Absstract of: US2025286742A1
Industrial blockchain enabled automation control (e.g., using a computerized tool) is enabled. For example, a system can comprise: a memory that stores executable components, a processor, operatively coupled to the memory, that executes the executable components, the executable components comprising: a minting component that, based on a manufacturing criterion associated with a product being determined to be satisfied, mints a non-fungible token associated with the product, wherein the non-fungible token comprises authenticity data representative of a birth certificate for the product, and a blockchain component that registers the non-fungible token with a blockchain.
Absstract of: US2025286741A1
Systems, methods, and computer-readable storage media for restricting exchanges using a proof of integrity model. One system includes memory and at least one processing circuit configured to receive, from a node on a first DLT network, an exchange request, the exchange request includes an amount of a digital asset to exchange, a content item, and a destination identifier. The at least one processing circuit is further configured to generate an exchange record and validate the exchange record in the amount of the digital asset based on a protection model. The at least one processing circuit is further configured to authorize, based on a consensus model, the exchange corresponding with the validated exchange record including the appended protection parameter. The at least one processing circuit is further configured to generate a new blockchain block on the first DLT network and transmit, to a second DLT network, an exchange notification.
Absstract of: US2025286719A1
Embodiments of this application disclose a data processing method and apparatus based on a hierarchical chain, a device, and a medium, which are applicable to the field of blockchain technologies. The method includes invoking the service aggregation process to execute the block to be processed to obtain a service execution result; determining a block execution result, and invoking the service aggregation process to optimize the block execution result, to obtain a block optimization result and an optimization proof; obtaining a result hash of the block execution result, a service hash of each service, the service execution proof, the optimization proof, and a blockhead of the block to be processed, a backhaul service to be backhauled to the local consensus node; and backhauling the backhaul service to obtain a service verification result to be returned to the service node.
Absstract of: NL4000127A
The present invention discloses an intelligent inspection optimization method for power safety production management, relating to the technical field of power system operation and maintenance, which comprises: establishing a blockchain-based equipment ledger 5 database by collecting data, customizing inspection tasks, using radio frequency identification technology for unique equipment management, dynamically adjusting inspection paths with an adaptive control algorithm during inspection, collecting equipment operation data, associating operation data with basic information and feeding it back to the system in real time, analyzing whether the equipment meets quality 10 inspection requirements based on real-time data and equipment status, adding temporary inspection tasks and emergency inspections for faults, updating the inspection plan, and predicting equipment defects using machine learning algorithms for equipment maintenance and parameter adjustment. The method can solve problems in traditional equipment ledger management, inspection task customization, and incomplete 15 equipment defect prediction.
Absstract of: WO2024097406A1
Procedures, methods, architectures, apparatuses, systems, devices, and computer program products directed to in connection with application-aware computing and communication management in a blockchain system are provided. Among the methods is a method that may include transmitting a first transmission to a processing device of a distributed ledger, wherein the first transmission comprises information indicating collective data interest plan (CDIP) content, including filters for filtering transactions for the first device and a second device; receiving a second transmission from the processing device, wherein the second transmission comprises information indicating a summary digest for multiple filtered transactions; generating multiple transaction set units (TSUs); and transmitting, to the processing device, information indicating to the processing device to transmit to the second device one or more of the multiple TSUs.
Absstract of: EP4614427A1
A system for granting tokens related to a place or area to users who are actually visiting or have visited the place or area is provided. The system includes: an acquisition unit that acquires, via an information coordination device that acquires first location information indicating the location of a user terminal of a user who wishes to obtain an NFT, the first location information; a determination unit that determines that the NFT can be granted to the user if the location of the user terminal indicated by the first location information is within a predetermined range; and an NFT granting unit that grants the NFT to the user's wallet address on a blockchain when the determination unit determines that the NFT can be granted.
Absstract of: EP4614876A2
Methods, devices and systems are provided for implementing a platform providing a plurality of services that are associated with a blockchain, using a platform processor associated with an application programming interface (API) that is capable of receiving a client request in a Hypertext Transfer Protocol (HTTP) transmission protocol format for a service. Further to suitable verification of the identity of the client and/or the request, a destination address or endpoint for the requested blockchain service is determined, and at least one blockchain transaction is generated based on the destination address to obtain an output script. A result based on the output script is then sent to the given client in the HTTP transmission protocol format. In some aspects, the blockchain transaction is associated with an event stream that is implemented as a Finite State Machine on the blockchain. In some aspects, the blockchain transaction is generated to create, amend or terminate an event stream that is implemented using the blockchain, the transaction spending a dust output of a previous transaction and/or having an unspent dust output.
Absstract of: EP4614885A2
Particular embodiments described herein provide for a system that can be configured to facilitate the use of a blockchain for distributed denial of service attack mitigation, the system can include a network security provider and a validating node. The network security provider can recognize that a distributed denial of service (DDoS) attack is occurring, create a block that includes data related to the DDoS attack, and publish the block that includes the data related to the DDoS attack for addition to a blockchain. The validating node can validate the block that includes the data related to the DDoS attack and the block that includes the data related to the DDoS attack can be added to the blockchain. The block that includes the data related to the DDoS attack can be analyzed to determine how to mitigate a similar DDoS attack.
Absstract of: US2025279877A1
A Smartblock that has at least two Blockchains that originates from it and terminates at a second Smartblock to create a Blockstrand.
Absstract of: US2025278719A1
The invention provides a secure method for exchanging entities via a blockchain. The invention incorporates tokenisation techniques, and also techniques for embedding metadata in a redeem script of a blockchain transaction. Embodiment(s) provide a method of: generating a first script, the first script comprising: a first set of metadata associated with a first invitation for the exchange of a first entity by a first user, the first set of metadata comprising an indication of the first entity to be offered for exchange and a first location condition for the exchange, a first user public key (P1A) associated with the first user, wherein the first user public key (P1A) is part of an asymmetric cryptographic pair comprising the first user public key (P1A) and a first user private key (V1A). The script may further comprise a first third-party public key (P1T) associated with a first third-party.
Absstract of: US2025278727A1
A computer-implemented method of generating a transaction for a blockchain, the transaction being for transferring an amount of a digital asset from a first party to a second party. The method comprises generating a first transaction comprising an output locking the amount of the digital asset, the output comprising an output script comprising a plurality of criterion components each requiring a respective input data item, and a plurality of counter script components. Each criterion component is associated with one of the counter script components. The output script is configured so as to, when executed alongside an input script of a second transaction, i) increment a counter each time a respective criterion component is satisfied by a respective input data item of the input script, and ii) to require the counter to increment to at least a predetermined number in order to be unlocked by the input script.
Absstract of: US2025279879A1
What is being presented is Proof of Entanglement (PoE), an algorithmic interchange of information that removes the need for classical consensus when adding blocks to a blockchain through its inherent ability to entangle the source of a document (sender) to the consumer of the document (receiver). The presented method and algorithm will ensure that only the intended receiver can possibly receive and be able to decrypt the document. Furthermore, PoE will guarantee the authenticity and security of the document to a level of entropy that will take more computational energy than is available on Earth to decipher, using today's supercomputers. PoE will create a quantum link (shared encryption key) between the sender and receiver. This key is used for document encryption and decryption but is never sent from the sender to the receiver. It is generated by the platform's servers and link devices (LINK) for both the representative of the sender and the representative of the receiver. This encryption key is produced by data held in the LINK that provides secure data to their counterpart entangled node devices (NODE). These in turn create the actual block of the blockchain. FIG. 1 is the block diagram of the platform. It consists of the following servers, LINK, and NODE. The NODE and LINK are held by people and/or businesses that support the platform. The platform description will clarify some of the complexities associated with the model.
Absstract of: US2025278794A1
Systems and methods are disclosed with respect to using a blockchain for managing the subrogation claim process related to a vehicle collision, in particular, utilizing evidence oracles as part of the subrogation process. An exemplary embodiment includes receiving recorded data from one or more connected devices at a geographic location; analyzing the recorded data, wherein analyzing the recorded data includes determining that an collision has occurred involving one or more vehicles; generating a transaction including the data indicative of the collision based upon the analysis; and transmitting the transaction to at least one other participant in the distributed ledger network.
Absstract of: US2025279992A1
Systems, computer program products, and methods are described herein for a password less service identification protocol (PLSI). The PLSI protocol is a protocol and procedures that allow access to the full security layer of the critical computing infrastructure for complete secure access. There are four processes associated with the PLSI protocol including access initiation, PLSI service identification generation, PLSI handshake process, and PLSI service identification destruction. The secure password less critical computing infrastructure access communication network protocol can be used to utilize secure connection devices, to access critical production servers or databases where in the required security and compliance to segregation of duty based on entitlement, to establish a secure connection between two or more autonomous devices initiating, to establish secure connection on distributed cloud infrastructure, and/or to access node in block chain network to process the transaction.
Absstract of: US2025280290A1
A networking architecture that incorporates the security of Blockchain distributed ledgers as an authentication layer, while connecting mesh nodes using secure, pulse-based wide-band and ultrawide-band communication technology to provide a nearly undetectable, unbreakable, and dynamic wireless communication mesh architecture that has the ability to securely transmit data, voice and video over short ranges, in one embodiment, up to 1 Km, is disclosed.
Absstract of: US2025278429A1
Generative media content (e.g., generative audio) can be dynamically generated based on various inputs, which can include blockchain data. A playback device accesses blockchain data stored via a distributed ledger and generates media content based at least in part on the blockchain data. The playback device can access a library of pre-existing media segments and arrange a selection of pre-existing media segments from the library for playback according to a generative media content model and based at least in part on the blockchain data. The generated media content can then be played back via the playback device.
Absstract of: US2025278517A1
Technologies for secure document exchange by a producing party and a receiving party. The system and method facilitates the exchange of confidential documents between the producing party and a receiving party while ensuring robust security, permission control, and auditability. The system leverages blockchain technology, smart contracts, and zero-knowledge proof (ZKP) authentication to manage document access and verify identities without exposing confidential information.
Absstract of: WO2025180476A1
The present description provides an ordinal management system and an ordinal management method for cryptocurrency. The method is applied to an ordinal management system. In a blockchain system implemented on the basis of a UTXO model, the circulating cryptocurrency is composed of minimal currency units each having a globally unique currency ordinal number. The method comprises: for any transaction in the current block, determining at least one prior UTXO referenced by said transaction and at least one current UTXO generated by said transaction; and acquiring input currency ordinal ranges respectively corresponding to the prior UTXOs, and within a transaction currency ordinal range, sequentially determining, according to the creation order of the current UTXOs, output currency ordinal ranges respectively corresponding to the current UTXOs, wherein the cryptocurrency value of any current UTXO is equal to the sum of the values of minimal currency units represented by currency ordinal numbers in the output currency ordinal range corresponding to said current UTXO.
Absstract of: WO2025179745A1
Embodiments of the present disclosure are directed to systems and methods for optimistic machine learning on blockchain (opML) that provide an integrated framework of one or more machine learning (ML) models with blockchain technology, driven by the vision of decentralized, secure, and transparent artificial intelligence (AI) services. The combination of blockchain and AI through opML, the opML systems and methods provide a transformative platform with paradigm shift toward accessible, secure, and efficient onchain machine learning. An opML system comprises an offchain system including a machine learning engine and an offchain fraud proof engine, the machine learning engine receiving a user's input and a local-environment executable file, the offchain fraud proof engine for receiving the user's input and a fraud proof virtual machine executable file, wherein given the same user's input, both the machine learning engine and the FP engine generating the same output.
Absstract of: US2025278728A1
An AI-driven blockchain protocol provides systems/methods for managing tokenized assets via autonomous operational Risk-Aware Agents (RAAs). Distinct from prior art automating simple events, the protocol actively coordinates, incentivizes, and manages the RAAs' on-chain lifecycle and operational/financial performance metrics using an Agent Coordination Contract/Module. Verifiable on-chain incentives link RAA operational performance, tracked by said metrics, to risk/return outcomes, thereby underwriting operational execution. An AI engine analyzes aggregated data including RAA metrics, recommending adjustments to RAA incentives and/or metric targets managed by the protocol. RAAs execute operations driven by these incentives, using a protocol-native stablecoin for reward/penalty settlement. A continuous feedback loop enables optimization. This verifiable autonomous operational management provides a foundation for stablecoin-based leverage against the assets, addressing illiquidity. The system comprises interconnected contracts, processor, engine, and RAAs under protocol governance.
Absstract of: US2025278705A1
In order to efficiently dispose of and effectively utilize the wastes, one of the main culprits of global warming, it is crucial to introduce waste separation and carbon neutral related waste-treatment technologies. Among the supply & value chains of waste, the proper collection and preparation of raw materials is most important. Developed to remind users that garbage can provide additional income rather than unnecessary burden, this invention introduces the smart treatment of collected wastes, validation of the heating value of the waste through image processing and NIR spectra, and data processing technologies and algorithms to build trust based on block-chain technology amongst all parties involved. By implementing these novel methodologies, algorithms, devices, and data-management related technologies, people are encouraged to actively participate in the efficient treatment and recycling of various wastes, providing a better alternative to the method used today that mainly relies on compulsory control through fines.
Absstract of: WO2025184108A1
Methods, systems, and devices for smart contract enabled user account access are described. A client application transmits, to a custodial token platform, a request to use a first amount of tokens associated with a user account at the custodial token platform for transacting with a blockchain address via a blockchain network. The client application receives a withdrawal message that is signed by a key associated with the custodial token platform. The client application broadcasts, via the blockchain network, a message including the signed withdrawal message. The message causes, within a single message on the blockchain network, withdrawal of the first amount of the tokens from a first smart contract address associated with the custodial token platform to a second smart contract address associated with a user of the user account and transfer of a second amount of tokens from the second smart contract address to the blockchain address.
Absstract of: US2025279904A1
The disclosed method includes: reading (operation 202) transaction data from a transaction message queue, the transaction data being transmitted by a business node in a business network to the transaction message queue through a proxy node; generating (operation 204) proposal information of a target block according to the transaction data, and transmitting the proposal information to a consensus message queue to cause second consensus nodes in a consensus network to read the proposal information from the consensus message queue, the proposal information being configured for instructing consensus nodes in the consensus network to perform consensus on the target block, and the consensus nodes performing consensus data interaction through the consensus message queue in a consensus process; and transmitting (operation 206), when consensus is reached, the target block to a data message queue to cause the business node to read the target block from the data message queue.
Absstract of: US2025278723A1
A nameserver receives a request from a user to register a domain name with a domain registrar blockchain that stores domain name registration data in smart contracts. The nameserver performs an off-chain registration process for the domain name with an off-chain domain registrar, including verifying and reserving the domain name. The nameserver then sends a blockchain transaction to the domain registrar blockchain to perform an on-chain registration process for the domain name, the blockchain transaction including the domain name and a digital wallet address for a digital wallet associated with the user. An on-chain asset for the domain name is then minted to the digital wallet, where minting the on-chain asset to the first digital wallet associated with the first user grants exclusive administrative control over the domain name to the first digital wallet.
Nº publicación: WO2025180985A1 04/09/2025
Applicant:
SONY GROUP CORP [JP]
SONY EUROPE B V [GB]
SONY GROUP CORPORATION,
SONY EUROPE B.V
Absstract of: WO2025180985A1
The present disclosure proposes a concept where a smart contract receives a transaction related to at least one voice command from a user device. The received transaction comprises the voice command and a user device identifier. The smart contract searches, in a blockchain network, for an already registered transaction related to the same voice command, but having an older timestamp than the received transaction. In case of a negative search result, the smart contract registers the received transaction with its associated timestamp in the blockchain network. A Service Controlled By Voice Commands (SCBVC) receives an encrypted message comprising the voice command(s) from the user device. The encrypted message further comprises information on a timestamp associated with the voice command(s) and a user device identifier. The SCBVC decrypts the received encrypted message and verifies the decrypted message based on searching for a transaction related to the voice command(s) and registered on the blockchain network by the smart contract.