Absstract of: US2025148434A1
Provided are a blockchain-based payment control method, a payment control apparatus, a device and a medium. The method includes: verifying a payment request for a securities account initiated by a requester, where the payment request includes a payment amount and a payee; in response to the payment request passing the verification, performing fund deduction on the securities account based on the payment amount, deducting a quota corresponding to the payment amount from a payment quota corresponding to the requester, and instructing an auxiliary payment platform to transfer the payment amount to the payee; transferring funds corresponding to the payment quota to the auxiliary payment platform to generate a transaction result; and verifying the transaction result through a smart contract and uploading data generated during the payment to a blockchain in response to the transaction result passing the verification.
Absstract of: US2025148465A1
A method for performing a medical transaction using a hyperledger, the method including receiving, from a computing device associated with a medical personnel entity, a request to perform the medical transaction between the medical personnel entity and a patient entity, where the medical personnel entity is associated with a medical personnel node and the patient entity is associated with a patient node, and a respective copy of the hyperledger is maintained at both the medical personnel node and the patient node. The method includes identifying a transaction in the hyperledger that stores an authorizing credential of the medical personnel entity, determining whether to allow the medical transaction to be performed based on at least the authorizing credential of the medical personnel entity, and responsive to determining to allow the medical transaction to be performed, updating the respective copy of the hyperledger with the medical transaction.
Absstract of: US2025148454A1
A secure transfer system where a wallet is generated utilising a public and private key pair; whereby the private key of the key pair is encrypted; whereby the public key of the key pair and the encryption key for the private key are given to a party to a transaction; and the other party receives the encrypted private key and the public key of the transfer wallet; where a copy of the encrypted private key, the public key and the encryption key used to encrypt the private key are placed in storage. Also described is a multi sig implementation.
Absstract of: US2025148460A1
A computer implemented method for time-locking a blockchain transaction. The method comprises computing a solution to a time-lock puzzle using a set of secret puzzle parameters. The time-lock puzzle is solvable using a set of puzzle parameter in a time equal to or greater than a minimum solving time. The set of puzzle parameters does not comprise the secret puzzle parameters. The method further comprises generating a transaction encryption key K, encrypting the blockchain transaction using the encryption key K, and encrypting the transaction encryption key K using the solution to the time-lock puzzle.
Absstract of: US2025148438A1
A network-based service creates a smart contract on a blockchain on behalf of a user who has a loan or a subscription that requires installment payments be collected by a provider from the user and provided to creditor of the loan or subscription. The smart contract associates a default account of the user with a first access token and non-default registered other accounts of the user with a second access token. The smart contract when presented with the access tokens from a provider determines whether the payment due can be satisfied from a current balance of the default account and if so, transfers the payment from the default account to the provider. If the default lacks sufficient funds for the payment, the smart contract proportions the amounts taken from each of the accounts to reach the amount due and transfers the amount due to the provider.
Absstract of: US2025148471A1
A security detection method and apparatus for decentralized finance of a blockchain. The security detection method includes the following steps: step S1, acquiring a malicious transaction call flow and collecting related smart contracts; step S2, constructing a control flowchart of the related smart contracts and simulating a call relation to connect an association graph; step S3, collecting data flow paths in the association graph and verifying path accessibility; step S4, constructing a data set by the collected accessible paths and inputting the data set into a DeFiTail model for training; and step S5, monitoring whether there is a malicious behavior in a transaction through the trained DeFiTail model. When the method is used, in all blockchains compatible with an Ethereum virtual machine, smart contract attack pattern detection at a bytecode level is implemented.
Absstract of: US2025148483A1
A system, method and process for product authentication and verification using Near Field Communication (NFC) technology, blockchain technology (Hyperledger), and cryptography. A unique product identifier is generated for a unique individual product, incorporated into a data structure, and the data structure is recorded to a blockchain initiating an immutable record for the unique product identifier. An NFC tag is encoded with a tap-unique URL comprising the unique product identifier and a cryptographic output and affixed to the product. Each time the tag is tapped by a proximity coupling device, a web client operating on the proximity coupling device opens the URL whereupon the tag is verified using a cryptographic verification process and generating a verification result. The verification result is recorded on the blockchain ledger for the unique product identifier, thereby creating an immutable record of each tap interaction result.
Absstract of: US2025148249A1
A method of controlling assignment and management of identities in ambient electromagnetic power harvesting (AEPH) chips. The method comprises allocating a plurality of unique AEPH identities by an AEPH management application executing on a computer system, receiving a plurality of requests by the AEPH management application to update a state associated in a blockchain with the unique AEPH identity identified in each request; determining by the AEPH management application that the blockchain is to be terminated; adding by the AEPH management application a terminal block to the blockchain; receiving a request by the AEPH management application to update a state associated with a unique AEPH identity in the blockchain; and sending a request rejection by the AEPH management application to the affiliated device that sent the request to update the state associated with the unique AEPH identity in the blockchain after the terminal block was added to the blockchain.
Absstract of: US2025148118A1
Content data is registered in a file management system, an identifier of a user in the file management system is registered in blockchain data, and a right-holder terminal includes a permission request receiving unit that receives, from the file management system, permission request data for the content including an identifier of the user, a verification unit that verifies that the identifier of the user registered in the blockchain data corresponds to the identifier of the user included in the permission request data, and an permission issuing unit that transmits, to the file management system, permission data for permitting a use of the content by the user.
Absstract of: US2025148117A1
Content data is registered in a file management system, an identifier of a user in the file management system is registered in blockchain data, and a right-holder terminal includes a permission request receiving unit that receives, from the file management system, permission request data for the content including an identifier of the user, a verification unit that verifies that the identifier of the user registered in the blockchain data corresponds to the identifier of the user included in the permission request data, and an permission issuing unit that transmits, to the file management system, permission data for permitting a use of the content by the user.
Absstract of: US2025148116A1
Content data is registered in a file management system, an identifier of a user in the file management system is registered in blockchain data, and a right-holder terminal includes a permission request receiving unit that receives, from the file management system, permission request data for the content including an identifier of the user, a verification unit that verifies that the identifier of the user registered in the blockchain data corresponds to the identifier of the user included in the permission request data, and an permission issuing unit that transmits, to the file management system, permission data for permitting a use of the content by the user.
Absstract of: US2025147804A1
A method performed by a constraint internet of things (IoT) device for enabling a decentralized block chain of a plurality of constraint IoT devices, may include: creating a virtual resource pool by collecting resources of the plurality of constraint IoT devices connected in the decentralized block chain; creating a plurality of virtual nodes corresponding to the plurality of constraint IoT devices, wherein the virtual resource pool is accessible by the plurality of virtual nodes; receiving at least one first request to be executed by at least one other constraint IoT device; assigning the at least one first request to the at least one of the plurality of virtual nodes corresponding to the at least one other constraint IoT device; and allocating at least a portion of resources from the virtual resource pool to the at least one of the plurality of virtual nodes.
Absstract of: US2025150473A1
A system includes a plurality of computing nodes that form a blockchain network, wherein one or more of the computing nodes is a metaverse computing node configured to generate a mixed reality environment. A processor of at least one computing node is configured to receive information relating to a suspicious data interaction associated with a data file of a user, simulate, based on the received information, the suspicious data interaction in a synthetic mixed reality environment that is substantially identical to the mixed reality environment, verify the suspicious data interaction while the simulated data interaction is being performed. When the suspicious data interaction cannot be verified, the processor disables one or more future data interactions processed using the same smart contract used to process the suspicious data interaction, and when the suspicious data interaction is successfully verified, terminates the simulated data interaction and process the suspicious data interaction.
Absstract of: US2025150279A1
A method comprising receiving a transaction request to print a genetic sequence, the transaction request including an account and a key, a state of the account managed by a blockchain where a plurality of copies of the blockchain include a state of the account; retrieving a stored key associated with the account; authenticating the transaction request based on the stored key and the transaction request key; determining a state of the account in a first copy of the blockchain is the same as in at least a second copy of the blockchain; validating the transaction request based on the determining a state of the account in a first copy of the plurality of copies of the blockchain is the same as in at least a second copy of the plurality of copies of the blockchain; and authorizing the transaction request based on the authentication and validation of the transaction request.
Absstract of: US2025150276A1
Computerized apparatus using characterized devices such as memories for intensive computational applications such as blockchain processing. In one embodiment, the computerized apparatus comprises a computational appliance (e.g., stand-alone box, server blade, plug-in card, or mobile device) that includes characterized memory devices. These memory devices are associated with a range of performances over a range of operational parameters, and can be used in conjunction with a solution density function to optimize memory searching. In one embodiment, the ledger appliance can communicate with other ledger appliances to create and/or use a blockchain ledger so as to facilitate decentralized exchanges between untrusted parties. In some variants, the ledger appliance may additionally use an application programming interface (API) to dynamically generate blockchains on the fly. Various other applications are also described (e.g., social media, machine learning, probabilistic applications and other error-tolerant applications).
Absstract of: US2025150441A1
Systems and methods for uses and/or improvements to blockchain and blockchain technology, particularly to provide a scalable solution to the aforementioned security and privacy concerns. As one example, systems and methods are described herein for a double-layer restriction subnet architecture that overcomes the technical limitations of conventional blockchains, whether public or permissioned, and subnets thereof. The double-layer restriction subnet architecture comprises a series of permissioned subnets, which provides both the security/privacy benefits of permissioned blockchains but also the scalability of subnet efficiency.
Absstract of: US2025150286A1
The invention provides improved methods and corresponding systems for the sharing, storage, creation and accessing of data stored on a blockchain e.g. the Bitcoin blockchain. It may form part of a protocol for searching the blockchain for content/data. A method in accordance with the invention may be used for associating or linking data stored within (separate/different) blockchain transactions to enable the identification, retrieval and/or sharing of data stored therein. Additionally, or alternatively, it facilitates identification of transactions (TX) in a blockchain which store content/data that needs to be shared, transmitted, stored and/or accessed by a user. Such a method comprises the step of mapping a mnemonic to: 1) a public key (PK) associated with the transaction (TX); and 2) the transaction ID (TXDD) of the transaction (TX).
Absstract of: US2025150288A1
Disclosed is a method of executing an accelerated instruction in a blockchain system including executing, by a virtual machine on a blockchain network, a first smart contract, calling, by the first smart contract, a second smart contract related to the accelerated instruction, requesting, by the second smart contract, execution of a first algorithm related to the accelerated instruction from one or more sub-nodes, acquiring, by the second smart contract, an execution result of the first algorithm from the one or more sub-nodes, and returning, by the second smart contract, the execution result of the first algorithm to the first smart contract.
Absstract of: US2025150280A1
Embodiments disclosed herein describe a proof of majority block consensus method based upon a mutually enforced collaboration between the nodes. A node may maintain a random subset of connected peer nodes, refreshed at every epoch through network gossiping protocols. The node may propagate received transactions to selected peers in the random subset. The node may generate a transaction ballot from received transactions and iteratively update the transaction ballot by mutual exchanges with other nodes until the network converges. The node may generate a block- and a hash thereof-based upon its understanding of the transaction ballot. The node may also receive hashes from other connected nodes and identify a hash generated by the majority of peer nodes. If the node determines that its own hash is the one generated by the majority of peer nodes, the node may update its local copy of the blockchain by appending its block.
Absstract of: US2025150290A1
The present disclosure provides methods and systems for distributed and/or parallel processing of data records, and in particular mining of blockchain transactions in a blockchain block, and further still for generation of a Proof-of-Work (PoW) for a blockchain block. Advantageously, embodiments allow for separation of the PoW calculation from other blockchain mining/validation tasks. Preferably, a PoW requester sends a specialist PoW provider one or more of: i) a Merkle root for a Merkle tree that represents a set of transactions ii) a control transaction (TX0) and iii) a Merkle proof which confirms that TX0 is included in the set of transactions. TX0 may provide or comprise control data that the PoW provider can use to determine whether or not performance of the PoW calculation is to be performed or completed.
Absstract of: US2025150291A1
A resource processing method, including: receiving a first cross-chain proof transmitted by a node on a first blockchain, the first cross-chain proof carrying a first resource transfer record that has been uploaded to the first blockchain, a plurality of first blocks existing in the first blockchain, a plurality of second blocks in one-to-one correspondence with the plurality of first blocks existing in the second blockchain; verifying validity of the first resource transfer record based on the feature tree root feature of each second block header in the second blockchain to obtain a first verification result; and in response to the first verification result indicating a pass of the verification, unlocking and transferring out a second resource determined according to the first resource, from a second preset account in the second blockchain that corresponds to the first preset account.
Absstract of: WO2025093286A1
Methods, devices, and a data structure for processing large volumes of transactions in blockchain nodes without using a mempool. Incoming transactions are validated and added to a candidate block. Transaction identifiers are added to an ordered set of transaction identifiers in an array until complete. The completed array and its Merkle root are propagated to other nodes. A placeholder transaction may be used in the first array in place of a coinbase transaction and its Merkle path may be determined to enable replacement of the placeholder transaction by the coinbase transaction during mining. Subsequent arrays are appended to the consolidated list of transaction identifiers are they are completed to continuously build a growing candidate block for mining.
Absstract of: WO2025093389A1
The present invention relates to a packaging collecting process comprising the steps of providing a packaging with an embedded crypto token value comprising a serialized code, one or more packaging scanning devices able to scan the serialized code, the packaging scanning devices being connected to a token transfer system for transferring token or part of token to a user or users of the packaging collecting process, and wherein the token transfer system comprising a blockchain smart contract with a token block use function. The serialized code may be printed on or embedded in the packaging.
Absstract of: WO2025091600A1
A consensus method in a blockchain system, a blockchain node, and a blockchain system. The blockchain system comprises a first node and a plurality of second nodes. The method comprises: the first node acquiring a first transaction from a transaction pool, broadcasting the first transaction in the blockchain system, generating a consensus proposal in parallel along with the broadcasting of the first transaction, wherein the consensus proposal comprises a transaction identifier of the first transaction, and sending the consensus proposal to other blockchain nodes; after receiving the consensus proposal, each second node determining whether the first transaction is received; and when it is determined that the first transaction is received, participating in the consensus of the consensus proposal.
Nº publicación: WO2025091331A1 08/05/2025
Applicant:
SHENZHEN XIN AN DIGITAL TECH CO LTD [CN]
\u6DF1\u5733\u5E02\u4FE1\u5B89\u6570\u5B57\u79D1\u6280\u6709\u9650\u516C\u53F8
Absstract of: WO2025091331A1
Provided are a blockchain-based group transaction method, system and apparatus, and a computer-readable storage medium. A group comprises a plurality of group participants registered to transmission nodes of a transmission network and a group receiver deployed at a specified transmission node, and the method comprises: the group participants send transaction requests to the group receiver by means of the transmission network; the group receiver performs global consistency ordering on received group information and publishes the group information to the group in order, the group information comprising the transaction requests and transaction matching results; a group executor among the group participants acquires the transaction requests published to the group, executes transaction matching programs in order, to obtain the transaction matching results, and sends the transaction matching results to the group receiver by means of the transmission network; and the group participants acquire the transaction matching results published to the group, and execute transaction settlement on a blockchain network on the basis of the transaction matching results. Online transactions that are safe, fair, fast and low-cost are achieved.