Resumen de: US2025193030A1
Proposed are a method and a system for proving the integrity of blockchain data by using anchoring technology that includes data recorded in a blockchain into another blockchain. The method includes providing external data for electronic notarization, generating and distributing a block, where the external data is recorded, by a blockchain network and an audit network respectively, determining that the ledger information is forged on the basis of a plurality of ledger information after clustering the plurality of ledger information from a plurality of node devices in the blockchain network, providing audit ledger information, whose integrity is proven, to the blockchain network as a first ledger information by the audit network in the response to the determination, and generating and distributing a block, where the first ledger information is recorded, on the basis of the first ledger information by the blockchain network.
Resumen de: US2025193033A1
A multi-layer method and system for providing secure storage with data immutability and verified integrity. The system implements a unique multi-layer node, polling server, consensus layer, and master distributed ledger design, with each node containing individual encrypted distributed ledgers aggregated into a singular block by each polling server. Each polling server output is evaluated in the consensus for validity and added to the master distributed ledger design. The present invention increases security by encrypting sensitive data in intermediary polling and validation steps, protecting integrity of data while maintaining chronological time series data and auditability compared to existing database systems and distributed ledger technology.
Resumen de: AU2025203696A1
Blockchain latency is improved by unclogging a mempool, which frees up electronic memory and reduces CPU usage and network bandwidth. Mining data of one or more initial blocks of a blockchain is accessed. The mining data reveals, for each miner, the time delay between individual transactions mined by that miner. A subset of miners is then determined to have lower time delays than miners not in the subset. Thereafter, a different random number is generated for each new block of the blockchain system to be mined. Based on a comparison of this random number and a predefined threshold, either an exploitation phase or an exploration phase is entered for the mining of each new block. In the exploitation phase, mining tasks are assigned only to the subset of the miners. In the exploration phase, mining tasks are assigned to both miners within the subset and miners not in the subset.
Resumen de: AU2023270357A1
The Unity social media platform facilitates user engagement with local representatives through a mobile and web application. Users are incentivized for regular interactions on the platform through the allocation of UnityCoin, a digital currency. The criteria for earning UnityCoin will be periodically determined and modified by the Unity platform. The digital currency is supported by blockchain technology and a robust cryptographic algorithm to ensure traceability. UnityCoin can be utilized for various transactions within the platform, including the purchase of advertisement space, contributions to charitable causes, and other in-app acquisitions. The Intrinsic value of a Unity coin will be determined by the below formula: = 1 here Y(U) n(u) y(u) represents Value of one unity coin, g(t1 ) represents the intrinsic value added by trigger t,, and n (U) represents number of Unity coins mined The function g(ti) will have different formulae for each trigger to represent the value it adds to Unity. For example, in the example, when the trigger is adding a problem voice, then intrinsic value it adds is: gt =C(x) -C'(x) When the trigger is continuous self-improvement using Unity Assistant, the intrinsic value it adds is: g(t) =n (Ua) X ag X E where n (Ua) represents number of Daily Active Users interacting with Unity assistant, 'avg represents Average Interaction score as calculated by Unity Assistant, and E represents self-improvement constant as defined by Unity platform Figure 1
Resumen de: US2025193026A1
A computer-implemented method comprising: obtaining information describing a property; dividing the information into at least two data items describing the property at at least two different levels of precision; obtaining a set of data items for generating a Merkle tree, the set of data items including the at least two data items; generating two or more leaf nodes of a Merkle tree by hashing each data item in the set of data items, wherein the Merkle tree comprises a plurality of leaf nodes including the two or more leaf nodes; and storing at least one of: the Merkle tree; instructions for generating the Merkle tree from the set of data items.
Resumen de: US2025193012A1
Proposed are a method and a system for auditing for forgery, capable of auditing for forgery of ledger information with high reliability by using a plurality of audit committees having different proof algorithms. The method includes clustering a plurality of ledger information from a plurality of node devices in a blockchain network for electronic notarization, verifying the forgery of the plurality of ledger information by an audit network by identifying a discrepancy between the plurality of ledger information and responding to the discrepancy, and generating a block for updating ledger information of the plurality of node devices on the basis of the verification results.
Resumen de: US2025193024A1
A computer-implemented method comprising, at a verifying nodes of a blockchain network: obtaining a first transaction which comprises runnable code; receiving a second transaction which includes information comprising at least a submitted instance of an r-part and an s-part of a first ECDSA signature, and further comprising a nonce; and running the code from the first transaction. The code is configured to verify that HPoW(ƒ(r,d)) meets a predetermined condition defined in the code, and to return a result of true on condition thereof, where r is the submitted instance of the r-part, d is the nonce, HPoW is a hash function, and f is a function combining q and d.
Resumen de: US2025193031A1
The present invention discloses a method for private set intersection in a smart city system, a device, and a storage medium. According to the present invention, a threshold secret sharing technology is adopted to share a private set among three parties, so that an intersection cardinality is hidden and security of private set intersection is improved. Before two parties perform the private set intersection, a blockchain is used to verify identities of the two parties, which protects security of data of the two parties to a certain extent. In addition, according to the present invention, the private set is divided into a plurality of subsets with labels, which implements an interaction manner with finer granularity. Therefore, compared with a private set intersection solution in a previous smart city system, the present invention is greatly improved in practicability, security, and other aspects.
Resumen de: US2025193023A1
This application provides an identity verification method, a related apparatus, and a medium. The identity verification method includes: receiving a target declaration issuance request from an object terminal; performing authentication on a target attribute, and generating a target declaration after the authentication succeeds; generating a first tree; and transmitting the target declaration to the object terminal, to cause the object terminal to transmit, when receiving a verification request of a verification device for the target attribute, the target declaration and first bypass nodes of a first path in the first tree to the verification device for first verification. In embodiments of this application, identity verification efficiency and security of object identity information can be improved. The embodiments of this application can be applied to various scenarios such as data security, a blockchain, data storage, and information technologies.
Resumen de: US2025193013A1
A computer implemented method for verifying a policy proof includes receiving request from a user for a policy, issuing a random challenge nonce, receiving a triple comprising a first genesis state of the user, a zero-knowledge proof of the policy based at least in part on the first random challenge nonce, an account address corresponding to the user, and user data, and a signature of the zero-knowledge proof of the policy, verifying the zero-knowledge proof of the policy based at least in part on the account address of the user, the first random challenge nonce, and one or more states of the user, storing the zero-knowledge proof and the policy identifier in a decentralized storage, publishing the account address corresponding to the user, the policy identifier, and a content identifier to one or more blockchain ledgers.
Resumen de: US2025193037A1
Disclosed in the present invention are an asynchronous blockchain consensus method and system with decoupled data broadcast and consensus, an electronic device and a storage medium. The system comprises a plurality of nodes, wherein the nodes may be co-served by a plurality of mutually trusted physical or virtual devices. The method comprises: data broadcast and data sequential consensus are decoupled, wherein the nodes jointly maintain a plurality of broadcast protocol instances and a Byzantine consensus protocol; broadcast protocols are responsible for transmitting data at a certain node to other nodes, the Byzantine consensus protocol is responsible for reaching a consensus on results of the plurality of broadcast protocol instances; and in the nodes, the plurality of broadcast protocol instances can be maintained by a plurality of devices in an one-to-one correspondence mode, and execution results of the broadcast protocols are transmitted to devices responsible for executing the Byzantine consensus protocol in the nodes. The present invention can be implemented to improve the efficiency of a blockchain system, and additionally, to more conveniently improve system efficiency by increasing physical resources.
Resumen de: US2025193239A1
A computing platform may train a machine learning model to detect and analyze threat actor activities. The computing platform may generate dynamic honeypotted files and deploy the generated dynamic honeypotted files as adaptive defenses to threat actors in a computing environment. The computing platform may adapt to threat actor activities based on analyzed behavior of the threat actor and any identified tools used by the threat actor to gain access to the computing system. Threat actor activities may be written to a blockchain to publicly record all transactions related to a threat actor's activities for analysis and generation of adaptive defenses to threat actor attacks. The computing platform may cause redirection of the threat actor into a specific computing environment through generation and deployment of dynamic honeypotted files.
Resumen de: US2025190606A1
The present disclosure relates to managing content data access. In particular, the present disclosure relates to a method and a system for managing electronic access to content data, as well as a computer program product and a computer-readable medium. Further in particular, the present disclosure relates to providing a robust and long-living content access methodology, and further preventing reuse of an access to specific content data, e.g., preventing reuse of a playlist to access content data or of an access token used to access the content data. Accordingly, there is provided a method for managing electronic access to content data, comprising requesting access to content data of a content provider, wherein the access is requested by transmitting an access token, wherein information on the access token is stored in and is retrievable from a blockchain, and wherein the validity of the access token to access said content data is verifiable with said stored information from the blockchain, retrieving said information on the access token, verifying validity of the access token using the retrieved information to determine authorization to access said content data, transmitting content data access information to said content data to the user after verifying the authorization to access said content data, wherein the content data is secured by a content data access key, transmitting user access key information to the content provider, receiving content data access key information
Resumen de: US2025190628A1
Proposed are a method and a system for auditing for the forgery of ledger information with respect to a neural consensus-based blockchain network that performs a non-competitive random consensus proof. The method includes clustering a plurality of ledger information from a plurality of node devices in the blockchain network for electronic notarization, verifying the forgery of the plurality of ledger information by at least one audit node by identifying a discrepancy between the plurality of ledger information, and by responding to the discrepancy, and generating a block for updating the ledger information of the plurality of node devices on the basis of verification results for the plurality of ledger information.
Resumen de: US2025190629A1
A blockchain-based data processing method including: acquiring a resource consumption task including an initiating object address and a target resource identifier; calling, according to the resource consumption task, a resource consumption function, and determining, based on the resource consumption function, a holding object address holding a target virtual resource in the blockchain, the target virtual resource referring to a virtual resource represented by the target resource identifier; consuming, according to the initiating object address and the holding object address, the target virtual resource to obtain a transaction execution result of the resource consumption task; and broadcasting a resource consumption event corresponding to the transaction execution result to a service device corresponding to the initiating object address, so as to make the service device perform, on a target item, service processing associated with the resource consumption event, the target virtual resource being configured for representing ownership of the target item.
Resumen de: WO2025122437A1
Blockchain identity proofing via federation protocols is disclosed. A method may include: receiving, at a digital wallet application for a financial institution on a customer electronic device, a customer login from a customer; receiving, by the digital wallet application and from the customer, a request for an assertion, wherein the request redirects a session with the digital wallet application to a financial institution backend via a financial institution website or a financial institution application using a federation protocol; authenticating, by the financial institution backend, the customer; confirming, by the financial institution backend, the assertion using verified customer information in a verified customer information database; redirecting, by the financial institution backend, the session to the digital wallet application; returning, by the financial institution backend and using the federation protocol, the assertion to the digital wallet application; and writing, by the digital wallet application, the assertion to a distributed ledger.
Resumen de: WO2025120235A1
The invention proposes a blockchain maintenance method that allows to reduce the memory footprint and the overall maintenance cost of a blockchain. Each block contains transaction data with an associated expiration date, and the proposed method only removes a block if all transactions of that block have an expired expiration date at a given time.
Resumen de: WO2025120074A1
Methods, devices, and data structures for processing large volumes of transactions in blockchain nodes. Solutions are provided for transaction clean-up following receipt of a block announcement from another node. In one example, transaction identifiers in a list matching the local candidate block are marked if they match transaction identifiers in the announced block and, once the block is validated, the block assembly service uses unmarked transaction identifiers to build the new candidate block. In other examples, a candidate database of transaction identifiers is built during the mining phase and TxIDs are marked with an array identifier or a node identifier as arrays are announced by other nodes on the network. This may speed clean-up once the block is announced and reduces memory footprint for carrying out the post-solution marking of TxIDs as being included in the solved block.
Resumen de: WO2025119852A1
The solution of the present invention is based on using a blockchain structure to design a platform for authenticating a user terminal seeking to register with a core network operated by a telecommunications operator with which the user of the user terminal has subscribed to a service plan. More particularly, the present solution is based on delegating certain authentication operations from a user terminal to a third-party service interfacing the structure of the blockchain with at least one radio access network, or RAN, and a plurality of core networks, in order to guarantee the integrity and authenticity of the user terminal authentication process, in particular in a context of pooling the RAN among a plurality of entities which may or may not include the telecommunications operator with which the user of the user terminal has subscribed to a service plan.
Resumen de: WO2025119607A1
Methods, devices, and data structures for processing large volumes of transactions in blockchain nodes. Solutions are provided for transaction clean-up following receipt of a block announcement from another node. In one example, transaction identifiers in a list matching the local candidate block are marked if they match transaction identifiers in the announced block and, once the block is validated, the block assembly service uses unmarked transaction identifiers to build the new candidate block. In other examples, a candidate database of transaction identifiers is built during the mining phase and TxIDs are marked with an array identifier or a node identifier as arrays are announced by other nodes on the network. This may speed clean-up once the block is announced and reduces memory footprint for carrying out the post-solution marking of TxIDs as being included in the solved block.
Resumen de: WO2025119666A1
A computer implemented method of enabling verification of presence of a data item on a blockchain is disclosed. First data comprising a Merkle proof (h1, h2, h3, h4, h5, h6) of second data representing at least one input and/or output (t) of a blockchain transaction is generated and stored. Third data is published on a blockchain, wherein the third data comprises at least one data item (tp) used in generating the Merkle proof.
Resumen de: WO2025119082A1
The present application belongs to the technical field of communications, and discloses a blockchain-based tracing method and system for service node switching. The method comprises: constructing a blockchain network; when a user moves from a signal coverage range of a first base station to a signal range of a second base station, recording service node switching information by means of the first base station; using the first base station as a user node in the blockchain network to submit the service node switching information to the blockchain network; broadcasting a consensus message to the blockchain network by means of a main node in the blockchain network; performing independent verification on the consensus message by means of a replica node in the blockchain network, and when the verification is successful, continuing forwarding the consensus message to other nodes; voting by means of a plurality of consensus nodes, and when more than the preset proportion of consensus nodes cast approval votes, reaching a consensus and adding the consensus message into a blockchain; and querying in the blockchain network to trace a service node switching record of a target user.
Resumen de: WO2025122996A1
Embodiments are directed toward a blockchain system including a global state and an assemblage of blocks, each block representing a collection of state transformation records, each state transformation record describing a state transformation performed on the global state, where preceding blocks referenced by any given block contain state transformation records describing state transformations performed on the global state prior to the evaluation of the given block, and where at least one state transformation record is a zero-knowledge transformation record encoding a zero-knowledge state transformation description, which zero-knowledge transformation record comprises at least the following elements: paths identifying the locations of the elements of a discrete data subset, a revised data subset, and a transition proof implemented as a non-interactive zero-knowledge proof, which transition proof proves that the transition from the discrete data subset to the revised data subset follows the established rules of the blockchain system.
Resumen de: WO2025123054A1
Blockchain synchronization and point-of-sale integration systems are provided in a packet-switched computer network. The POS interfaces through the network with a consumer smartphone and a blockchain validation device. The POS shares a session identifier with the blockchain validation device by transmitting a graphic encoding of a payment request and the session identifier to the smartphone. The camera of the smartphone is configured with an image of the graphical encoding. A payment instruction is encoded to conform to the payment request including the session identifier and is transmitted to the blockchain validation device. The blockchain validation device performs a verification of the correctness and authenticity of the payment instruction encoded in the data record. The POS device receives a confirmation that the correctness and authenticity of the payment instruction encoded in the data record to confirm it has been verified.
Nº publicación: WO2025122521A1 12/06/2025
Solicitante:
AVA LABS INC [US]
AVA LABS, INC
Resumen de: WO2025122521A1
Various aspects of the subject technology relate to systems, methods, and machine-readable media for improving the privacy of transfers in a distributed ledger. Various aspects may include encrypting a transaction using a first public key corresponding to a first user and a second public key corresponding to a second user. Aspects may also include transmitting the encrypted transaction to a blockchain, the encrypted transaction including at least an encrypted amount, a zero-knowledge proof, and an encrypted balance of the first user. Aspects may also include verifying a correctness of the zero-knowledge proof. Aspects may also include, based on the correctness, executing the transaction through a smart contract of the blockchain and homomorphically updating encrypted balances of the first user and the second user in accordance with the encrypted amount.