Absstract of: WO2025170595A1
A method includes a first user device generating an interaction message during an interaction between the first user device and a second user device. The interaction message includes an amount, an expiry time, and a condition. The first user device can provide the interaction message to the second user device. The second user device can obtain a witness that satisfies the condition. The first user device can receive the witness or a proof. The first user device can verify that the witness satisfies the condition or the validity of the proof. A transfer of the amount from a first user to a second user according to the interaction is facilitated using a blockchain.
Absstract of: WO2025168319A1
Methods, devices, and data structures for processing large volumes of transactions in blockchain nodes. To prevent avoidance of validation operations by one or more nodes, a sending node creates an intentionally invalid array of blockchain transactions that contains an invalid transaction. The sending node provides the valid transaction to enable receiving nodes to replace the invalid transaction with the valid transaction, once the receiving nodes have detected invalidity of the invalid transaction, thereby enabling them to convert the invalid array of transactions into a valid array of transactions during a mining phase and prior to discovery of a block solution. The providing may be by way of direct peer-to-peer messaging between the sending node and the receiving node after invalidity is detected or through pre-broadcast of a commit message containing the valid transaction that the receiving nodes may unlock once they have identified the invalid transaction.
Absstract of: WO2025170552A1
The invention is reiated to a digital asset securitization and data automation system and method utilized by finance sector players such as banks, financial institutions, asset management companies, investment funds, insurance companies, and other service providers. This system and method enable the efficient and secure securitization of receivables, including loans, invoice receivables, note receivables, and future receivables, using smart contracts and blockchain technology. It accurately analyzes the real-time performance of assets, thus protecting investors against potential principal losses or unexpected payment shortages. The system and method provide services for instant monitoring and asset conversion, and secure transfer, enhancing the security and efficiency of financial transactions in the sector.
Absstract of: WO2025169536A1
This information terminal is provided with a control unit, an authentication device, and a communication unit. The communication unit is configured to communicate with an authentication server, which is a device separate from the information terminal. The control unit is configured to acquire a passkey public key from an authenticator and transmit the passkey public key to the authentication server on condition that identity verification by the authenticator is successful. The passkey public key is registered in association with a predetermined character string in the authentication server. The control unit is configured to transmit an electronic signature generated on the basis of a passkey secret key to the authentication server, acquire a predetermined character string registered in the authentication server, and generate a blockchain secret key on the basis of the acquired predetermined character string and a qualified person ID. The qualified person ID is generated in the authenticator on the basis of the passkey secret key.
Absstract of: WO2025166438A1
The present invention proposes a proof-of-nature consensus blockchain that requires proof of the existence of preserved natural areas in order to achieve consensus on the network. The disclosed system comprises: a set of geographic and environmental data structures; a network of nodes, in which connections are established; a nature monitoring system integrated with the distributed registration system, which enables the verification of the existence of natural areas in the system; and a proof-of-nature consensus protocol, which requires proof of the existence of preserved natural areas. The proposed system creates an innovative consensus model that transforms nature into the driving force for sustaining and operating the proof-of-nature consensus distributed ledger system disclosed in the present invention.
Absstract of: US2025259431A1
Disclosed is a method of authenticating a digital video file on a video authentication data processing platform, comprising steps of: receiving a digital video file which is being introduced to the video authentication data processing platform; processing the received digital video file using an artificial intelligence (AI) agent, which includes an artificial neural network, resulting in identifying a plurality of fragments of the received digital video file which are determined by the AI agent as being authentication candidates which are representative of an entirety of the received digital video file; generating a hash of each of the plurality of fragments of the received digital video file; and storing the generated hashes on a blockchain.
Absstract of: US2025259401A1
A content management method, in particular a location-based, preferably decentralized, content management method, is configured at least for managing digital contents within a metaverse linked to a distributed ledger technology (DLT), such as a blockchain or a tangle, wherein a virtual space defined by the metaverse is divided into a number of segments, in particular volume segments, arranged next to one another and/or above one another, and wherein digital contents are assigned to individual segments, wherein a decentralized autonomous organization (VolumeDAO) set up on the DLT is assigned to at least one of the segments.
Absstract of: US2025258947A1
An electronic device receives, from a user, a restriction that restricts how sound of a digital asset plays to non-owners of the digital asset that is tokenized as a non-fungible token (NFT). One or more electronic devices tokenize the digital asset as the NFT on a blockchain that stores the restriction how the sound of the digital asset plays to the non-owners of the NFT.
Absstract of: US2025259169A1
Disclosed embodiments may include a system for generating aggregate records. The system may retrieve data corresponding to a first user. The system may receive, from the first user, first sharing preference(s) associated with a second user. The system may extract first data subset(s) from the data based on the first sharing preference(s). The system may generate block(s) of a blockchain ledger. The system may append the first data subset(s) to at least a first block of the block(s) of the blockchain ledger. The system may provide the second user with access to the first data subset(s) on the at least first block.
Absstract of: US2025259174A1
A block chain-based transaction processing method includes: determining a smart contract configured for processing a transaction; determining a target resident contract process according to flag values corresponding to resident contract processes recorded in a maintenance array, the maximum number of resident contract processes recorded in the maintenance array being the maximum number of contract processes supported by a docker deployed in a block chain node; replacing, in the maintenance array, the target resident contract process with a target contract process corresponding to the smart contract, and modifying a target flag value corresponding to the target contract process to a first value, the first value characterizing that a corresponding contract process is in an executed state; and transmitting the transaction to the target contract process for processing.
Absstract of: US2025259183A1
A system includes computing nodes coupled and communicating within a peer-to-peer network in a point-to-point manner. The computing nodes are part of a distributed routing network or a centralized routing platform. The computing nodes receive, via a communications subsystem, from one or more upstream entities, a record of a transaction between the one or more upstream entities, recording, within the distributed routing network or the centralized routing platform, a log entry, route, in a point-to-point manner, the log entry to one or more downstream entities, receive, from the one or more downstream entities, an authorization of the transaction, route, to the one or more upstream entities, the authorization of the transaction, and updating the record of the transaction at the distributed routing network or a centralized routing platform by appending the authorization of the transaction and to provide a guarantee of validity of the transaction.
Absstract of: US2025259165A1
A system may store, in an offline storage, a private cryptographic key that corresponds to a public cryptographic key that corresponds to a blockchain address of a blockchain. The system may connect temporarily to the offline storage to generate one or more pre-authorized transaction requests using the private cryptographic key stored in the offline storage. The system may disconnect the offline storage from the computing device. The system may store the one or more pre-authorized transaction requests in the computing device, wherein the one or more pre-authorized transaction requests include pre-determined parameters such that the one or more pre-authorized transaction requests are broadcastable to the blockchain without further retrieving the private cryptographic key stored in the disconnected storage.
Absstract of: US2025259167A1
Federated Learning systems and methods optimize blockchain transaction processing speed (TPS) and carbon efficiency. Blockchain networks have nodes with a Local Federated Learning Model (LFLM) that can develop/refine computational strategies for block generation in PoW systems or transaction validation in POS systems without revealing sensitive data. Nodes communicate with a Federated Learning Information Server (FLIS) to aggregate, analyze, and distribute optimized strategies across the network to reduce block generation and transaction validation computational resources. This boosts TPS and cuts blockchain network energy use. Incentive-mechanisms reward nodes that create/share efficient computational strategies, encouraging innovation. Dynamic strategy adoption modules select and apply optimum strategies based on network conditions and node capabilities. The POS system auto-approves validators to ensure transaction validation. Decentralized computational strategy exchange via a peer-to-peer protocol is also disclosed. Federated Learning with blockchain technology improves operational efficiency and reduces energy consumption and carbon footprint.
Absstract of: US2025258895A1
A method of integrating a cryptographic digital asset into a digital software application, includes receiving a digital asset identification (ID) code, the digital asset ID code existing together with a unique owner ID code on a distributed blockchain ledger. The digital asset ID code represents the cryptographic digital asset, and the cryptographic digital asset comprises a plurality of attributes. A virtual object is then represented on the display via the digital software application. The virtual object has an appearance that is based on the plurality of attributes of the cryptographic digital asset, and the virtual object includes a plurality of object attributes. The method further includes modifying at least one of the object attributes according to an aspect of the digital software application or interaction between the character avatar and the virtual object and representing a modified virtual object on the display via the digital software application.
Absstract of: US2025260680A1
Systems, methods and products for multi-person, multi-factor authentication of users seeking access to resources is provided that use at least one authentication factor and voting over secure blockchain distributed ledgers with Smart Contracts and artificial intelligence to determine whether access should be authorized.
Absstract of: US2025260577A1
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for establishing a proof of storage over a specified period of time. One of the methods includes: (i) receiving, at a prover, an initial input challenge; (ii) producing, at the prover, an output proof proving that the prover has access to specified data for a specified time, wherein producing the output proof includes: (a) producing, at the prover, an initial proof responsive to the initial input challenge, the initial proof proving that the prover is storing specified data; (b) generating, at the prover, a new input challenge based at least in part on the initial proof: (c) producing, at the prover, a new proof responsive to the new input challenge, the new proof proving that the prover is storing the specified data; and (d) repeating, at the prover, the generating step and the producing a new proof responsive to the new input challenge step a number of times, the repeating step generating sequential proofs of storage to determine time of storage, wherein each generating step is based at least in part on a most recent new proof; and (iii) forwarding the output proof, e.g., to a blockchain.
Absstract of: US2025260562A1
Systems, methods and products for blockchain distributed networks, including software defined networks, are provided, that include a management plane blockchain for distributing public keys and other management functions, a control plane blockchain for configuring how to communicate data, and a data plane blockchain to communicate data, including private keys, that each interact with artificial intelligence and use quantum generated random numbers for encrypted keys and other processes, and which can be controlled by human users, artificial intelligence users, or a combination of both users.
Absstract of: US2025260565A1
A computer-implemented method and system for privacy-preserving location verification in distributed networks comprises initializing a multi-modal biometric authentication system on a user device, generating cryptographic keys using a distributed key generation protocol, binding the cryptographic keys to biometric templates using a fuzzy vault scheme, constructing and broadcasting encrypted location beacons, and generating zero-knowledge proofs of location claims. The system includes user devices equipped with biometric sensors and verifier devices configured to validate location claims and maintain consensus in a blockchain network. The method implements real-time liveness detection for multiple biometric input types, executes fault-tolerant consensus algorithms with privacy preservation, and maintains a dual-scoring mechanism comprising device trust scores and user reputation scores. The system enables secure location verification while preserving user privacy through cryptographic protocols and biometric authentication in decentralized environments.
Absstract of: US2025260569A1
A security server storing a plurality of cryptographic keys to support device authentication, access control and proof of space plot farming. The cryptographic keys can include a first cryptographic key representative of an identity of a memory device, a second cryptographic key representative of a privilege to access a memory region in the memory device, and a third cryptographic key representative of a pool of proof of space plots. The security server can sign blocks in a blockchain created via plots in the pool, sign commands to access the memory region, and secure transfer of the second and/or third cryptographic key to the computer operated by an owner of the memory device.
Absstract of: US2025260590A1
A user device is disclosed. The user device comprises means for storing at least one private key of a user of the user device and predefined auto-signing rules; receiving a blockchain transaction; decoding the blockchain transaction according to a blockchain transaction model to extract attributes of the blockchain transaction; submitting the decoded blockchain transaction to an auto-signing rules engine; evaluating the blockchain transaction by the auto-signing rules engine based on the auto-signing rules by comparing the attributes of the blockchain transaction and conditions of the auto-signing rules; and automatically deciding based on the evaluation and the auto-signing rules whether to automatically sign the blockchain transaction on behalf of the user using the at least one private key, to reject the blockchain transaction on behalf of the user, or to submit the blockchain transaction to the user to let the user decide on signing the blockchain transaction.
Absstract of: US2025260589A1
Systems, methods and products for multi-key cryptography for blockchains and secure access to resources is provided using two public or private blockchain distributed ledgers wherein one blockchain stores a public key in Smart Contracts/metadata and the other stores a private key and the public key is only accessed by authorized persons with the private key.
Absstract of: US2025259712A1
A method and system for obtaining and controlling non-human genetic identification information are disclosed. The method includes providing identifying information of a plant, a non-human animal, or a living plant or animal product to a secure website using an electronic communication device; taking a genetic material-containing sample from the plant, animal or living product; providing the genetic material-containing sample to a genetic material analysis facility; analyzing the genetic material at a plurality of loci to produce a genetic identity for the plant, animal or living product; recording the identifying information and the genetic identity in a blockchain ledger; and enabling a user to display on an electronic communication device a code corresponding to the genetic identity. The system includes a genetic material sampling kit, an optional DNA analysis kit, and electronic communication device(s) configured to enter the plant's, animal's or living product's identification information, record the identification information and the genetic identity in the blockchain ledger, and display a code corresponding to the genetic identity.
Absstract of: WO2025168298A1
Embodiments include but are not limited to: solutions for securing and verifying data, controlling access to controlled resources, proving identity and/or authorisation, implementing agreements between computer-based resources. In an example, a first node (Alice) sends an encrypted challenge to a second node (Bob). The challenge can also be called a puzzle. The challenge has been encrypted using the Bob's public key. Upon receipt, the Bob uses his corresponding private key to decrypt Alice's challenge. This enables him to compute a solution and send it to Alice as proof that he must have decrypted her challenge and must, therefore, have knowledge or possession of the private key. If Bob does not have the private key, he is unable to decrypt the challenge and provide the correct solution. Some embodiments can be implemented using a blockchain for provision and execution of the challenge and/or solution.
Absstract of: WO2025170644A2
The present disclosure provides a decentralized data mixing (DDM), a cryptographic scheme for non-interactive data mixing. The DDM scheme enables blockchain users to commit to specific data, and subsequently, utilize the encrypted version of this previously registered data across various blockchain applications without association to the original address that logged the data. DDM offers the following features: (i) no double redemption: a malicious user cannot redeem and use the same data twice; (ii) theft prevention: a malicious user cannot use data that is not registered by him; (iii) non-slanderabilty: a malicious user cannot prevent an honest user from using her data; and (iv) unlinkability: a malicious user cannot link a tainted data from an honest user to the corresponding mixed data.
Nº publicación: EP4601241A1 13/08/2025
Applicant:
BSV ASS [CH]
BSV Association
Absstract of: EP4601241A1
Methods, devices, and data structures for processing large volumes of transactions in blockchain nodes. To prevent avoidance of validation operations by one or more nodes, a sending node creates an intentionally invalid array of blockchain transactions that contains an invalid transaction. The sending node provides the valid transaction to enable receiving nodes to replace the invalid transaction with the valid transaction, once the receiving nodes have detected invalidity of the invalid transaction, thereby enabling them to convert the invalid array of transactions into a valid array of transactions during a mining phase and prior to discovery of a block solution. The providing may be by way of direct peer-to-peer messaging between the sending node and the receiving node after invalidity is detected or through pre-broadcast of a commit message containing the valid transaction that the receiving nodes may unlock once they have identified the invalid transaction.