Absstract of: US2025328876A1
Digital payment systems and methods leveraging optical tones, blockchain technology, and neuromorphic computing to enhance transaction security and flexibility are disclosed. By initiating transactions with unique optical tones generated through mobile IoT applications, payment instructions are encoded into visually encrypted signals, ensuring high security from the outset. Multi-Factor Authentication (MFA), including advanced facial recognition via Convolutional Neural Networks (CNNs), authenticates users, while Spiking Neural Networks (SNNs) process and filter the optical tones, focusing on pertinent transaction details. The system utilizes blockchain oracles and smart contracts for validating transactions and automating the execution of payment instructions, respectively. A novel aspect of this invention is the ability to generate custom payment tokens, either embedded within optical tones or as separate entities, to facilitate specific transactions. This approach not only significantly enhances the security of digital payments but also introduces unprecedented flexibility in managing financial transactions, setting spending limits, and executing recurring payments.
Absstract of: US2025328903A1
A blockchain-based data processing method, performed by a consensus node on a second blockchain, includes: obtaining a cross-chain message submitted by a forwarding service device, and obtaining a blockchain identification carried in the cross-chain message associated with cross-chain transaction data stored in a first blockchain; obtaining, in a second blockchain corresponding to the blockchain identification, block Merkle information corresponding to the first blockchain, and obtaining, in a block Merkle tree represented by the block Merkle information, a Merkle proof set corresponding to the cross-chain message, the Merkle proof set including node information of one or more nodes in the block Merkle tree,; verifying validity of the cross-chain message according to the Merkle proof set and the block Merkle information; and obtaining a transaction execution result corresponding to the cross-chain message in response to verification succeeds, and storing the transaction execution result into the second blockchain.
Absstract of: US2025328958A1
A tracking and recording system is provided for tracking and documenting personal property. Personal property, such as electronic or “IoT” devices having a communication interface, are placed in communication with a tracking system which receives information from those items of personal property and utilizes that information to verify the location and/or existence of the property. A record of the personal property may also be created which includes information which identifies the property, liens, transfers of ownership, and verifications of the location of the property. The record may comprise a block chain of information regarding the property.
Absstract of: US2025328906A1
Methods, systems, and devices for iterative graph embedding of a blockchain network are described. A blockchain embedding service generates, using a graph representation of a blockchain network and a node embedding model, a first set of node embeddings for a first set of blockchain addresses using transaction data for the first set of blockchain addresses. The platform generates, using the graph representation, a second set of node embeddings for a second set of blockchain addresses associated with new transaction data. Generating the second set of node embeddings includes executing, for each node corresponding to blockchain address of the second set of blockchain addresses, a random walk across a set of nodes starting with the node using the transaction data for the set of nodes, inputting data resulting from the random walk into the node embedding model, and computing a risk score for each of the second set of blockchain addresses.
Absstract of: US2025328640A1
A method includes receiving a suspicious text message having information data, and applying a hashing function to the information data to generate hashed information data. The method includes storing the hashed information data in one or more of a plurality of network nodes in a blockchain network, and determining that at least a portion of the information data associated with the suspicious text message contains malicious data based at least in part upon known hashed malicious data.
Absstract of: US2025328609A1
A computer-implemented method and system for verifying the integrity of a computer software for installation using a distributed hash table and a peer-to-peer distributed ledger. This may be the Bitcoin blockchain or an alternative implementation. The method includes determining a metadata associated with a transaction record stored on the peer-to-peer distributed ledger. An indication of an entry stored on the distributed hash table may be determined from the metadata. The method further includes determining a third hash value based on the computer software and determining a fourth hash value from the entry on the distributed hash table. The method further includes comparing the third hash value and the fourth hash value and verifying the integrity of the computer software based on the comparing of the third hash value and the fourth hash value.
Absstract of: US2025328677A1
Methods and systems for controlling users' access to data available on blockchains are described herein, comprising: determining a first right for a first user to first data; determining a location in a permissioned blockchain comprising the first data, the location being a first fork of the permissioned blockchain; determining a first privilege required to access the first fork; determining that the first user corresponds to a first cryptographic address; and assigning the first privilege to the first cryptographic address.
Absstract of: US2025328693A1
Systems and methods call a portion of an application programming interface (API) to access a portion of a current state data server of the blockchain computing platform (BCP) configured to perform virtual machine processing, the BCP comprising interconnected data processing nodes that include: a master ledger configured to store data asset records for master data received from decentralized application transactions performed via the interconnected data processing nodes, and peer nodes configured to provide cryptographic algorithmic trust control for master data management of the master data. The calling includes an API call to the current state data server to obtain current state results of certified transaction(s) in the master ledger, the certified transaction(s) having been certified at least in part via an endorsement protocol. Current state results of the certified transaction(s) are received from the current state server and displayed via a user interface of the user device.
Absstract of: AU2025242245A1
A method for managing data by a multi-tenant server in a distributed network is described. The multi-tenant server manages a multi-tenant environment for a set of tenant systems and peers in the distributed network, which include the set of tenant systems and a set of non-tenant systems. The method includes receiving a tenant transaction request to modify an object in the distributed network, wherein the tenant transaction request is received from a tenant system in the set of tenant systems based on a non-tenant transaction request from a non- tenant system from the set of non-tenant systems; generating, on behalf of the tenant system and the non-tenant system, a transaction object based on an exchange object and the tenant transaction request; and making, on behalf of the tenant system, the transaction object available to the sets of tenant non-tenant systems to attempt to obtain consensus for modifying the object. A method for managing data by a multi-tenant server in a distributed network is described. The multi-tenant server manages a multi-tenant environment for a set of tenant systems and peers in the distributed network, which include the set of tenant systems and a set of non-tenant systems. The method includes receiving a tenant transaction request to modify an object in the distributed network, wherein the tenant transaction request is received from a tenant system in the set of tenant systems based on a non-tenant transaction request from a non- tenant system from
Absstract of: CN119254401A
A computer-implemented access method is provided. The method comprises the steps of: i) submitting an access blockchain transaction addressed to a derived public key to the blockchain, the derived public key derived at least in part from a secret value and a public key; (ii) generating a verification public key based at least in part on the secret value and the public key; (iii) comparing the derived public key with the verification public key; and (iv) based on the comparison of step (iii): (a) assigning at least one of the derived public key and the verification public key as a further public key to verify the further derived public key; and (b) granting access to a resource associated with at least one of the secret value and the derived public key.
Absstract of: US2025328875A1
There is provided a computer implemented method for calculating scores for players participating in a multi-player online game. The method comprises: providing or making available the multi-player online game to each player's computing device; generating player scores for the game depending on player actions and interactions; providing or making available to the players a digital wallet or account that is configured to store and manage game tokens, currency, fiat currency or crypto currency, where the digital wallet or account is based on a ledger, blockchain, distributed ledger, centralised ledger, or any other data structure; adjusting each player's token balance on the digital wallet or account based on player actions and interactions; and displaying on each player's computing device each player's game score, which is dynamically linked to their token balance.
Absstract of: WO2025220886A1
A method and a device for managing verification of an FoD certificate on the basis of a blockchain are disclosed. According to an embodiment of the present disclosure, a method performed by a device for managing verification of an FoD certificate may comprise the steps of: generating a private key, a public key, and a blockchain-based address on the basis of a vehicle identification number (VIN) of a vehicle and personally identifying information (PII) of a driver; when the verification of the FoD certificate is completed, generating a data format on the basis of the verification of the FoD certificate; generating a transaction by using the data format and the private key; transmitting information of the transaction to a verification node; and when the verification node completes the verification of the transaction by using the public key, receiving verification result information of the transaction from the verification node, and generating blocks by using the verification result information of the transaction.
Absstract of: KR20250151942A
본 발명은 딥러닝 기반 중고 골프공의 분류와 블록체인 기반 보상이 가능한 시스템에 관한 것으로서, 보다 구체적으로는, 시스템으로서, 중고 골프공이 투입되는 투입구가 구비되어 상기 중고 골프공을 수집하는 볼 수집 장치; 상기 볼 수집 장치에서 수집한 상기 중고 골프공을 자동으로 세척하는 볼 세척 장치; 세척된 상기 중고 골프공을 촬영한 영상을 이용해 딥러닝 기반으로 상기 중고 골프공의 외형을 검사하고, 등급을 분류하는 딥러닝 처리부; 및 상기 중고 골프공의 등급에 따라, 블록체인 기반의 포인트를 지급하는 블록체인 보상부를 포함하는 것을 그 구성상의 특징으로 한다. 또한, 본 발명은 딥러닝 기반 중고 골프공의 분류와 블록체인 기반 보상이 가능한 방법에 관한 것으로서, 보다 구체적으로는, 중고 골프공이 투입되는 투입구가 구비되어 상기 중고 골프공을 수집하는 볼 수집 장치; 상기 볼 수집 장치에서 수집한 상기 중고 골프공을 자동으로 세척하는 볼 세척 장치; 세척된 상기 중고 골프공을 촬영한 영상을 이용해 딥러닝 기반으로 상기 중고 골프공의 외형을 검사하고, 등급을 분류하는 딥러닝 처리부; 및 상기 중고 골프공의 등급에 따라, 블록체인 기반의 포인트를 지급하는 블록체인 보상부를 포함하는
Absstract of: EP4637076A1
Systems and methods described herein relate to the execution of locking transactions in a blockchain system. In the context of smart contracts, it may be advantageous to have a public record (e.g., recorded on a blockchain) of a proof of correct execution of a circuit published by a worker and the verification key, thereby allowing anyone (e.g., nodes of the blockchain) to verify validity of the computation and proof. However, there are challenges to recording large blocks of data (e.g., large keys that may comprise multiple elliptic curve points) on the blockchain. For example, in a Bitcoin-based blockchain network, a protocol that utilizes standard transactions may be constrained to locking scripts and unlocking scripts that are collectively not larger than a first predetermined size limit, and the size of a redeem script (if utilized) may be limited to being no more than a second predetermined size limit.
Absstract of: KR20250151932A
블록체인 기반 재생제품 이력 및 잔존가치 추적 시스템이 개시된다. 본 발명의 일 실시예에 따른 블록체인 기반 재생제품 이력 및 잔존가치 추적 시스템은 재생제품을 수거하고 재가공하는 기업에서 사용하는 기업 단말, 토큰 발행, 제품 이력정보 등록, 변경, 조회 및 검증을 포함하는 블록체인 기반 기능을 수행하는 제1 시스템 및 상기 기업 단말로부터 수신한 요청을 상기 제1 시스템에 전달하고, 상기 제1 시스템으로부터 수신한 결과물을 상기 기업 단말에 전달하는 제2 시스템을 포함할 수 있다.
Absstract of: KR20250150335A
본 발명은 블록체인 네트워크를 기반으로 팬 토큰을 서비스하는 방법에 있어서, (a) 블록체인 시스템이, 민터를 통해 기설정된 초기 가격인 제1 발행 가격에 대응되는 기설정된 초기 개수인 제1 개수의 팬 토큰을 볼트로 발행하여 주며, 상기 제1 개수의 상기 팬 토큰의 초기 발행 정보를 블록체인 네트워크에 등록함으로써 상기 팬 토큰의 현재 발행 총량 정보를 업데이트하는 프로세스, 및 유동성 풀에서 교환되는 상기 팬 토큰의 교환 가격 정보를 획득하며, 상기 팬 토큰의 상기 교환 가격 정보를 참조하여 산출한 기설정된 가격산출기준시간 동안의 참조 가격이 가격 변동 조건을 만족할 때마다, 상기 민터를 통해, 상기 제1 발행 가격으로부터 단위 가격별로 설정된 제2 발행 가격 내지 제n 발행 가격 - 상기 n은 2 이상의 정수임 - 중, 상기 가격 변동 조건에 따라 상기 참조 가격이 초과한 제j 발행 가격 내지 제k 발행 가격 - 상기 j는 2 이상이며, 상기 k 이하의 정수이고, 상기 k는 상기 j 이상이며 상기 n 이하인 정수임 - 에 대응되는 제j 개수의 상기 팬 토큰 내지 제k 개수의 상기 팬 토큰을 상기 볼트로 추가 발행하여 주며, 상기 팬 토큰의 추가 발행 정보를 상기 블록체인 네트워크에 등록함으로써 상기 팬 토큰의 상기 현재 발행 총
Absstract of: KR20250150332A
본 발명은 블록체인 네트워크를 기반으로 팬 토큰을 서비스하는 방법에 있어서, (a) 블록체인 시스템이, 민터를 통해 기설정된 초기 가격인 제1 발행 가격에 대응되는 기설정된 초기 개수인 제1 개수의 상기 팬 토큰을 볼트로 발행하여 주며, 상기 제1 개수의 상기 팬 토큰의 초기 발행 정보를 블록체인 네트워크에 등록함으로써 상기 팬 토큰의 현재 발행 총량 정보를 업데이트하는 프로세스, 및 유동성 풀에서 교환되는 상기 팬 토큰의 교환 가격 정보를 획득하며, 상기 팬 토큰의 상기 교환 가격 정보를 참조하여 산출한 기설정된 가격산출기준시간 동안의 참조 가격이 가격 변동 조건을 만족할 때마다, 상기 민터를 통해, 상기 제1 발행 가격으로부터 단위 가격별로 설정된 제2 발행 가격 내지 제n 발행 가격 - 상기 n은 2 이상의 정수임 - 중, 상기 가격 변동 조건에 따라 상기 참조 가격이 초과한 제j 발행 가격 내지 제k 발행 가격 - 상기 j는 2 이상이며 상기 k 이하의 정수이고, 상기 k는 상기 j 이상이며 상기 n 이하인 정수임 - 에 대응되는 제j 개수의 상기 팬 토큰 내지 제k 개수의 상기 팬 토큰을 상기 볼트로 추가 발행하여 주며, 상기 팬 토큰의 추가 발행 정보를 상기 블록체인 네트워크에 등록함으로써 상기 팬 토큰의 상기 현재 발�
Absstract of: WO2025217178A1
Procedures, methods, architectures, apparatuses, systems, devices, and computer program products directed to blockchain-enabled collaborative application deployment and operation in wired and/or wireless communications are provided. Among the methods is a method that may include transmitting a request to join a collaboration group associated with a set of collaborative applications; receiving, based on the request, a response including information indicating a proposal of a smart contract; transmitting feedback based on the proposal of the smart contract; and receiving an acknowledgement notification indicating status information of the smart contract and that one or more devices have joined the collaboration group.
Absstract of: US2025322708A1
A method for performing a determination of voter eligibility and facilitation of secure electronic voting is provided. The method includes authenticating a voter according to security setting and displaying a voting page for a jurisdiction corresponding to the voter's residence. The method then transmits to an adjudicating entity, voter information for determination of voter eligibility, and stores the voter information in a non-public blockchain. The method further includes determining whether the voter is eligible to vote based on the voter information stored in the non-public blockchain, generating a unique voter specific ballot for the voter in response to a determination that the voter is eligible to vote, and transmitting, to the adjudicating entity, a ballot selection received from the voter. The ballot selection is then stored on a public blockchain, and made available for release.
Absstract of: WO2025215021A1
A MPC system and a method is provided to reduce the total costs of a multi-party computation using pre-processed data in a secure manner and ensure a high quality and validity of the computation when using pre-processed data in the MPC, such that the MPC protocol can perform the required computation in an easy and rapid manner. The MPC system for cross-chain communication between MPC groups comprises a plurality of servers to execute programs related to MPC or blockchains. The MPC system comprises MPC computing groups comprising at least two servers, wherein the MPC computing group is configured to perform MPC using MPC pre-processed data, wherein said MPC computing group is configured to be in communication with a first blockchain. One or more MPC pre-processing groups comprising at least two servers, wherein the MPC pre-processing group is configured to generates MPC pre-processed data, wherein said MPC pre-processing group is configured to be in communication with a second blockchain. At least one first server supports the first blockchain and at least one second server supports the second blockchain. The MPC computing group generates an order for MPC pre-processed data in the first blockchain. The first blockchain deploys the order for the MPC pre-processed data into the second blockchain. The second blockchain is configured to selects MPC pre-processing group or groups to provide the MPC pre-processed data. The selected MPC pre-processing group provides the MPC pre-proce
Absstract of: WO2025216808A1
Certain aspects of the present disclosure provide techniques for securely minting and distributing tokens on a blockchain. An example method generally includes configuring, by an owner of a token deployed on a blockchain, a premint wallet smart contract associated with a token preminter that generates preminted tokens for the token. The token preminter and premint token spenders are configured by the owner of the premint wallet smart contract. A plurality of tokens are minted by the token preminter to the premint wallet. At one of the premint token spenders, a request to spend an amount of preminted tokens from the premint wallet is received. The requested amount of preminted tokens is compared to a spending allowance defined for the token premint spender, and based on the comparing, the requested amount of preminted tokens are transferred by the token premint spender from a premint wallet to a destination wallet.
Absstract of: WO2025214178A1
An identity authentication method based on a building Internet of Things. The method comprises: a client sending a first request message for acquiring an anonymous identifier to a server; when the first request message passes verification against a real user information table previously uploaded to a private blockchain, the server generating an anonymous identifier on the basis of a user authentication identifier, uploading anonymous user information comprising the anonymous identifier to an anonymous user information table of a consortium blockchain, and returning the anonymous identifier to the client; the client sending a second request message for acquiring an anonymous credential to a first management node; and when it is verified on the basis of the anonymous user information table that a user corresponding to the anonymous identifier has permission to access a target building device, the first management node generating an anonymous credential corresponding to the anonymous identifier, and returning the anonymous credential to the client.
Absstract of: WO2025213464A1
A method for handling blockchain transaction where a client transmits a request to endorse a transaction with a special indication that such transaction should be batched with other transactions to one or more endorsing peers. Moreover, each endorsing peer simulates persisting the transaction invocation request to the ledger and, if the simulation is successful, adds an identifier for the transaction, TxID and invocation parameters to a WriteSet and sends a response to the client. In addition, the client sends an order request for the transaction to an ordering service for the inclusion of the transaction in a block, such as a gossip message received by each peer, which validates and commits the transaction. Moreover, a coordinator invokes a transaction that triggers the batch execution of a group of such pending transactions, such as all transactions of the batch are executed as one transaction representing the impact of all batched transactions.
Absstract of: US2025322394A1
A system and method for generating risk assessment scores for blockchain addresses and smart contracts, including constructing a graph representation having nodes representing one of a blockchain address or a smart contract address on a blockchain and edges representing a transaction between an externally-owned blockchain account on the blockchain network and a smart contract address on the blockchain network, applying pattern recognition algorithms to the graph representation to identify sub-graphs having nodes indicating relationship structures indicative of potential fraudulent activity, executing filtering that analyze transaction flows, logic patterns, and behavioral characteristics of nodes within each sub-graph, and determining a risk score for each blockchain account address and smart contract address associated with each sub-graph.
Nº publicación: US2025322392A1 16/10/2025
Applicant:
SIMBA CHAIN INC [US]
Simba Chain, Inc
Absstract of: US2025322392A1
Devices and systems for implementing decentralized custodial wallets are described. The described embodiments advantageously provide private key management, decentralization, and privacy. Embodiments of the disclosed technology further provide an example method that includes receiving, from a user, an input indicative of an instruction that creates a decentralized identifier (DID) associated with a public/private key pair of the user that includes a user public key and a user private key. The method further includes transmitting, to a data registry on a blockchain, public information associated with the user and the user public key, generating (a) a verifiable credential (VC) data structure comprising the DID, a plurality of attributes, and a first plurality of proofs, and (b) a verifiable presentation (VP) data structure comprising the VC data structure and a second proof. Herein, each proof of the first plurality of proofs verifies a veracity of a corresponding attribute of the plurality of attributes, each proof is signed by the DID, and the VC data structure is signed by a VC-generation key.