Ministerio de Industria, Turismo y Comercio LogoMinisterior
 

Alerta

Resultados 130 results.
LastUpdate Updated on 09/05/2025 [07:32:00]
pdfxls
Solicitudes publicadas en los últimos 30 días / Applications published in the last 30 days
previousPage Results 50 to 75 of 130 nextPage  

EPHEMERAL DYNAMICALLY LINKED MESH NETWORK

Publication No.:  US2025131425A1 24/04/2025
Applicant: 
WELLS FARGO BANK N A [US]
Wells Fargo Bank, N.A

Absstract of: US2025131425A1

Systems and methods for establishing a secure and private local network with a block chain record are disclosed. One disclosed method includes establishing a network connection between a first device, second device, and third device. The method includes configuring a local network in communication with the first device, second device, and third device and establishing a block chain between the first, second, and third devices. The first, second, and third devices are nodes of the block chain and execute consensus protocols to maintain consistency of the block chain. Messages sent between the devices on the local network are stored in the block chain and when the local network is disbanded, the devices upload the block chain to a cloud repository.

METHODS AND SYSTEMS FOR PROVIDING OVER-THE-AIR UPDATES OF A VIRTUAL OR PHYSICAL CARD TOKEN

Publication No.:  US2025131423A1 24/04/2025
Applicant: 
MASTERCARD INT INCORPORATED [US]
Mastercard International Incorporated

Absstract of: US2025131423A1

A system and method for enabling dynamic expiration dates in a payment card. An algorithm executes on a computing device to create a private blockchain that is controlled by an inquiry block exchange. A payment card holder (PCH) metablock is generated when a first payment card issuer creates a PCH profile. This PCH profile is maintained within a security zone on the network. The security zone comprises multiple modules. These modules include a dynamic smart contract (DSC) execution engine module for generating a DSC hash value that identifies the DSC for the PCH profile metablock. A hyper-ledger fabric module enables dynamic parameters to be stored as an asset in the DSCs. A metablock generator module creates a PCH profile metablock and hashes the data in a subscribed hashing algorithm. The hashed data includes private keys and cryptographic keys in a secured element section of the PCH profile metablock.

SYSTEM AND METHOD FOR OFFLINE SIGNING OF TRANSACTIONS

Publication No.:  US2025131420A1 24/04/2025
Applicant: 
UHUPAY GMBH [DE]
UhuPay GmbH
EP_4542474_A1

Absstract of: US2025131420A1

The present invention relates to a system for processing the signing of a blockchain transaction, the system comprising: a) a digital storage medium configured to store a portion of an access-key for signing blockchain transactions; and b) a signature terminal comprising an input means configured to receive an input representative for the remaining not-stored part of the access-key to complete the signature, wherein a transaction to be signed on a blockchain is signed by a signing module based on a combination of the stored part of the access key on the digital storage medium and the input by the input means of the signature terminal.

Blockchain-Authenticated Communication Subscription System

Publication No.:  US2025131415A1 24/04/2025
Applicant: 
BOWERS PETER [US]
Bowers Peter

Absstract of: US2025131415A1

A blockchain-authenticated communication subscription system that leverages smart contracts and non-fungible tokens to verify the ownership and authenticity of communication channels. The platform allows creators—individuals or organizations—to authenticate their identity by proving ownership of a smart contract or non-fungible token through cryptographic wallet signatures. Subscribers can opt into these subscription services and receive communications exclusively from verified creators, enhancing trust and reducing unsolicited messages. The system supports both cryptographic wallet-based and traditional authentication methods for subscribers. Communications can be delivered through secure channels and may be stored on-chain or referenced on-chain linking to off-chain data, ensuring transparency and immutability. The platform can be implemented using centralized, decentralized, or hybrid infrastructure to manage subscription data while maintaining authentication integrity. This invention provides an effective solution to unsolicited communications by verifying message origins through blockchain technology, minimizing reliance on traditional spam filters, and delivering a secure and trusted communication experience.

CREATING AND MANAGING ARTIFICIALLY INTELLIGENT ENTITIES REPRESENTED BY NON-FUNGIBLE TOKENS ON A BLOCKCHAIN

Publication No.:  US2025131419A1 24/04/2025
Applicant: 
KHAN ARIF [US]
Khan Arif
US_2023289784_PA

Absstract of: US2025131419A1

Some examples of the present disclosure relate to generating artificially intelligent entities represented on a blockchain using a non-fungible token (NFT). In one such example, a system can generate an NFT on a blockchain. The NFT can represent an artificially intelligent entity. The system can also generate a personality dataset on the blockchain, the personality dataset describing personality characteristics of the artificially intelligent entity. The system can then correlate the NFT to the personality dataset, thereby assigning the personality characteristics to the artificially intelligent entity. Once generated, the artificially intelligent entity may reside in a virtual ecosystem in which it can perform tasks and learn over time.

TRUSTLESS PHYSICAL CRYPTOCURRENCY

Publication No.:  US2025131397A1 24/04/2025
Applicant: 
ARX RES INC [US]
Arx Research, Inc
AU_2020237499_A1

Absstract of: US2025131397A1

A physical cryptocurrency may comprise a physical medium and an attached processor. The processor may generate a public-private key pair, or the public-private key pair may be generated in a secure and auditable manner external to the processor and stored on the processor. The private key may enable execution of a smart contract on a blockchain to transfer an asset from a starting address to a destination address on the blockchain.

Centralized Ledger for Airline Maintenance Control

Publication No.:  US2025131390A1 24/04/2025
Applicant: 
THE BOEING COMPANY [US]
The Boeing Company

Absstract of: US2025131390A1

Processing a vehicle maintenance transaction is provided. The method comprises receiving the transaction and entering the transaction into a blockchain ledger. In response to the transaction, an enhanced smart contract in the blockchain ledger executes. The enhanced smart contract specifies a number of compliance requirements to complete the transaction and automates a workflow for the transaction according to the compliance requirements. A number of notifications regarding the transaction are generated to a number of subscribers to the blockchain ledger. Confirmation of fulfillment of the compliance requirements is received from the subscribers to complete the transaction. The enhanced smart contract, verifies fulfillment of the compliance requirements, and completion of the transaction is recorded in the blockchain ledger.

METHODS AND SYSTEMS FOR A CONSISTENT DISTRIBUTED MEMORY POOL IN A BLOCKCHAIN NETWORK

Publication No.:  US2025133138A1 24/04/2025
Applicant: 
NCHAIN LICENSING AG [CH]
nChain Licensing AG
JP_2024096946_PA

Absstract of: US2025133138A1

A computer-implemented method is disclosed that includes: receiving, at a mempool node of distributed mempool network (DMP) implementing a distributed hash table (DHT), a request to update routing information of the mempool node; initializing a set of random walks within a key space of the DHT; generating a first record in an first table based at least in part on a first identification information stored in a second of a long-distance table type; generating a second record in a third table of the long-distance table type by at least performing a first random walk of the set of random walks, the second record containing a second identification information and an address associated with the second identification information; generating a third record in a fourth table of a short-distance table type by at least obtaining records from a table maintained by a second mempool node of the DMP network.

FAULT TOLERANT ZERO TRUST CONTROL PLANE

Publication No.:  US2025133119A1 24/04/2025
Applicant: 
DELL PRODUCTS L P [US]
Dell Products L.P

Absstract of: US2025133119A1

One example method includes receiving, at a control plane of a zero trust (ZT) architecture, a request to implement a proposed policy, forwarding the request to multiple policy engines of a blockchain policy engine, executing, by the policy engines, a consensus algorithm that decides whether or not the proposed policy will be implemented, wherein, as part of execution of the consensus algorithm, each of the policy engines performs a respective validation process with respect to the proposed policy, and when a consensus is reached by the policy engines, either implementing the proposed policy, or preventing implementation of the proposed policy, as dictated by the consensus.

PARTITIONING A BLOCKCHAIN NETWORK

Publication No.:  US2025132914A1 24/04/2025
Applicant: 
NCHAIN LICENSING AG [CH]
nChain Licensing AG
CN_119228541_PA

Absstract of: US2025132914A1

A computer-implemented method of validating a blockchain transaction is disclosed. The method comprises requesting at least one UTXO referenced by at least one respective input of the transaction from a member node of at least one shard comprising at least one UTXO, obtaining validity data of at least one UTXO from at least one node, and performing a validation check on at least one input using the validity data.

Talking Head Digital Identity Authentication On A Distributed Network

Publication No.:  US2025132921A1 24/04/2025
Applicant: 
AVAWORKS INCORPORATED [US]
AvaWorks Incorporated

Absstract of: US2025132921A1

A talking head digital identity immutable dual authentication method for use over a distributed network, comprising: downloading talking head and talking head show files from nodes of a distributed network; downloading hash values of a talking head and talking head show from a blockchain; sending a hash of a publisher's identification from the blockchain to a name lookup service; retrieving and confirming the identity of the publisher; recalculating hash values of the talking head and talking head show; comparing the recalculated hash values of the talking head and talking head show with the hash values of the talking head and talking head show retrieved from the blockchain; incorporating a 3D mesh model into the talking head show; starting playback of the talking head show if the hash values received from the blockchain match the recalculated hash values of the talking head and talking head show retrieved from the distributed network.

SERVICE PROVIDING METHOD AND SYSTEM USING NFT

Publication No.:  US2025132915A1 24/04/2025
Applicant: 
HYUNDAI MOTOR COMPANY [KR]
KIA CORP [KR]
Hyundai Motor Company,
Kia Corporation

Absstract of: US2025132915A1

Disclosed is a service providing method based on a non-fungible token (NFT), which may include creating, by a system server, a hash value based on user information for a vehicle, vehicle unique information, and vehicle information, issuing, by a blockchain main net, an NFT corresponding to the vehicle by using the user information, the vehicle information, and the hash value, and performing an NFT inquiry, an NFT transaction, and metadata modification of the NFT between the blockchain main net and any personal terminal.

CONSENSUS METHOD AND APPARATUS, AND BLOCKCHAIN SYSTEM

Publication No.:  US2025132935A1 24/04/2025
Applicant: 
CHINA ACADEMY OF INFORMATION AND COMMUNICATIONS TECH [CN]
CHINA ACADEMY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
WO_2023040364_A1

Absstract of: US2025132935A1

Disclosed are a consensus method and device, and a blockchain system. A primary node directly broadcasts a transaction hash list including a hash value of at least one unverified transaction in the system, so that a backup node and the primary node simultaneously verify the at least one unverified transaction, and the backup node stores a first verification result obtained by verification and a first hash value of the at least one unverified transaction. The primary node broadcasts an obtained second verification result and a second hash value of the at least one unverified transaction in a pre-preparation message after completing the verification, so that the backup node searches for the first verification result based on the second hash value, and broadcast a preparation message when the second verification result is the same as the searched first verification result, to enter a subsequent consensus stage, and complete the consensus processing.

Authenticated Modification of Blockchain-Based Data Using Semantic Representations

Publication No.:  US2025132936A1 24/04/2025
Applicant: 
KANOVITZ MICHAEL IRA [US]
LOEVY JON ISAAC [US]
Kanovitz Michael Ira,
Loevy Jon Isaac

Absstract of: US2025132936A1

Example systems and methods include: receiving, by a computing system, a request to add a block to a blockchain, wherein the block includes an entry that relates to a semantic representation, wherein the semantic representation encodes a state change to a state stored on the blockchain; obtaining, by the computing system, a copy of the semantic representation as provided by a trusted third party, wherein the copy of the semantic representation is digitally signed by the trusted third party or provided by the trusted third party at a network address; validating, by the computing system, the semantic representation; and initiating, by the computing system, procedures to add the block to the blockchain.

BLOCKCHAIN SECURITY MANAGEMENT SYSTEM AND PROCESS

Publication No.:  US2025132898A1 24/04/2025
Applicant: 
PRIVACYCHAIN LLC [US]
PrivacyChain, LLC
WO_2022072862_A1

Absstract of: US2025132898A1

A process for managing security of a blockchain may include receiving a message from a P2P distributed application requesting access to a block on a blockchain for a user. In response to receiving the message, identity of the user requesting access to the block may be validated. In response to validating the identity of the user, the requested access to the block may be performed by (i) requesting a key associated with the identified user to be used to unlock the block, and (ii) in response to receiving a key associated with the user, unlocking the block to access content data stored in a data object contained in the block. A distributed data management system (DDMS) may be configured to perform the process.

METHODS AND SYSTEMS FOR BLOCKCHAIN-IMPLEMENTED EVENT-LOCK ENCRYPTION

Publication No.:  US2025132903A1 24/04/2025
Applicant: 
NCHAIN LICENSING AG [CH]
nChain Licensing AG
JP_2024038320_PA

Absstract of: US2025132903A1

A computer-implemented method includes encrypting a plaintext message to a cryptographic public key in accordance with an identity-based encryption scheme using at least a congress public key to generate an encrypted message, wherein the congress public key is associated with members of a congress, respective members of the congress having access to private key shares usable in a threshold decryption scheme in which at least a threshold of private key shares are sufficient to derive a decryption key through the combination of partial contributions to the decryption key on behalf of the congress, generating, using at least a cryptographic private key corresponding to the cryptographic public key, a digital signature over a first set of instructions to perform cryptographic operations upon an occurrence of an event; and broadcasting one or more transactions to a proof-of-work blockchain network, the one or more transactions comprising the encrypted message, the cryptographic public key.

METHOD AND SYSTEM FOR VERIFYING SIGNATURE IN BLOCKCHAIN CONSENSUS PROCESS

Publication No.:  WO2025084724A1 24/04/2025
Applicant: 
SK INC [KR]
\uC5D0\uC2A4\uCF00\uC774 \uC8FC\uC2DD\uD68C\uC0AC
WO_2025084724_PA

Absstract of: WO2025084724A1

A method and a system for verifying a signature in a blockchain consensus process are provided. The method for verifying a signature, according to an embodiment of the present invention, comprises steps in which: a specific validator node in a blockchain system receives a request message for a signature verification operation of transactions in a block received from another validator node; and the validator node that received the request message performs the signature verification operation on the transactions in the received block. Therefore, the signature verification operation can be skipped.

SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TRACKING FUNDS TRANSFERS

Publication No.:  WO2025085166A1 24/04/2025
Applicant: 
VISA INT SERVICE ASSOCIATION [US]
VISA INTERNATIONAL SERVICE ASSOCIATION
WO_2025085166_PA

Absstract of: WO2025085166A1

Systems, methods, and computer program products for tracking funds transfers are provided. A system includes at least one processor of an administrative node in a blockchain network, the at least one processor programmed to establish a unified ledger stored by a plurality of nodes of the blockchain network, receive transaction data for a plurality of transactions processed by a plurality of different systems via an interoperable protocol while each transaction of the plurality of transactions is being processed between at least two systems of the plurality of different systems, store, in the unified ledger, the transaction data, and automatically monitor the transaction data in the unified ledger to detect anomalous transactions.

SYSTEMS AND METHODS FOR REAL-TIME RECORDING OF TRANSFERS OF SELF-VALIDATING DIGITAL RECORDS ACROSS CRYPTOGRAPHICALLY SECURE NETWORKS USING CROSS-NETWORK REGISTRIES

Publication No.:  WO2025085385A1 24/04/2025
Applicant: 
CITIBANK N A [US]
CITIBANK, N.A
WO_2025085385_PA

Absstract of: WO2025085385A1

Systems and methods for novel uses and/or improvements to blockchains and blockchain technology. As one example, systems and methods are described herein for self-validating digital records that may be transferred in real-time through a cross-network registry. For example, in a conventional system, minting a token (e.g., a digital record) involves writing a self-executing program that defines the transfer rules of the digital record. Once the self-executing program is written, it is deployed on a blockchain, and the digital record is minted by publishing it to a blockchain.

METHODS AND SYSTEMS FOR PROVIDING OVER-THE-AIR COMPLIANCE UPDATES OF A VIRTUAL OR PHYSICAL CARD TOKEN

Publication No.:  WO2025085178A1 24/04/2025
Applicant: 
MASTERCARD INT INCORPORATED [US]
MASTERCARD INTERNATIONAL INCORPORATED
WO_2025085178_PA

Absstract of: WO2025085178A1

A system and method for enabling dynamic expiration dates in a payment card. An algorithm executes on a computing device to create a private blockchain that is controlled by an inquiry block exchange. A payment card holder (PCH) metablock is generated when a first payment card issuer creates a PCH profile. This PCH profile is maintained within a security zone on the network. The security zone comprises multiple modules. These modules include a dynamic smart contract (DSC) execution engine module for generating a DSC hash value that identifies the DSC for the PCH profile metablock. A hyper-ledger fabric module enables dynamic parameters to be stored as an asset in the DSCs. A metablock generator module creates a PCH profile metablock and hashes the data in a subscribed hashing algorithm. The hashed data includes private keys and cryptographic keys in a secured element section of the PCH profile metablock.

ACCESS CONTROL SYSTEM AND METHOD, AND ELECTRONIC DEVICE

Publication No.:  WO2025081569A1 24/04/2025
Applicant: 
CHINA TELECOM NETWORK SECURITY TECH CO LTD [CN]
\u5929\u7FFC\u5B89\u5168\u79D1\u6280\u6709\u9650\u516C\u53F8
WO_2025081569_PA

Absstract of: WO2025081569A1

Disclosed in the present application are an access control system and method, and an electronic device, which are used for solving the problem of data being unavailable or data being accessed without authorization caused by a single-point failure in ABAC. The access control system comprises: a DU, a PEP, a blockchain and a smart contract, wherein the blockchain is used for sending a ciphertext hash value and a ciphertext storage address to the DU after receiving consent information which indicates consent for AR access or validity information which indicates that a multi-signature is valid, the consent information being sent by the PEP or the DU on the basis of an evaluation result which is obtained after an AR is evaluated by the smart contract, and the validity information being sent by the PEP or the DU on the basis of the multi-signature which is generated for the AR by the blockchain by means of an ASM algorithm; and the DU is used for acquiring ciphertext and a random number on the basis of the ciphertext storage address after receiving the ciphertext hash value and the ciphertext storage address from the blockchain, performing legitimacy verification by means of a PCH algorithm, and using the ciphertext once it is determined that the ciphertext, the random number and the ciphertext hash value are legitimate.

BLOCKCHAIN-IMPLEMENTED METHOD AND SYSTEM

Publication No.:  EP4542932A2 23/04/2025
Applicant: 
NCHAIN LICENSING AG [CH]
nChain Licensing AG
EP_4542932_PA

Absstract of: EP4542932A2

The computer-implemented invention provides a method and corresponding system for controlling access to and/or use of an internet-enabled resource. The invention uses a distributed electronic ledger such as, for example, the Bitcoin blockchain. The resource may be an IoT device or system. Access to the resource is permitted or enabled upon provision of a cryptographic key e.g. a private key which corresponds to a public key which has been stored in memory. In one embodiment, the public key is stored in a DHT. Access to the resource is prevented or disabled by removing the public key from memory, and using a redeem script of a blockchain Transaction to spend a tokenised output of a further blockchain Transaction. The process of communicating the requisite cryptographic keys and transferring funds is performed via the blockchain. The keys are communicated as tokens in the metadata of transactions scripts. In use, when access is requested by the user, an encrypted message is sent to the resource. The message has been encrypted using the user's private key. If the resource can use the previously communicated public key to decrypt the message, access can be granted. The invention is particularly suited for use in situations where temporary access or use of the resource is to be granted eg rental scenarios.

SYSTEMS AND METHODS FOR MITIGATING NETWORK CONGESTION ON BLOCKCHAIN NETWORKS BY SUPPORTING BLOCKCHAIN OPERATIONS THROUGH OFF-CHAIN INTERACTIONS

Publication No.:  EP4540957A1 23/04/2025
Applicant: 
COINBASE INC [US]
Coinbase Inc
CN_119301903_PA

Absstract of: CN119301903A

Systems and methods for mitigating network congestion on a blockchain network by supporting blockchain operations via under-chain interactions. For example, when a communication is received that initiates an under-chain event and/or blockchain operation, the system may determine various characteristics regarding addresses involved. In particular, the system may determine whether an address corresponds to a cryptographic-based storage application that shares a common platform service.

SYSTEM AND METHOD FOR OFFLINE SIGNING OF TRANSACTIONS

Publication No.:  EP4542474A1 23/04/2025
Applicant: 
UHUPAY GMBH [DE]
UhuPay GmbH
EP_4542474_A1

Absstract of: EP4542474A1

The present invention relates to a system for processing the signing of a blockchain transaction, the system comprising:a) a digital storage medium configured to store a portion of an access-key for signing blockchain transactions; andb) a signature terminal comprising an input means configured to receive an input representative for the remaining not-stored part of the access-key to complete the signature, whereina transaction to be signed on a blockchain is signed by a signing module based on a combination of the stored part of the access key on the digital storage medium and the input by the input means of the signature terminal.

SYSTEM AND METHOD FOR CHANGING WORKING SHARD OF ACCOUNT IN BLOCKCHAIN NETWORK

Nº publicación: EP4542967A1 23/04/2025

Applicant:

BLOOM TECH INC [KR]
Bloom Technology, Inc

EP_4542967_PA

Absstract of: EP4542967A1

The present disclosure relates to a system and method for changing a shard (working shard) with which an account is affiliated to another shard (working shard) in a blockchain network applying dynamic sharding technique. In the present disclosure, the node is a node affiliated with an origin working shard of a first moving account and communicates with a first home shard-affiliated node of the first moving account and a first destination working shard-affiliated node of the first moving account to perform a working shard change procedure for the first moving account. The node includes a working shard change detection unit that detects whether a working shard of the first moving account is changed, and a working shard change request unit that requests a working shard change for the first moving account to the first destination working shard-affiliated node.

traducir