Absstract of: US20260025659A1
Methods and systems are provided for assigning one or more Virtual Network Function (VNF) instances, or slices, to devices, and for monitoring each change of state associated with the slices. Embodiments include applying an Advanced Security Control (ASC) protocol to verify devices for each request for access to a slice, to establish a zero trust measurement with respect to a network, such as a 5G network. In embodiments, a blockchain is associated with each slice and stored in a distributed ledger, for example to allow rapid access to network slice and device information if a slice will be re-instantiated.
Absstract of: US20260025287A1
A method includes: generating a set of output entries based on a set of initial entries; identifying a matching pair of entries in the set of output entries; generating a first forward-propagated entry in a second set of entries based on the first matching pair of entries; identifying a second matching pair of entries in the second set of entries; identifying a group of initial entries associated with the second matching pair of entries; extracting a subset of bits, in a set of target bits, from each initial entry in the group of initial entries; generating a second forward-propagated entry—representing a proof fragment—in a third set of entries in a third table by encrypting the set of target bits; generating a plot file representing a set of tables including the third table; and storing the plot file.
Absstract of: US20260025271A1
The disclosed technology teaches a method for managing user access to one of a set of decentralized networked nodes that share a private permissioned blockchain data structure or a decentralized personal ledger, to which access has been limited to users authorized by one of the set of decentralized networked nodes.
Absstract of: US20260025286A1
A computer-implemented method includes collecting information respective of one or more transactions stored on a public blockchain, determining that a first private account hosted by the computing system is associated with a first transaction of the one or more transactions, determining that a second private account hosted by the computing system is associated with a second transaction of the one or more transactions, associating the first private account with the second private account based on a connection of the first transaction to the second transaction on the public blockchain, and training a machine learning model according to the association of the first private account with the second private account.
Absstract of: US20260025272A1
A blockchain application builder generates a fractional NFT application for managing a fractional NFT in a blockchain platform based on a specification data structure. The specification data structure specifies a set of token properties and a set of token behaviors for a fractional NFT. The set of token properties includes a number of shares of the fractional NFT that can be owned by users of the blockchain platform. The fractional NFT application is deployed in the blockchain platform to manage a lifecycle of the fractional NFT.
Absstract of: US20260024084A1
Embodiments include systems and methods for transacting and evolving digital assets received in a distributed ledger based “loot-box” or “gacha” system. In an embodiment, a blockchain computer system for computationally evolving digital assets and controlling digital asset transactions includes a blockchain computer network and an embedded virtual machine (VM). The blockchain computer network is configured to process transactions of digital assets. The embedded virtual machine (VM) is configured to decode, via a decoder, a smart contract on the blockchain computer network. The smart contract is configured to, based on at least one user activity value, computationally evolve at least one digital asset. The smart contract is further configured to control, based on at least one threshold criterion, at least one transaction of a computationally evolved digital asset of the at least one digital asset on the blockchain computer network.
Absstract of: US20260024080A1
Embodiments include systems and methods for generating, evolving, and transacting digital assets in a producer and player gaming ecosystem platform. In an embodiment, a blockchain computer system for generating and computationally evolving digital assets includes a blockchain computer network and an embedded virtual machine (VM). The network is configured to process transactions of digital assets. The VM is configured to decode, via a decoder, a smart contract on the network. The contract is configured to implement digital asset generation and core user activity mechanisms. In an embodiment, the platform may be configured with a hero ascension loop that enables players to earn hero shards via play-to-earn performance (P2E). Players may trade or use shards to ascend. In an embodiment, the platform may be configured with a gear loop that enables player to earn gear shards via P2E. Players may trade or use shards to buy/evolve gear originally minted by producers.
Absstract of: WO2026019731A1
Systems and methods here may be used to secure data for use in AI systems training datasets, machine learning model metadata, and contextual metadata for advanced AI models via a hybrid blockchain backend. The AI systems data is stored via a private blockchain and then utilizes an orchestration event management system to filter and store specific information on a public blockchain. The important AI systems data will then be stored via a smart contract mechanism that is version controlled and immutable. This way AI systems data can be properly traced, securely stored, and properly managed by incorporating blockchain technology.
Absstract of: AU2024299241A1
The disclosed systems and methods are directed to streamlining and enhancing feasibility of identity assertion in an online environment (e.g., distributed reputation network). The systems and methods facilitate conversion of user-specific data stored on a contactless card into a verified and/or authenticated identity token, via an application of NFC-enabled encrypted authentication process customized for optimizing identity assertion in block-chain network (e.g., association of reputation data blocks in a blockchain reputation network to a unique user-controlled identifier). The systems and methods leverage the proofed identity that can be generated by the encrypted authentication process initiated by a contactless card and stored thereupon for on-demand NFC transmission via a reader, to streamline generation of a user-specific authenticated digital identity token conforming with a self-sovereign identification model.
Absstract of: AU2024325778A1
A method for fraud scoring a cryptographic currency transaction using multiple data sets and graphical modeling includes: receiving transaction data for a plurality of fiat currency based payment transactions from a first computing system; receiving transaction data for a plurality of cryptographic currency based blockchain transactions from a second computing system; receiving node connectivity data for a blockchain network from a third computing system; generating a fraud detection model based on the node connectivity data including generating a graphical representation of the node connectivity data; receiving transaction data for a new blockchain transaction from a computing device; generating a fraud score for the new transaction using the fraud detection model, the transaction data for the fiat currency based transactions, and the transaction data for the cryptographic currency based transactions; and transmitting the generated fraud score to the computing device.
Absstract of: WO2026017061A1
The present application relates to the technical field of blockchains, and discloses a data processing method and apparatus, a device, a storage medium, and a product. The method comprises: receiving an additional issuance request for a first non-fungible token (NFT) sent by a user; on the basis of whether the additional issuance request carries a second NFT, determining whether the user has an additional issuance permission, wherein the second NFT is the first NFT comprising digital watermark information conforming to a preset format; if the user has the additional issuance permission, in response to the additional issuance request, using the second NFT to mint the first NFT; and uploading the first NFT to a blockchain.
Absstract of: US20260024087A1
Methods and systems for preventing geographically unauthorized blockchain transactions are discussed herein. Participants in a blockchain provide information during an onboarding process to identify a geographic location associated therewith. During the onboard, a geographic key is assigned to the participant based on their geographic location. When a new proposed blockchain transaction is submitted, the geographic keys associated with the participants are identified. If the geographic keys match, which indicates that the participants are associated with the same geographic location, then the transaction is authorized and goes through a standard blockchain approval process. If the geographic keys do not match, indicating that the participants are in different geographic locations, then a check is performed to determine if the transaction can proceed using a smart contract, which determines if there are any sanctions or other regulations preventing the transaction from taking place between the participants in the associated geographic locations.
Absstract of: US20260024139A1
A method may include: receiving a request to deposit an encrypted amount of deposit tokens from an institutional investor; generating a stealth address for the institutional investor; encrypting claims for the institutional investor; posting the encrypted claims to an encrypted claims result smart contract, wherein the encrypted claims are mapped to the stealth address on a privacy-preserving blockchain; establishing the encrypted amount of deposit tokens on-chain at the stealth address; receiving an encrypted amount of a first fund and an encrypted amount of a second fund from the stealth address; and atomically transferring the encrypted amount of the first fund and the encrypted amount of the second fund to the stealth address, and deposit tokens for the encrypted amount of the first fund and the encrypted amount of the second fund to a fund manager for the first fund and a fund manager for the second fund, respectively.
Absstract of: US20260023823A1
Systems and methods for managing media, such as digital content, using block chain technology are described. In some embodiments, the systems and methods perform multiple digital currency transfers between address nodes to register a collection of rights to a digital content item to a block chain, and perform a digital currency transfer transaction between address nodes to register the collection of rights to the block chain.
Absstract of: WO2026019962A1
A method includes: generating a set of output entries based on a set of initial entries; identifying a matching pair of entries in the set of output entries; generating a first forward-propagated entry in a second set of entries based on the first matching pair of entries; identifying a second matching pair of entries in the second set of entries; identifying a group of initial entries associated with the second matching pair of entries; extracting a subset of bits, in a set of target bits, from each initial entry in the group of initial entries; generating a second forward-propagated entry - representing a proof fragment - in a third set of entries in a third table by encrypting the set of target bits; generating a plot file representing a set of tables including the third table; and storing the plot file.
Absstract of: AU2024281481A1
The present disclosure relates to a quantum-analogue proof-of-work consensus method for use in a blockchain network. The method comprises: receiving a plurality of verification data obtained using a boson sampling experiment associated with a candidate block, from a plurality of different miners of the blockchain network. Each verification data may be associated with a different miner, and wherein each miner performs the boson sampling experiment using at least some information comprised in the candidate block. The method may comprise analysing the received plurality of verification data to determine if a consensus has been achieved; and adding the candidate block to a blockchain associated to the blockchain network when consensus is achieved.
Absstract of: CN120917706A
Embodiments utilize singular value decomposition (SVD) to provide improved techniques for generating, processing, controlling, transmitting, and/or implementing blockchain-based tokens and other assets. Such tokens may include, but are not limited to, non-homogenized tokens (NFTs). In one possible embodiment, an SVD-based digital asset is created by applying SVD to one or more existing digital assets (e.g., one or more images). In an alternative approach, the SVD-based digital assets may be created from an artificially built SVD rather than based on any one or more existing digital assets. Embodiments are also provided for securely, cryptographically transferring digital assets and tokens between parties, and for improving the storage and processing of such assets and tokens, particularly when stored/processed on a blockchain account book.
Absstract of: CN120917706A
Embodiments utilize singular value decomposition (SVD) to provide improved techniques for generating, processing, controlling, transmitting, and/or implementing blockchain-based tokens and other assets. Such tokens may include, but are not limited to, non-homogenized tokens (NFTs). In one possible embodiment, an SVD-based digital asset is created by applying SVD to one or more existing digital assets (e.g., one or more images). In an alternative approach, the SVD-based digital assets may be created from an artificially built SVD rather than based on any one or more existing digital assets. Embodiments are also provided for securely, cryptographically transferring digital assets and tokens between parties, and for improving the storage and processing of such assets and tokens, particularly when stored/processed on a blockchain account book.
Absstract of: WO2024192315A1
A computer-implemented method comprising receiving a first plurality of event requests each corresponding to a pending event, the pending event corresponding to a transfer of a digital asset between blockchains; appending a seller block instance to a blockchain for each of the first plurality of event requests, each seller block instance comprising a different seller set of event attributes of the first plurality of event requests; receiving a second plurality of event requests; appending a buyer block instance to the blockchain for each of the second plurality of event requests, each buyer block instance comprising different a buyer set of event attributes of the second plurality of event requests; and responsive to a seller set of event attributes from a seller block instance matching a buyer set of event attributes from a buyer block instance corresponding to the seller block instance, appending a match block instance to the blockchain.
Absstract of: WO2024188822A1
The invention relates to a method for a confidential payment between a sender and a recipient, the method being characterised in that it comprises: - a step of obtaining a set of data comprising a number of electronic tokens to be generated, an electronic address of a transaction smart contract and a plurality of bank electronic addresses, each bank electronic address being associated with a parameter, the sum of the parameters corresponding to the cost of the payment divided by the number of electronic tokens; and, for each bank electronic address from the plurality of bank electronic addresses - a first step of sending a generation request to generate electronic tokens to the bank electronic address, the generation request comprising the at least one number of electronic tokens, the at least one electronic address of the transaction smart contract and the at least one parameter associated with the bank electronic address.
Absstract of: KR20260009727A
적어도 하나 이상의 노드를 포함하는 블록체인 네트워크를 이용하는 시스템에 있어서, 상기 적어도 하나 이상의 노드는 해시 노드(Hash Node) 및 풀 노드(Full Node)을 포함하고, 기 블록체인 네트워크의 블록은 데이터에 대한 메타-데이터가 기록되어 있고, 상기 메타-데이터는 상기 데이터에 대응되는 키(key)값에 대응되는 해시 필드(Hash Field), 데이터의 변경 또는 삭제 여부를 보여주는 상태 필드(Status Field) 및 데이터의 만료시점을 보여주는 만료 필드(Expired Field)를 포함하고, 상기 해시 노드는 상기 블록체인 네트워크의 블록을 저장하고, 상기 풀 노드는 상기 블록체인 네트워크의 블록 및 상기 메타-데이터에 대응되는 데이터를 저장하는, 시스템.
Absstract of: KR20260009728A
이하 설명하는 기술은 적어도 하나 이상의 노드를 포함하는 블록체인 네트워크를 이용하는 시스템을 개시한다. 상기 적어도 하나 이상의 노드는 해시 노드(Hash Node) 및 풀 노드(Full Node)을 포함할 수 있다. 상기 해시 노드는 메타-검증 합의(Meta-verification consensus, MVC)를 수행하고 상기 풀 노드는 블록-생성 합의(Block-creation consensus, BCC)를 수행할 수 있다. 상기 메타-검증 합의(MVC)는 소유자 노드(Owner Node)로 부터 전송 받은 새로운 데이터에 대한 트랜잭션을 상기 적어도 하나 이상의 노드에 브로드캐스팅(Broadcasting) 한 후, 집합 서명(Collective signature)을 생성하기에 충분한 서명수가 만족되면 상기 집합 서명을 상기 새로운 데이터에 대한 트랜잭션에 추가한 뒤, 상기 새로운 데이터에 대한 트랜잭션을 트랜잭션 풀(Mempool)에 저장하는 과정을 포함할 수 있다.
Nº publicación: KR20260008958A 19/01/2026
Applicant:
인천대학교산학협력단
Absstract of: KR20260008958A
본 발명의 실시예는 (A) 의료 이미지를 전처리 및 증강하는 단계; (B) 블록체인 네트워크를 통해 상기 전처리 및 증강된 의료 이미지를 CNN 모듈에 제공하는 단계; (C) 상기 CNN 모듈에서 상기 전처리 및 증강된 의료 이미지를 분류하여 감염 여부 판단 결과를 생성하는 단계; (D) Grad-CAM을 이용하여, 상기 판단 결과를 시각화하는 단계; (E) 상기 블록체인 네트워크를 통해 상기 시각화된 판단 결과를 이해관계자에게 제공하는 단계;를 포함하는, 인공지능 및 블록체인을 이용한 의료 데이터 공유 방법 및 스마트 헬스케어 시스템을 제공한다.