized applications to allow entities to interface with a blockchain for the purposes of conducting a resource transfer. Typically, the blockchain is a permissioned blockchain which may be accessed only by the entities involved in the resource transfer. The decentralized applications may communicate with the legacy systems within each entity through an application programming interface (API) such that the data stored on the legacy systems may be governed by the blockchain. This ensures the authenticity of the data stored on the legacy systems while preventing the possibility of disparate versions of data being created over time.
Abstract: Embodiments of the present invention provide a system for utilizing one or more decentralized applications to allow entities to interface with a blockchain for the purposes of conducting a resource transfer. Typically, the blockchain is a permissioned blockchain which may be accessed only by the entities involved in the resource transfer. The decentralized applications may communicate with the legacy systems within each entity through an application programming interface (API) such that the data stored on the legacy systems may be governed by the blockchain. This ensures the authenticity of the data stored on the legacy systems while preventing the possibility of disparate versions of data being created over time.
Abstract: Embodiments of the present invention provide a system for utilizing one or more decentralized applications to allow entities to interface with a blockchain for the purposes of conducting a resource transfer. Typically, the blockchain is a permissioned blockchain which may be accessed only by the entities involved in the resource transfer. The decentralized applications may communicate with the legacy systems within each entity through an application programming interface (API) such that the data stored on the legacy systems may be governed by the blockchain. This ensures the authenticity of the data stored on the legacy systems while preventing the possibility of disparate versions of data being created over time.