Resumen de: US2025348469A1
A method for enhancing security, reliability, and efficiency of data quality management includes: receiving a plurality of data entries; executing a smart contract on a blockchain using the data entries as input, where the smart contract performs error correction on the data entries according to one or more predefined rules and analyzes the data entries for data quality, and, if the data quality is below a threshold value, generates and transmits a data quality report to an external computing system, or, if the data quality is above the threshold value, generates a new blockchain data entry that includes the data entries for storage on the blockchain; receiving changes or additions to the predefined rules; updating the predefined rules in the smart contract according to the changes or additions; and repeating execution of the smart contract with the updated predefined rules.
Resumen de: US2025348304A1
Disclosed are systems, methods, and media for using a secure dataloading system for updating an aerospace system. The secure dataloading system includes a communications module that is configured to communicatively couple the secure dataloading system to the aerospace system. The secure dataloading system also includes a processor that is configured a to access a software repository storing a secure software update having a unique hash ID to provide a copy of the secure software update to the aerospace system via the communications module. The processor can be configured to use a blockchain to validate the unique hash ID of the software update and, upon validation of the unique hash ID, install the secure software update on the aerospace system.
Resumen de: US2025348864A1
Systems, methods, and computer-readable media disclosed herein relate to reducing computation and computing resources for certain blockchain related transactions. Specifically, software algorithms and architecture allow some transactions to avoid the need for recordation on a blockchain, which can be computationally expensive both for a requesting device and for various nodes on the blockchain. Thus, a computer system may receive indications of incoming transactions transferring digital assets to particular user accounts, and in response to requests from user accounts, the computer system facilitates one or more internal transactions between those accounts. In response to a request from a particular internal user account, the computer system may perform an outgoing transaction transferring one or more digital assets to an external user account from one or more internal user accounts. The incoming transactions and outgoing transaction are recorded on the blockchain, but the internal transactions are recorded on an internal ledger rather than the blockchain, saving computational power and improving computer operations.
Resumen de: US2025348873A1
A method includes: generating a first transaction configured to spend a first blockchain object representing a first asset, spend a second blockchain object representing a second asset, and generate a state channel object associated with an initial virtual object representing an initial state; transmitting the first transaction to a distributed network for inclusion in a first block of a blockchain; generating a second transaction configured to spend the initial virtual object and generate a first virtual object representing a first state; generating a third transaction configured to spend the state channel object associated with a target virtual object representing a target state, generate a third blockchain object representing a third asset based on the target state, and generate a fourth blockchain object representing a fourth asset based on the target state; and transmitting the third transaction to the distributed network for inclusion in a second block of the blockchain.
Resumen de: US2025348617A1
Multi-layer ensembles of neural subnetworks are disclosed. Implementations can classify inputs indicating various anomalous sensed conditions into probabilistic anomalies using an anomaly subnetwork. Determined probabilistic anomalies are classified into remedial application triggers invoked to recommend or take actions to remediate, and/or report the anomaly. Implementations can select a report type to submit, or a report recipient, based upon the situation state, e.g., FDA: Field Alert Report (FAR), Biological Product Deviation Report (BPDR), Medwatch, voluntary reporting by healthcare professionals, consumers, and patients (Forms 3500, 3500A, 3500B, Reportable Food Registry, Vaccine Adverse Event Reporting System (VAERS), Investigative Drug/Gene Research Study Adverse Event Reports, Potential Tobacco Product Violations Reporting (Form 3779), USDA: APHIS Center for Veterinary Biologics Reports, Animal and Plant Health Inspection Service: Adverse Event Reporting, FSIS Electronic Consumer Complaints, DEA Tips, Animal Drug Safety Reporting, Consumer Product Safety Commission Reports, State/local reports: Health Department, Board of Pharmacy.
Resumen de: US2025348616A1
A system and method for constructing blockchain ledger of shared digital confidential information. The system comprising a blockchain ledger comprising a public access history of digital confidential information at a plurality of local ledgers; a database comprising the digital confidential information accessible by users having access credentials; a processor; and a non-transitory computer readable medium storing machine-readable instructions that when executed by the processor cause the processor to: initialize a transaction at a client node of the blockchain ledger, broadcast a transaction invocation request to a plurality of peer nodes, endorse the transaction at one or more peer nodes, submit the transaction to an order node, deploy a block comprising the transaction on a blockchain, wherein the transaction is properly ordered at the order node, broadcast the transaction to the plurality of peers, and update the plurality of local ledgers with the transaction block.
Resumen de: US2025348607A1
Methods and systems for processing a blockchain comprising a plurality of immutable insurance policy payment records corresponding to insurance policies are provided. According to certain aspects, a transaction request indicating a policy payment for an insurance policy may be received at a first node. A block including an insurance policy payment record indicating the policy payment may be added to a blockchain and transmitted to another node for validation. The first node may add the block to a copy of the blockchain, where the block may be identified by a hash value that references a previous block in the blockchain that includes at least one additional insurance policy payment record.
Resumen de: US2025350464A1
Computing systems are configured to provide a hierarchical organization of blockchain operations, efficiently storing recursive hashes that allow quick verification of received data and data state. Received data from authorized users in associated and stored by representation at a corresponding position in the hierarchy. The computer hashes and tokenizes received data with the hash and stores the same. Each token created is then separately hashed with time and creator into a listing of all such tokens within an object. Such re-hashing is reiterated up each hierarchy level and stored in the containing object. The lists of all hashes at each level can be used to verify a state or individual document that will be reflected in the stored listings is accurate or currently true. Additionally, user actions and histories, as well as state progression and history, can be queried and reported easily with the lists.
Resumen de: US2025350462A1
This present disclosure provides methods and apparatuses for preserving privacy of account data in a blockchain. In an implementation, a method includes: determining, in response to receiving a target transaction, whether the target transaction involves a private account, and executing the target transaction in a trusted execution environment in response to determining that the target transaction involves a private account, wherein account data of the private account is encrypted and is stored in a target storage space outside the trusted execution environment.
Resumen de: US2025350477A1
Systems and computer-implemented methods for freezing or unfreezing digital assets on a blockchain. A freeze administration service may send a signed freeze request to mining nodes, which maintain two blacklists of digital asset identifiers: a pending blacklist and a consensus blacklist. The digital asset identifiers may be transaction outpoints in some cases. If accepted by the mining node, the transaction outpoints in the freeze request are added to the pending blacklist, which causes rejection of any transactions using those outpoints, but does not cause rejection of any new blocks that include transactions using those outpoints. If a consensus threshold of acceptances is reached based on hash power, the request becomes an order and the outpoints are added to the consensus blacklist, which causes rejection of any transaction or block containing a transaction using those outpoints.
Resumen de: US2025350482A1
A method for communicating data between a first blockchain and a second blockchain includes: accessing a message identifier for a message associated with the second blockchain; accessing signatures representing detection of the message, containing a representation of the message identifier, in a block in the second blockchain by validator nodes for the first blockchain; generating a transaction including the signatures and configured to trigger a portal object to generate a message object, associated with the first blockchain, representing the message in response to detecting the signatures; and transmitting the transaction to a distributed network associated with the first blockchain for commitment in a block in the first blockchain.
Resumen de: US2025350474A1
The invention provides improved methods and systems for storing, sharing, accessing and processing data (content) on a blockchain. In one embodiment, there is provided a method of identifying a target transaction on a blockchain e.g. Bitcoin, comprising the steps of using a search path to identify the target transaction, the search path comprising: 1) a root transaction index (RTIndex) comprising a public key (RTPK) associated with the root transaction and an ID (RTID) associated with the root transaction; and 2) at least one attribute associated with the root transaction and/or the target transaction. This enables the creation and use of a search path analogous to that known in relation to the internet, but for the blockchain.
Resumen de: US2025350470A1
System and methods for physical authentication using blockchain technologies. A user list is encoded via hashes of respective wallet addresses to construct a Merkle Tree. The Merkle Root of the constructed Merkle Tree is recorded on the blockchain. The Merkle Tree and the Merkle Root are updated each time a user is added to the organization. A user is authenticated by submitting a message to the client, which creates a Merkle Proof and sends it to the blockchain for authentication. The process can be facilitated by a mobile application that generates a Quick Response (QR) code representing the user's wallet address.
Resumen de: US2025350463A1
Computing systems are configured to provide a hierarchical organization of blockchain operations, efficiently storing recursive hashes that allow quick verification of received data and data state. Received data from authorized users in associated and stored by representation at a corresponding position in the hierarchy. The computer hashes and tokenizes received data with the hash and stores the same. Each token created is then separately hashed with time and creator into a listing of all such tokens within an object. Such re-hashing is reiterated up each hierarchy level and stored in the containing object. The lists of all hashes at each level can be used to verify a state or individual document that will be reflected in the stored listings is accurate or currently true. Additionally, user actions and histories, as well as state progression and history, can be queried and reported easily with the lists.
Resumen de: US2025350481A1
Methods, systems, and devices for data management are described. A client application may receive an input to perform an action at a decentralized exchange. The client application may broadcast, via a blockchain network, messages configured to cause smart contracts on the blockchain network called by the decentralized exchange to verify whether a blockchain address associated with the input is authorized to perform the action at the decentralized exchange. In some examples, verifying may include checking a status managed by an entity different from the decentralized exchange. The smart contracts may perform the action after verifying that the blockchain address is authorized to perform the action, or the smart contracts may fail to perform the action after failing to verify that the blockchain address is authorized to perform the action.
Resumen de: US2025350475A1
A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.
Resumen de: US2025350297A1
A system and method for distributed node-based data compaction. The system uses machine learning on data chunks to generate codebooks which compact the data to be stored, processed, or sent with a smaller data profile than uncompacted data. The system uses a data compaction in an existing blockchain fork or implemented in a new blockchain protocol from which nodes that wish to or need to use the blockchain can do so with a reduced storage requirement. The system uses network data compaction across all nodes to increase the speed of and decrease the size of a blockchain's data packets. The system uses data compaction firmware to increase the efficiency at which mining rigs can computationally validate new blocks on the blockchain. The system can be implemented using any combination of the three data compaction services to meet the needs of the desired blockchain technology.
Resumen de: AU2024251148A1
A computer system and method for storage and retrieval of multiple encrypted data. The system and method allow a user to first encryption data with a first key only held by the user such that the user solely possesses one of the necessary keys for later decryption of the stored and encrypted data. The firstly encrypted data is then doubly encrypted and stores the data in such a secure manner that the data can be stored on a public blockchain architecture, if desired. Full decryption of the original user data can only be performed with access to the user's initial key.
Resumen de: WO2025235161A1
Methods, systems, and devices for data management are described. A client application may receive an input to perform an action at a decentralized exchange. The client application may broadcast, via a blockchain network, messages configured to cause smart contracts on the blockchain network called by the decentralized exchange to verify whether a blockchain address associated with the input is authorized to perform the action at the decentralized exchange. In some examples, verifying may include checking a status managed by an entity different from the decentralized exchange. The smart contracts may perform the action after verifying that the blockchain address is authorized to perform the action, or the smart contracts may fail to perform the action after failing to verify that the blockchain address is authorized to perform the action.
Resumen de: EP4648355A2
A token transaction comprising a first token output, the first token output comprising a first token locking script and a first token amount, wherein the first token locking script comprises a variable component and a constant component, wherein the variable component comprises a first payment address, embedded in a payment template, and wherein the constant component comprises a token mechanics sub-component.
Resumen de: GB2640819A
The invention provides an autonomous system for airside autonomous baggage vehicles whereby commands, such as baggage dolly move from location to baggage hall, can be verified to confirm the request originates from a trusted source. A number of nodes can verify the request, and a consensus can be formed, i.e. if a total number of yes votes exceeds a threshold. If each node keeps a local blockchain then all verified requests can be added. The invention comprises comparing 204 a candidate trusted value received with a request with a trusted value stored at each node of the plurality of nodes, generating 205 a yes vote if the candidate trusted value matches the trusted value stored at a respective node, and verifying 208 the request if the number of yes votes across the plurality of nodes exceeds a predetermined threshold. Trusted values may be a hash of data contained within a preceding request. Each node of the plurality of nodes may store the series of requests on a local blockchain stored on that node, with verified requests added to the local blockchain as they are verified.
Nº publicación: EP4647996A2 12/11/2025
Solicitante:
NCHAIN LICENSING AG [CH]
nChain Licensing AG
Resumen de: EP4647996A2
A computer-implemented method comprises creating, at a node in a blockchain network, a first transaction, wherein the first transaction includes a first output having a first spendable value and a first locking script and a second output having a second spendable value and a second locking script. A first set of constraints on a first selected transaction output is included in the first locking script, wherein the first set of constraints are to be met by a first unlocking script if the first selected transaction output is to be valid for spending the first spendable value. A second set of constraints on a second selected transaction output is included in the second locking script, wherein the second set of constraints are to be met by a second unlocking script if the second selected transaction output is to be valid for spending the second spendable value. The first set of constraints or the second set of constraints imposes a constraint on a locking script of a spending transaction having as a spending transaction output the first selected transaction output or the second selected transaction output.