Resumen de: US2025350475A1
A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.
Resumen de: AU2024251148A1
A computer system and method for storage and retrieval of multiple encrypted data. The system and method allow a user to first encryption data with a first key only held by the user such that the user solely possesses one of the necessary keys for later decryption of the stored and encrypted data. The firstly encrypted data is then doubly encrypted and stores the data in such a secure manner that the data can be stored on a public blockchain architecture, if desired. Full decryption of the original user data can only be performed with access to the user's initial key.
Resumen de: AU2024259188A1
Liquidity and security mechanism are described as part of a unified cryptographic wallet. In an implementation, a request is received by a server to initiate a transaction involving a fund transfer using a blockchain network or a decentralized network. A determination is made, automatically and without user intervention, whether to perform the transaction, e.g., based on a threshold. The request responsive to determining to perform the transaction. The signed request is communicated to initiate the fund transfer of the transaction using the blockchain network or the decentralized network.
Resumen de: US2025348942A1
Provided herein a method for secure and real-time converting a volatile asset into another asset in a quantum-resistant blockchain network using an Artificial Intelligence (AI) model. The method includes receiving volatile asset conversion request and user preferences from a user through a user device, personalizing the AI model by identifying patterns and correlations between the user preference, and the real-time behavioral patterns and the historic data of the user to personalize the AI model, predicting value of each volatile asset over time using the personalized AI model, determining an optimal time to convert each volatile asset based on the predicted value of the volatile assets over time, converting each volatile asset into another asset preferred by the user, at the determined optimal time and generating a smart contract on the quantum-resistant blockchain network to secure each volatile asset's conversation into another asset.
Resumen de: US2025348875A1
Methods and systems are presented for tracking activities that occur off of a first layer blockchain in in a second layer network built on the first layer blockchain. In one embodiment, a computer system determines that a transfer of cryptocurrency from a first node to a second node has transpired in the second layer network based on querying channel capacities in the second layer network. The computer system determines a first public address for the first node based on information associated with a first channel that connects the computer system and the first node in the second layer network, and determines a second public address for the second node based on information associated with a second channel that connects the computer system and the second node in the second layer network. The first public address and the second public address are used to monitor activity in the first layer blockchain.
Resumen de: US2025348871A1
A computer-implemented method of journaling messages sent to and/or from a first party, wherein the method comprises: determining a first message to be journaled, wherein the first message is sent to or from the first party; generating a first journaled message, wherein the first journaled message comprises a copy of the first message; storing the first journaled message and/or an encrypted version of the first journaled message at a storage location; causing a first blockchain transaction to be sent to a blockchain network to be recorded on a blockchain, wherein the first blockchain transaction comprises a first hash generated by hashing at least the first journaled message.
Resumen de: US2025348943A1
A Universal Decentralized Banking, Wallet, Vault and BEISIGN Secure Clearing System is disclosed, integrating AI Governance, Asset Tokenization, and an Integrated Domain Ecosystem. This system establishes a robust blockchain-based financial architecture for individuals, institutions, and governments, ensuring infinite scalability, dynamic growth, and enhanced security. A Master AI Protocol autonomously manages financial operations, including risk assessment, dynamic asset valuation, anomaly detection, and governance proposals. The system supports comprehensive asset tokenization into NFTs for diverse real-world and digital assets, enabling fragmentation and use as collateral. Crucially, a novel BEISIGN Secure Clearing System replaces traditional SWIFT/switch codes by providing a privacy-preserving dual confirmation layer for transactions, enhancing security, privacy, and efficiency in clearing and settlement. An Integrated Domain Ecosystem binds curated domain names (e.g., BEISIGN.com, ATMS.com) to core smart contracts, digital identities, and tokenized assets, serving as trusted operational entry points and enhancing brand protection. This invention delivers a highly secure, private, scalable, and autonomous banking solution with significant cost reduction and enhanced trust.
Resumen de: US2025348829A1
The present disclosure relates to the field of supply chain management and traceability through a commodity value chain. More specifically, the disclosure pertains to systems that track and record transactions of digital assets associated with physical commodities, recycling materials or goods using blockchain technology.
Resumen de: US2025348304A1
Disclosed are systems, methods, and media for using a secure dataloading system for updating an aerospace system. The secure dataloading system includes a communications module that is configured to communicatively couple the secure dataloading system to the aerospace system. The secure dataloading system also includes a processor that is configured a to access a software repository storing a secure software update having a unique hash ID to provide a copy of the secure software update to the aerospace system via the communications module. The processor can be configured to use a blockchain to validate the unique hash ID of the software update and, upon validation of the unique hash ID, install the secure software update on the aerospace system.
Resumen de: US2025348866A1
A blockchain includes different digital assets, including digital tradeable tokens and inventory tokens. The blockchain may implement a transaction type that includes both digital tradeable tokens and the inventory tokens. The digital tradeable tokens and inventory tokens may be associated with physical assets that can be uniquely identified and are intended to be fungible with each other. The validation rules of the blockchain may rely upon quantities of the digital tradeable token and inventory tokens satisfying a predetermined relationship.
Resumen de: US2025348864A1
Systems, methods, and computer-readable media disclosed herein relate to reducing computation and computing resources for certain blockchain related transactions. Specifically, software algorithms and architecture allow some transactions to avoid the need for recordation on a blockchain, which can be computationally expensive both for a requesting device and for various nodes on the blockchain. Thus, a computer system may receive indications of incoming transactions transferring digital assets to particular user accounts, and in response to requests from user accounts, the computer system facilitates one or more internal transactions between those accounts. In response to a request from a particular internal user account, the computer system may perform an outgoing transaction transferring one or more digital assets to an external user account from one or more internal user accounts. The incoming transactions and outgoing transaction are recorded on the blockchain, but the internal transactions are recorded on an internal ledger rather than the blockchain, saving computational power and improving computer operations.
Resumen de: US2025348873A1
A method includes: generating a first transaction configured to spend a first blockchain object representing a first asset, spend a second blockchain object representing a second asset, and generate a state channel object associated with an initial virtual object representing an initial state; transmitting the first transaction to a distributed network for inclusion in a first block of a blockchain; generating a second transaction configured to spend the initial virtual object and generate a first virtual object representing a first state; generating a third transaction configured to spend the state channel object associated with a target virtual object representing a target state, generate a third blockchain object representing a third asset based on the target state, and generate a fourth blockchain object representing a fourth asset based on the target state; and transmitting the third transaction to the distributed network for inclusion in a second block of the blockchain.
Resumen de: US2025348617A1
Multi-layer ensembles of neural subnetworks are disclosed. Implementations can classify inputs indicating various anomalous sensed conditions into probabilistic anomalies using an anomaly subnetwork. Determined probabilistic anomalies are classified into remedial application triggers invoked to recommend or take actions to remediate, and/or report the anomaly. Implementations can select a report type to submit, or a report recipient, based upon the situation state, e.g., FDA: Field Alert Report (FAR), Biological Product Deviation Report (BPDR), Medwatch, voluntary reporting by healthcare professionals, consumers, and patients (Forms 3500, 3500A, 3500B, Reportable Food Registry, Vaccine Adverse Event Reporting System (VAERS), Investigative Drug/Gene Research Study Adverse Event Reports, Potential Tobacco Product Violations Reporting (Form 3779), USDA: APHIS Center for Veterinary Biologics Reports, Animal and Plant Health Inspection Service: Adverse Event Reporting, FSIS Electronic Consumer Complaints, DEA Tips, Animal Drug Safety Reporting, Consumer Product Safety Commission Reports, State/local reports: Health Department, Board of Pharmacy.
Resumen de: US2025348616A1
A system and method for constructing blockchain ledger of shared digital confidential information. The system comprising a blockchain ledger comprising a public access history of digital confidential information at a plurality of local ledgers; a database comprising the digital confidential information accessible by users having access credentials; a processor; and a non-transitory computer readable medium storing machine-readable instructions that when executed by the processor cause the processor to: initialize a transaction at a client node of the blockchain ledger, broadcast a transaction invocation request to a plurality of peer nodes, endorse the transaction at one or more peer nodes, submit the transaction to an order node, deploy a block comprising the transaction on a blockchain, wherein the transaction is properly ordered at the order node, broadcast the transaction to the plurality of peers, and update the plurality of local ledgers with the transaction block.
Resumen de: US2025348607A1
Methods and systems for processing a blockchain comprising a plurality of immutable insurance policy payment records corresponding to insurance policies are provided. According to certain aspects, a transaction request indicating a policy payment for an insurance policy may be received at a first node. A block including an insurance policy payment record indicating the policy payment may be added to a blockchain and transmitted to another node for validation. The first node may add the block to a copy of the blockchain, where the block may be identified by a hash value that references a previous block in the blockchain that includes at least one additional insurance policy payment record.
Resumen de: US2025350464A1
Computing systems are configured to provide a hierarchical organization of blockchain operations, efficiently storing recursive hashes that allow quick verification of received data and data state. Received data from authorized users in associated and stored by representation at a corresponding position in the hierarchy. The computer hashes and tokenizes received data with the hash and stores the same. Each token created is then separately hashed with time and creator into a listing of all such tokens within an object. Such re-hashing is reiterated up each hierarchy level and stored in the containing object. The lists of all hashes at each level can be used to verify a state or individual document that will be reflected in the stored listings is accurate or currently true. Additionally, user actions and histories, as well as state progression and history, can be queried and reported easily with the lists.
Resumen de: US2025350462A1
This present disclosure provides methods and apparatuses for preserving privacy of account data in a blockchain. In an implementation, a method includes: determining, in response to receiving a target transaction, whether the target transaction involves a private account, and executing the target transaction in a trusted execution environment in response to determining that the target transaction involves a private account, wherein account data of the private account is encrypted and is stored in a target storage space outside the trusted execution environment.
Resumen de: US2025350477A1
Systems and computer-implemented methods for freezing or unfreezing digital assets on a blockchain. A freeze administration service may send a signed freeze request to mining nodes, which maintain two blacklists of digital asset identifiers: a pending blacklist and a consensus blacklist. The digital asset identifiers may be transaction outpoints in some cases. If accepted by the mining node, the transaction outpoints in the freeze request are added to the pending blacklist, which causes rejection of any transactions using those outpoints, but does not cause rejection of any new blocks that include transactions using those outpoints. If a consensus threshold of acceptances is reached based on hash power, the request becomes an order and the outpoints are added to the consensus blacklist, which causes rejection of any transaction or block containing a transaction using those outpoints.
Resumen de: US2025350482A1
A method for communicating data between a first blockchain and a second blockchain includes: accessing a message identifier for a message associated with the second blockchain; accessing signatures representing detection of the message, containing a representation of the message identifier, in a block in the second blockchain by validator nodes for the first blockchain; generating a transaction including the signatures and configured to trigger a portal object to generate a message object, associated with the first blockchain, representing the message in response to detecting the signatures; and transmitting the transaction to a distributed network associated with the first blockchain for commitment in a block in the first blockchain.
Resumen de: US2025350470A1
System and methods for physical authentication using blockchain technologies. A user list is encoded via hashes of respective wallet addresses to construct a Merkle Tree. The Merkle Root of the constructed Merkle Tree is recorded on the blockchain. The Merkle Tree and the Merkle Root are updated each time a user is added to the organization. A user is authenticated by submitting a message to the client, which creates a Merkle Proof and sends it to the blockchain for authentication. The process can be facilitated by a mobile application that generates a Quick Response (QR) code representing the user's wallet address.
Resumen de: US2025350463A1
Computing systems are configured to provide a hierarchical organization of blockchain operations, efficiently storing recursive hashes that allow quick verification of received data and data state. Received data from authorized users in associated and stored by representation at a corresponding position in the hierarchy. The computer hashes and tokenizes received data with the hash and stores the same. Each token created is then separately hashed with time and creator into a listing of all such tokens within an object. Such re-hashing is reiterated up each hierarchy level and stored in the containing object. The lists of all hashes at each level can be used to verify a state or individual document that will be reflected in the stored listings is accurate or currently true. Additionally, user actions and histories, as well as state progression and history, can be queried and reported easily with the lists.
Resumen de: US2025350481A1
Methods, systems, and devices for data management are described. A client application may receive an input to perform an action at a decentralized exchange. The client application may broadcast, via a blockchain network, messages configured to cause smart contracts on the blockchain network called by the decentralized exchange to verify whether a blockchain address associated with the input is authorized to perform the action at the decentralized exchange. In some examples, verifying may include checking a status managed by an entity different from the decentralized exchange. The smart contracts may perform the action after verifying that the blockchain address is authorized to perform the action, or the smart contracts may fail to perform the action after failing to verify that the blockchain address is authorized to perform the action.
Resumen de: US2025350474A1
The invention provides improved methods and systems for storing, sharing, accessing and processing data (content) on a blockchain. In one embodiment, there is provided a method of identifying a target transaction on a blockchain e.g. Bitcoin, comprising the steps of using a search path to identify the target transaction, the search path comprising: 1) a root transaction index (RTIndex) comprising a public key (RTPK) associated with the root transaction and an ID (RTID) associated with the root transaction; and 2) at least one attribute associated with the root transaction and/or the target transaction. This enables the creation and use of a search path analogous to that known in relation to the internet, but for the blockchain.
Resumen de: GB2640819A
The invention provides an autonomous system for airside autonomous baggage vehicles whereby commands, such as baggage dolly move from location to baggage hall, can be verified to confirm the request originates from a trusted source. A number of nodes can verify the request, and a consensus can be formed, i.e. if a total number of yes votes exceeds a threshold. If each node keeps a local blockchain then all verified requests can be added. The invention comprises comparing 204 a candidate trusted value received with a request with a trusted value stored at each node of the plurality of nodes, generating 205 a yes vote if the candidate trusted value matches the trusted value stored at a respective node, and verifying 208 the request if the number of yes votes across the plurality of nodes exceeds a predetermined threshold. Trusted values may be a hash of data contained within a preceding request. Each node of the plurality of nodes may store the series of requests on a local blockchain stored on that node, with verified requests added to the local blockchain as they are verified.
Nº publicación: EP4647996A2 12/11/2025
Solicitante:
NCHAIN LICENSING AG [CH]
nChain Licensing AG
Resumen de: EP4647996A2
A computer-implemented method comprises creating, at a node in a blockchain network, a first transaction, wherein the first transaction includes a first output having a first spendable value and a first locking script and a second output having a second spendable value and a second locking script. A first set of constraints on a first selected transaction output is included in the first locking script, wherein the first set of constraints are to be met by a first unlocking script if the first selected transaction output is to be valid for spending the first spendable value. A second set of constraints on a second selected transaction output is included in the second locking script, wherein the second set of constraints are to be met by a second unlocking script if the second selected transaction output is to be valid for spending the second spendable value. The first set of constraints or the second set of constraints imposes a constraint on a locking script of a spending transaction having as a spending transaction output the first selected transaction output or the second selected transaction output.