Resumen de: US20260073068A1
A consent block is a type of block that may be stored in a blockchain. Each consent block has an owner and may store an owner consent contract, i.e., a smart contract containing owner-specified access rules that determine who may access data assets that are stored in other blocks of the blockchain and owned by the same owner. The consent block may alternatively store a global consent contract containing global access rules that supersede owner-specified access rules. The consent block also stores a hash value determined from the consent contract and a previous hash value of the block immediately preceding the consent block. The consent contract and the position of the consent block in the blockchain are verifiable from the hash value. Each consent block, once added to the blockchain, becomes part of the immutable record of data stored in the blockchain, and therefore leaves an auditable trail.
Resumen de: US20260074561A1
A system and method are disclosed for AI-orchestrated multi-source renewable energy harvesting and decentralized trading. A plurality of energy harvesting nodes convert renewable resources, including solar irradiance, wind, hydrodynamic flow, salinity gradients, geothermal heat, and waste-heat streams, into electrical power. Each node includes a sensor array that measures operating and environmental parameters and an edge AI processing unit that predicts performance degradation and computes control actions to maximize net power output subject to stress constraints. A power conversion subsystem conditions the generated power for delivery to storage, microgrids, or utility grids. A blockchain-based orchestration layer receives validated energy summaries, tokenizes discrete energy quanta as digital energy tokens with provenance metadata, and executes smart contracts for peer-to-peer trading, dynamic pricing, and programmable revenue distribution. A fleet-level AI coordination module performs federated learning across nodes and coordinates dispatch and curtailment among heterogeneous modalities, improving portfolio efficiency, grid stability, and environmental accounting.
Resumen de: US20260074894A1
A method for enabling a second party to determine a shared cryptographic key, comprising: generating a puzzle blockchain transaction comprising one or more outputs, each output comprising a puzzle locking script, wherein each puzzle locking script comprises a target public key and is configured to, when executed together with a unlocking script comprising a candidate value, convert the candidate value into a candidate public key and require the candidate public key to match the target public key; and sending the puzzle blockchain transaction to one or more nodes of a blockchain network and/or the second party, wherein the first party is configured to generate the shared cryptographic key based on the first private key, the second public key, and each target public key, and wherein the second party is configured to generate the shared cryptographic key based on the second private key, the first public key, and each candidate value.
Resumen de: US20260073377A1
Systems and techniques for facilitating microtransactions are described. The described systems and techniques leverage certain capabilities of the blockchain while maintaining a conventional transaction experience and/or interface. A method includes receiving, at a digicent service on a blockchain, a digital currency microtransaction request to transfer a particular amount of digital currency from a first digicent wallet account to a second digicent wallet account, the microtransaction being a fractional fiat currency transaction. The digicent service verifies the digital currency microtransaction request, including by confirming that a first tokenized payment source is associated with the first digicent wallet account and exists as a valid smart contract on the blockchain; and confirming that a second tokenized payment source is associated with the second digicent wallet account and exists as a valid smart contract on the blockchain.
Resumen de: US20260070458A1
The present invention relates to a privacy-preserving EV charging authorization and billing system, and a method for the same. The proposed system is configured to integrate permissioned blockchain with fully homomorphic encryption. The present invention aims to eliminate plaintext exposure mitigates single point of failure, by performing all authorization and billing computations on encrypted data and recoding transactions immutably, wherein an EV user securely generates encrypted authorization and billing requests using FHE-based public keys. The charging station routes these encrypted requests to the blockchain network, which records immutable encrypted transactions and verifies them via consensus. The FHE computation layer performs secure operations on the encrypted data for authorization and billing, while smart contracts execute automated verification and billing computations, ensuring transparency and auditability.
Resumen de: US20260073764A1
A client device operates by: receiving a start game request from a user corresponding to a game application having a user's NFT associated therewith, the NFT stored on a blockchain system via a plurality of different nodes of a decentralized computer system, the game application configured to start the game based on a verification of the user's ownership of the NFT; generating launch metadata; sending the launch metadata to a wallet associated with the user, the wallet containing a private key associated with the NFT; receiving, from the wallet, a launch response that is generated based on the private key; generating, based on the launch response, ownership check data; sending the ownership check data to the blockchain system that stores the NFT; receiving, from the blockchain system, an ownership validation response generated by the blockchain system based on geographically distinct blockchain calculations performed contemporaneously over the plurality of different nodes of the decentralized computer system, the ownership validation response indicating whether user's ownership of the NFT is verified; and enabling the start of the game associated with the game application when the ownership validation response indicates the user's ownership of the NFT is verified.
Resumen de: US20260073446A1
A decentralized multi-blockchain crypto exchange system includes a crypto exchange medium hosted at native addresses on each blockchain network, a protocol-based balance tracker, hold and release mechanisms, and a relay consensus component. The system tracks user balances and enforces asset custody, using protocol-based holds to lock assets until specific conditions are met. The relay consensus component generates and synchronizes relay proof values across blockchains, ensuring that all transfers succeed or revert collectively, preventing partial execution of cross-chain exchanges. Exchange orders are placed through peer-to-peer channels, specifying asset amounts and market-volume-based expiration criteria, with unmatched orders canceled when cumulative trading volume thresholds are reached. This design eliminates the need for off-chain servers, reducing latency and improving security. The system facilitates trustless, efficient cross-chain transactions, reduces counterparty risk, and supports various blockchain types, including proof-of-work and proof-of-stake networks, making the system appropriate for secure and scalable asset exchanges.
Resumen de: US20260073406A1
The present invention discloses a method and system for artificial intelligence-based cryptocurrency regulatory analysis capable of performing automated, adaptive, and verifiable compliance evaluation across multiple blockchain ecosystems. The invention integrates blockchain data acquisition, data normalization, graph-based behavioral modeling, artificial intelligence inference, and cryptographically anchored reporting within a unified architecture. The system comprises a blockchain data acquisition unit for retrieving multi-chain transaction data, a data normalization unit for harmonizing heterogeneous blockchain formats, a graph construction unit for generating dynamic transaction graphs, a regulatory knowledge base unit storing jurisdiction-specific regulatory rule graphs, an artificial intelligence processor configured for hybrid neural and symbolic reasoning, and a regulatory reporting unit for generating explainable compliance reports cryptographically anchored to a blockchain ledger.
Resumen de: US20260073405A1
An artificial intelligence system reduces supply chain greenhouse gas emissions by 15-40% through real-time carbon optimization achieving sub-500 millisecond response times. The system integrates a carbon calculation engine computing product-level emissions with ±8% accuracy for 95% of products, an AI optimization module generating explainable recommendations using SHAP values and causal inference with Pearl's do-calculus achieving >75% attribution accuracy, a procurement integration layer embedding carbon scoring within workflows for 1M+ SKUs and 10K+ suppliers, a blockchain verification layer preventing greenwashing, and compliance automation for CSRD/ESRS E1, SEC Rule 506, and California SB 253. Advanced capabilities include digital twin simulation (>85% accuracy), carbon-aware dynamic pricing (−5% to +10% adjustments), supplier development achieving 25-40% emissions reduction, federated learning maintaining competitive data privacy (ε<1.0), satellite/IoT verification (±12% accuracy), and quantum computing acceleration (100-1000×). The system demonstrates 2-5% cost reduction with <18 month payback, qualifying for Patents 4 Planets expedited examination.
Resumen de: US20260073343A1
Described is a reactive hierarchical blockchain architecture, system, and methodology for Global Trade Management (GTM). The system includes a comprehensive suite of GTM applications and leverages multi-national content to deliver efficient cross-border transactions anywhere in the world. The tiered computer-implemented system and method allow development of distributed GTM blockchain solutions capable of processing enormous amounts of global content at scale to meet huge transaction volume. The hierarchical blockchain architecture further assures scalability of the GTM solutions described herein by reducing the need for performing extensive calculations on multiple blockchain nodes. The GTM blockchain systems can be standalone or they can feed information into one or more main International Trade (ITC) blockchains. Smart contracts for specific GTM operations are segregated among appropriate childchains and verified by integrated GTM applications executed on permissioned nodes.
Resumen de: US20260073368A1
A cryptocurrency payment system facilitates electronic transactions at point of sale terminals using cryptocurrency. A payment card may include a secure element to sign a cryptocurrency transaction at a point of sale device. A server may interact with the point of sale terminal and a blockchain to initiate a smart contract or other mechanism for transferring control of cryptocurrency from a buyer cryptocurrency wallet to a seller cryptocurrency wallet. Upon successful transfer, the server may provide an indication of transaction approval to the point of sale terminal. In this manner, cryptocurrency may be utilized for transactions at point of sale devices in a manner similar to conventional payment cards.
Resumen de: US20260073198A1
The present invention relates to a system and method for cross-domain predictive modeling using Bedrock-based foundation models and blockchain-anchored data. The invention integrates large-scale foundation model reasoning with distributed ledger-based data provenance to enable verifiable, secure, and explainable predictive analytics across heterogeneous domains such as finance, healthcare, logistics, and environmental systems. The system comprises a data ingestion unit for receiving and normalizing multi-domain datasets, a blockchain anchoring unit for generating cryptographic hashes and recording data provenance into a distributed ledger, a cross-domain harmonization processor for aligning heterogeneous feature representations into a unified latent space, a foundation model processor configured to execute Bedrock-based predictive inference with adaptive domain contextualization, a verification processor for validating predictions against blockchain-anchored ground truths, and a governance processor for maintaining immutable audit trails of model evolution.
Resumen de: AU2024329759A1
The invention regards a hybrid-decentralized network system comprising a master block chain, said master block chain comprising a plurality of master block chain blocks arranged in a master linear structure, wherein each of the master block chain blocks comprises a hash tree structure, said hash tree structure comprising a plurality of leaf 5 nodes, wherein each of the plurality of leaf nodes comprises a user block chain arranged in a user hash tree structure. A computer-implemented method for verifying a hybrid-decentralized network based on a hash tree structure is also disclosed.
Resumen de: US20260072943A1
A system described herein may maintain a blockchain in conjunction with a plurality of other devices. The system may receive a first request to perform a first set of operations with respect to the blockchain, and may process the first request. Processing the first request may include performing the first set of operations to generate a first result set. Prior to completing processing of the first request, the system may receive a second request to perform a second set of operations with respect to the blockchain, and a third request to perform a third set of operations with respect to the blockchain. After completing processing of the first request, the system may batch process the second and third requests. Batch processing the second and third requests may include performing the second set of operations and the third set of operations to generate a second result set.
Resumen de: US20260072726A1
An electronic device is provided. The electronic device includes a display, a memory storing instructions, and a processor operatively connected to the display and the memory, and the processor may be configured to execute the instructions so as to further cause the electronic device to if data provided in a predetermined format is recorded in a memory, identify validity of a first block chain address indicated by the data, if the validity of the first block chain address is identified, identify at least one second block chain address capable of performing a transaction with the first block chain address among at least one block chain address of a user of the electronic device, and display, on the display, a user interface including the first block chain address and the at least one second block chain address.
Resumen de: US20260074912A1
The invention resides in a computer-implemented method. The method comprises the transmission of packets of data using nodes and/or routers, which optimise the dissemination and/or balancing of resources through management and/or allocation. In particular, the invention relates to the controlled transmission and/or access to those packets of data. The method can include operating a sending resource, and the packet of data preferably includes blockchain related data. The sending resource can be the originator of the packets of data e.g. the creator or the producer, or the sending resource can be an operator, such as distributor who collates, aggregates or pools packets of data for subsequent transmission e.g. independently of the original transmission. The multicast group and/or the packets of data can be secured, and a recipient e.g. an end-user can obtain an access-key for accessing the multicast group and/or the packet of data. In some embodiments, the access-key can be provided during an exchange over a blockchain, for example by using a payment channel.
Resumen de: US20260074919A1
A blockchain-based system and method for verifying Certificates of Authentication (COAs) in supply chain management is disclosed, adhering to ASTM D8558-24 guidelines and relevant ISO standards including ISO/IEC 27001, ISO 28000, and ISO 9001. The system utilizes a custom Layer 1 (L1) blockchain built on the Avalanche platform, implementing a dual-token model to create, manage, and verify COAs as Non-Fungible Tokens (NFTs). It features AI-powered authentication, enhanced security measures, and a data marketplace for monetizing authenticated supply chain data. The system offers improved scalability, customization for various industries, and facilitates both B2B and B2C transactions. With cross-chain communication capabilities and integration with existing supply chain systems, the invention addresses environmental and social considerations while providing comprehensive interoperability. This solution aims to revolutionize supply chain authentication, offering enhanced transparency, efficiency, and trust in global trade, all while maintaining compliance with international standards for security, quality, and supply chain management.
Resumen de: US20260074903A1
Approaches are described for secure identity verification using blockchain technology. A configuration record for a user's identity attributes is obtained. The configuration record is used to evaluate and verify various identity elements through cross-referencing with authoritative sources. Based on the configuration record, identity tokens (KYbits) are generated using cryptographic techniques and stored on a blockchain ledger. These KYbits encapsulate verified identity information and can be utilized in verification processes without disclosing sensitive personal data. The identity tokens enable secure and privacy-preserving transactions across various platforms, ensuring compliance with data protection regulations and enhancing user control over personal identity information.
Resumen de: US20260075042A1
Disclosed is a blockchain-based security method that is performed by an integrated web security solution (web application and API protection, WAAP) and using WAAP and application programming interface (API) level management. The blockchain-based security method may comprise: receiving an API safety grade check request from the blockchain under a session establishment with the blockchain, wherein, in the checking of the API safety grade, a security level for vulnerability of the API is checked by itself in management API data of the WAAP with a highest level of safety; and transmitting information on the API safety grade to the blockchain.
Resumen de: US20260074915A1
An integrated circuit (IC) is disclosed. In one embodiment, the IC comprises a memory and at least one processing core coupled to the memory. In one embodiment, the operations the at least one processing core operatively coupled to the memory perform comprise storing final hashes of each block chain authentication (BCA) section of an in-system test (IST) image in a write-protected portion of the memory; receiving at least one Public Key Authentication (PKA) signature; authenticating the at least one PKA signature using public key cryptography (PKC) algorithm; once the PKA signature is authenticated, using the final hash for each BCA section to authenticate a portion of the IST image associated with each BCA section using a hash engine of the at least one processing core skipping any PKA signature checks for any of the final hashes; and testing portions of the IC with the authenticated IST image portion.
Resumen de: US20260074882A1
A method is provided comprising generating a blockchain transaction (Tx) indicative of a condition on use of the resource, the blockchain transaction comprising a multi-signature script requiring a plurality of signatures for completion of the blockchain transaction; providing a first subset of the plurality of signatures to the blockchain transaction to generate a partially signed signature script to partially complete the blockchain transaction; and responsive to the condition on the use of the resource being satisfied, providing a second subset of the plurality of signatures to the blockchain transaction to fully complete the blockchain transaction. The condition on the use of the resource may be the use of a discrete amount of the resource and the second subset of the plurality of signatures is provided responsive to the discrete amount of the resource being used.
Resumen de: US20260074896A1
A system for implementing a quantum-based data validation in a network is disclosed. The system generates a quantum key for data packet transmissions. The system distributes the quantum key among a set of end-point devices, where the set of end-point devices are each authorized devices. The system encrypts the data packet with the quantum key. The system receives a request message to access the data packet, where the request message comprises an identifier associated with a requesting device. The system determines whether the request message is originated from an authorized entity by determining whether the identifier associated with the requesting device is recorded as an authorized entity in a blockchain database. If it is determined that the request message is originated from an authorized entity, the system grants access of the data packet to the requesting device. Otherwise, the system denies the request.
Resumen de: EP4708092A2
A secure peer-to-peer network is implemented with computing devices over unsecure network connections. Each computing device can include or be coupled to a proof of origin hardware. The proof of origin hardware can be validated by publicly available data, such as a trusted server. In addition, the proof of origin hardware can facilitate cryptographic key generation to facilitate encryption of communications at the computing devices, to secure such communications over the unsecure network connections. The proof of origin hardware can include hardware acceleration circuitry to provide network services, such as cryptocurrency transactions, blockchain validation computations, and even blockchain services integrating smart contracts, token exchange, survey services leveraging proof of origin data, distributed data backup, distributed computing, among others.
Resumen de: EP4708104A1
Publishers can securely register media content (e.g. video, audio, image etc.) by verifying their identity, for example, through a blockchain wallet or other verification mechanism, providing media metadata, and generating a unique fingerprint and hash of the media. The unique fingerprint hash, along with basic metadata such as the URL location or a unique identifier of the media, is stored on the blockchain to link the media to its publisher.
Nº publicación: EP4708767A1 11/03/2026
Solicitante:
CROSSBAR INC [US]
Crossbar, Inc
Resumen de: EP4708767A1
A secure peer-to-peer network is implemented with computing devices over unsecure network connections. Each computing device can include or be coupled to a proof of origin hardware. The proof of origin hardware can be validated by publicly available data, such as a trusted server or by secure storage of valid proof of origin data, or other modality. Once validated on the peer-to-peer network, peer nodes can provide or can receive network services, such as blockchain services, cryptocurrency transaction services, smart contract-enabled services, token exchange, survey services leveraging proof of origin data, distributed data backup services, distributed computing services, among others.