Resumen de: US20260012351A1
Systems and methods for building a trusted network of devices with intrusion detection system (IDS) using blockchain IoT (BIoT) technology are provided. The method includes registering an IoT device on a plurality of blockchain network channels. The plurality of blockchain network channels include an authentication channel, data channel, remote channel, and security channel connected to corresponding servers to perform dedicated operations such as device authentication, data management, remote operation/access control, and intrusion detection. On successful authentication, the IoT device is allowed to access, store and retrieve data stored on the blockchain. The blockchain ledger is updated after each data transaction and a new wallet identity or encrypted keys for the IoT device are issued after each transaction. The method further includes receiving an operational instruction from a front-end device and authenticating from the blockchain record, the wallet identity, user permissions and validity of operation's parameters based on an organization's policies.
Resumen de: US20260012350A1
The invention discloses a cross trusted authority identity authentication and message publishing method based on redactable blockchain, adopts a redactable blockchain based on chameleon hash function to replace the traditional blockchain, and the trusted authority can use the private key of the chameleon hash function to edit the block content on the blockchain, so that only legal, valid and timely information is stored on the blockchain. In addition, the trusted authority can also edit the vehicle authentication information stored on the blockchain, easily updating the vehicle information credentials or revoking the information credentials of illegal vehicles. In the process of authentication and key negotiation, cryptography tools are used to ensure the confidentiality, integrity and availability of messages, and can effectively resist various known attacks.
Resumen de: US20260012352A1
A system may include a remote server and an on-premises node. The server may receive a first set of parameters defining a blockchain operation. The server may generate an operation payload based on the parameters. The on-premises node may receive the operation payload from the computing server and decode the operation payload to extract a second set of parameters reflected in the operation payload. The on-premises node may compare the second set of parameters to the first set of parameters to determine whether the second set matches the first set. If the parameters match, the on-premises node may sign cryptographically the operation payload and transmit the operation payload to the computing server for the computing server to broadcast the operation payload to a blockchain to carry out the blockchain operation.
Resumen de: US20260012346A1
The invention belongs to the field of computer security and discloses a blockchain-based anonymous authentication method for the Internet of Vehicles across trusted authorities, including registering the vehicle (with onboard unit) and roadside unit in their respective trusted authorities. When the vehicle enters different trusted authority domains, both the onboard unit and roadside unit generate corresponding authentication parameters and transmit them to the consortium blockchain of the Internet of Vehicles for verification and signature, obtaining authenticated data signed by the consortium blockchain. The onboard unit and roadside unit receive and verify the authenticated data, and upon successful verification, the onboard unit calculates a session key. The onboard unit uses the session key to sequentially transmit data with the roadside unit and the consortium blockchain. This technical solution allows vehicles from any trusted authority domain to authenticate and negotiate session keys with roadside units from different trusted authority domains.
Resumen de: US20260012365A1
Provided in the embodiments of the present application are a consortium blockchain admission management method and apparatus. The method includes: for each first-level node which has a direct access control permission for a basic admission management component, in response to a hosting transaction, which is initiated by the first-level node toward the basic admission management component, the basic admission management component constructing a corresponding second-level institution contract; and when the second-level institution contract is in a cooperation mode, in response to a node admission transaction, which is initiated by an initial second-level node toward the second-level institution contract, adjusting second-level nodes, wherein each second-level node has an indirect access control permission for the basic admission management component and can join a blockchain network, and the second-level institution contract realizes multi-level node admission management by means of multi-level expansion.
Resumen de: US20260012339A1
A system and method for cryptographic decryption using deterministic collapse resonance based on the Total Wave Modified Schrödinger Equation (TWMSE). An encrypted problem state is encoded as a system wavefunction, while candidate solutions are represented as observer wavefunctions. A collapse field with tunable parameters ensures destructive interference cancels incorrect candidates and constructive resonance deterministically selects the correct solution. Unlike brute-force search or probabilistic quantum measurement, the method achieves decryption in a single engineered collapse. Hardware embodiments include optical photonic systems, neuromorphic processors, and resonant field architectures. Applications extend to RSA, Diffie-Hellman, elliptic curve cryptography, lattice-based post-quantum protocols, blockchain, and secure messaging frameworks. Proof-of-concept demonstrations on small instances, including factorization of $N=15$, illustrate feasibility at toy scale. Scaling to larger cryptosystems is envisioned through adaptive parameter control, resonance calibration, and experimental implementation.
Resumen de: WO2026010620A1
The information processing device is equipped with a blockchain associated with a storage unit set in a terminal owned by a user visiting from a first country using a first currency to a second country using a second currency, and a processor. The processor, upon receiving a request to charge a crypto asset of a first value in the first currency from the terminal, executes a storage process of determining the second value of the second currency equivalent to the first value based on the exchange rate between the first currency and the second currency, generating the crypto asset of the determined second value, and storing the transaction history of the crypto asset in the blockchain, and a notification process that notifies the terminal of the completion of the storage process and stores information related to the generated crypto asset in the storage unit.
Resumen de: AU2025267498A1
A method for conveying auditable information regarding provenance of a product that is cryptographically accurate while retaining complete anonymity of product and participant on a blockchain includes: receiving a product identifier; generating a 5 digital token by applying a hashing algorithm to the product identifier; generating an entry value by applying the hashing algorithm to a combination of an event identifier and the digital token; generating a digital signature by digitally signing a data package using a private key of a cryptographic key pair, where the data package includes at least a blockchain address, the event identifier, and the digital token; and transmitting 10 the blockchain address, the digital signature, and the entry value to a node in a blockchain network. blockchain network. ov o v
Resumen de: AU2025271453A1
Examples of the present disclosure describe systems/methods of reducing carbon footprint by generating and tracking a carbon intensity (CI) score assigned to a particular product as the product traverses through a processing plant and discrete steps in a supply chain. In some examples, intermediate CI scores may be assigned to the product as it completes each step in its life cycle. The intermediate CI scores may be aggregated to produce a final CI score. Each intermediate CI score is recorded on a blockchain, such that the CI score is independently verifiable and auditable. In other example aspects, a machine-learning model may be applied to the input data received from each supply chain stakeholder and CI scores, wherein the machine-learning model generates intelligent suggestions to stakeholders for how to tweak their processes to lower CI scores. In other examples, a CI score may be used to derive a value for a CI token. ov o v
Resumen de: US20260012349A1
A system for authenticating a sender of a response to an authentication request includes an authentication server, an identity server configured to receive biometric data of a user, a central ID system configured to create or receive a username and/or password, and a first user device associated with a first user. The first user device is configured to create a first user ID that includes at least a first username and a first biometric data. When an authentication request is sent to a user device by the authentication server the user device responds with a user ID. The authentication server then queries at least one or both of the central ID system and the identity server to certify the accuracy of the user ID to assure it matches the first user ID before (1) accepting the response, or (2) permitting the first user to access confidential information. The systems and methods may also include blockchain authentication or tuple space authentication.
Resumen de: WO2026006929A2
The invention relates to an identification module (1) for attaching to a physical product (18) and to a system for digitally verifying the authenticity of a physical product (18) using the identification module (1) and a blockchain (5). The identification module (1) has a transponder (2) which generates a transponder-specific physically generated PUF code (4). The transponder (2) is also configured to provide a communication with the blockchain (5) via the Internet using a blockchain communication interface (10). The PUF code (4) is combined with unique product information in order to form a blockchain-based security anchor (e.g. NFT) on a blockchain. After referencing the blockchain, a product-specific identification code correlating, at any time, to the physically generated PUF code (4) is thus produced in the blockchain. The product is authenticated in a user-friendly process, for example, via a verification platform (15) in the form of a browser-based web application. The exchange of data on the basis of the communication rule set facilitates, for example, the process of checking whether the PUF code stored on the blockchain matches a hash which is currently read by the transponder (and which should correspond to the PUF code). The web application then displays one of the possible results, e.g. "authentic", "manipulation risk", "forgery", in real time. The entire process is carried out solely on the browser without an app, without a wallet, and without a registration proc
Resumen de: GB2642380A
Claimed is a method of access control where the location 1003 of a device, possibly a cryptowallet, wishing to access data or a digital asset is determined and compared to a list of authorised locations 1005 such as buildings, work stations, or server racks, and access is granted if the device is in an authorized location 1007. The digital asset may be generated by or recorded in a blockchain, and may be cryptocurrency, medical or personal information, or a non-fungible token. The location from which access is requested may be stored in a blockchain ledger. Also disclosed is a location system, which may operate in real time, comprising a plurality of nodes that may use ultra-wide-band signals to determine the position of assets or devices. The nodes and their controller may authenticate one another, and a fingerprint of the location system may be stored in the blockchain to authenticate location determinations.
Resumen de: MX2025011753A
A computer system and method for storage and retrieval of multiple encrypted data. The system and method allow a user to first encryption data with a first key only held by the user such that the user solely possesses one of the necessary keys for later decryption of the stored and encrypted data. The firstly encrypted data is then doubly encrypted and stores the data in such a secure manner that the data can be stored on a public blockchain architecture, if desired. Full decryption of the original user data can only be performed with access to the user's initial key.
Resumen de: EP4675468A1
A system for authenticating a sender of a response to an authentication request includes an authentication server, an identity server configured to receive biometric data of a user, a central ID system configured to create or receive a username and/or password, and a first user device associated with a first user. The first user device is configured to create a first user ID that includes at least a first username and a first biometric data. When an authentication request is sent to a user device by the authentication server the user device responds with a user ID. The authentication server then queries at least one or both of the central ID system and the identity server to certify the accuracy of the user ID to assure it matches the first user ID before (1) accepting the response, or (2) permitting the first user to access confidential information. The systems and methods may also include blockchain authentication or tuple space authentication.
Resumen de: EP4675972A2
Computer-implemented methods for locking a blockchain transaction based on undetermined data are described. The invention is implemented using a blockchain network. This may, for example, be the Bitcoin blockchain. A locking node may include a locking script in a blockchain transaction to lock a digital asset. The locking script includes a public key for a determined data source and instructions to cause a validating node executing the locking script to verify the source of data provided in an unlocking script by: a) generating a modified public key based on the public key for the determined data source and based on data defined in the unlocking script; and b) evaluating a cryptographic signature in the unlocking script based on the modified public key. The blockchain transaction containing the locking script is sent by the locking node to the blockchain network. The lock may be removed using a cryptographic signature generated from a private key modified based on the data.
Resumen de: EP4675968A2
A computer-implemented method comprising receiving a transaction request from a first node within the plurality of nodes, the transaction request corresponding to a pending transaction between the first node and a second node; identifying a blockchain associated with the pending transaction, the blockchain including a first block instance having a hierarchy file indicating a hierarchy among the first node, the second node, and the third node; identifying a second block instance having an executable file to approve the transaction request received from the first node; executing the executable file, wherein the executable file is configured to retrieve data from a data source associated with the third node and analyze data to approve or deny the transaction request; and appending a third block instance comprising the set of transaction attributes to the blockchain.
Resumen de: EP4675536A1
Problem To verify which one of the distribution pieces of a secret key has been used to generate an electronic signature generated by the secret key.Solution An information processing device including: a distribution destination control unit that controls a plurality of distribution destinations for respectively storing a plurality of distribution pieces obtained by secretly distributing a secret key, on the basis of a selection by a user; a signature generation unit that generates an electronic signature by the secret key, by using part of the plurality of distribution pieces stored in the plurality of distribution destinations; a transaction issuance unit that issues a transaction, which is attached with the electronic signature, to a blockchain; and an audit unit that verifies which one of the plurality of distribution pieces has been used to generate the electronic signature attached to the transaction on the blockchain.
Resumen de: WO2026000708A1
The present application provides a virtual power plant aggregation management platform system and apparatus, and a networking method. The system comprises a user login module, an overview interface module, a device management module, a blockchain data aggregation and on-chain recording module, an energy trading module, a smart contract management module, and a personal information module.
Resumen de: WO2026000473A1
A computer-implemented method of reducing size of a blockchain. The method includes the steps of providing a series of data files; generating, at a time interval, a series of processed files based on filtering and/or aggregation of the series of data files; for each one of the series of processed files, computing a hash value; adding the hash values respectively to a blockchain as blocks; and storing the series of processed files off the blockchain. The proposed invention aims to develop methods to monitor and validate SLA on the blockchain. It facilitates the faster creation of network resource sharing in a 5G network and reducing the blockchain computational resources required.
Resumen de: WO2026000869A1
The present application is applicable to the technical field of blockchains. Provided are a consensus method and apparatus for a blockchain system. The consensus method comprises: in an (n+x2)th consensus round, referencing a plurality of proposal blocks, and combining same with the current transaction of a client, so as to generate a post-proposal block, wherein the plurality of proposal blocks are correspondingly generated by a plurality of validator nodes referencing a pre-proposal block in an nth consensus round, and the pre-proposal block is generated in an (n-x1)th consensus round; and using the post-proposal block as a certificate for the pre-proposal block, so as to reach a consensus on the pre-proposal block. By using the consensus method provided in the present application, it is unnecessary to transmit a large number of signature messages during a consensus process, instead, a reference relationship is established between blocks which are generated in different consensus rounds, so as to reach a consensus on a certain block. In this way, the overheads of transmitting and verifying signature messages during a consensus process are reduced.
Resumen de: WO2026000894A1
Provided in the present application are a blockchain-based large model training method, apparatus and device, and a storage medium. A blockchain comprises a central node and a plurality of consortium nodes, wherein each consortium node corresponds to one data terminal. The method comprises: a central node acquiring a pre-trained large model; acquiring an adapter module corresponding to the large model, and sending the adapter module to each consortium node; each consortium node adding the adapter module to a trusted execution environment; acquiring encrypted training data from a blockchain; in the trusted execution environment, decrypting the encrypted training data, and using decrypted training data to train fine-tuning model parameters of the adapter module, and uploading updated fine-tuning model parameters to the central node; the central node performing aggregation processing on the fine-tuning model parameters; and on the basis of aggregated fine-tuning model parameters, updating the pre-trained large model to obtain an updated large model until the updated large model converges.
Resumen de: WO2026006714A1
The disclosed system and method can manage real-time transactions using a blockchain ledger. A processor can create a fractionalized risk pool for a property, comprising asset tokens and an occupancy token. The processor can receive title information and can update the blockchain ledger with this information, a timestamp, and/or a property valuation. Upon receiving a transaction from a credit card network and/or issuing bank, the processor can determine a user's real-time equity.
Resumen de: WO2026003556A1
The invention relates to a storytelling AI Proof of Attendance (POAP) system that integrates digital and physical tokens to commemorate significant family events. The system includes a Koseki registration system, a ceremonial application on smart personal devices, and blockchain technology. A Kamon personalization engine allows users to create custom family crests, which are minted as NFTs representing attendance and participation. The system uses IPFS for secure storage and retrieval of autobiography media, ensuring data preservation. Smart contracts manage ongoing relationships, enabling family members to contribute and access ceremonial data. QR codes with embedded images link physical objects to digital records, facilitating easy verification and sharing on social media. The invention blends traditional family heritage with modern technology, fostering community and pride through meaningful, authenticated tokens that capture and preserve family histories.
Resumen de: WO2026003753A1
Systems and methods for transferring resources using dynamic grid curves are disclosed. A system receives a transfer request specifying an input resource type, a target resource type, an amount of input resources, and an identifier of a storage application associated with the user. The system determines a plurality of current transfer rates, each corresponding to a respective blockchain. The system may query each blockchain to determine an on-chain computation overhead for processing the transfer. Utilizing a maximal current transfer rate and the determined computation overhead, the system generates a grid curve representing the amount of target resources available for transfer as a function of time. The system transmits commands to the user device to display the grid curve and requests user validation for the transfer. Upon receiving user validation, the system transmits the grid curve and transfer request data to a plurality of approved operator devices for execution.
Nº publicación: WO2026002856A1 02/01/2026
Solicitante:
CHROMAWAY AB [SE]
CHROMAWAY AB
Resumen de: WO2026002856A1
Methods, dapps and nodes for managing a file are disclosed. A service node (120) receives (B210) the file. A file dapp (110) allocates (B150) the file by including an allocate file request, including a filehash of the file, as a transaction, on a "hubchain" of the file dapp (110). In response, the service node (120) splits the file into a plurality of chunks. The service node (120) sends (C210), to the file dapp (110), an allocate chunk request, comprising the filehash, and a respective chunkhash of each chunk. The file dapp (110) sends (C118), to the service node (120), a response indicating that the file dapp (110) has obtained the chunk dapp (140). The service node (120) sends (C232) said each chunk and a proof to the chunk dapp (140). On success, the chunk dapp (140) stores (C460) said each chunk in a block of a blockchain managed by the chunk dapp (140).