Resumen de: US2025342231A1
Embodiments securely control an electronic asset. One such embodiment binds an asset non-fungible token (NFT) pertaining to an electronic asset with a representation of an identity of an authorized user node. The node is paired with the electronic asset. The representation includes an identification NFT. The representation and the asset NFT are registered on a blockchain associated with the electronic asset. In response to receiving a task request from the node, a task is computationally performed relating to the electronic asset, and the representation of the identity, and the electronic asset is securely controlled. The task includes at least one of: (i) granting access to the electronic asset by the node in response to the node satisfying at least one condition and (ii) denying the access to the electronic asset by the node in response to the node not satisfying the at least one condition.
Resumen de: WO2025230983A1
A method, server, system, and computer program product creates a three-dimensional (3D) virtual certificate of authenticity (COA) that is a multimedia container having a media file that provides for an experiential presentation in the 3D COA itself. The multimedia container with media file lends credibility to the authenticity of the 3D COA. The ownership of the 3D COA can be stored in a blockchain as a non-fungible token, and easily transferred from one claimant of the 3D COA to another.
Resumen de: US2025339781A1
Systems and methods are provided for gaming solutions across different gaming channels, different entities, and different environments using non-fungible token (NFT), blockchain, and/or metaverse components and/or functionality. A gaming device in a physical gaming environment can be synced with a gaming device in a metaverse gaming environment. NFTs can be associated with users, gaming devices, gameplay outcomes, and/or vouchers. NFTs can be actioned to players in a gaming computing environment through one or more gaming channels. NFTs can be actioned across different gaming channels, different entities, and different environments. A cross-channel application can pair a user computing device with a first gaming channel and apply a non-fungible token for personalization of the first gaming channel. The cross-channel application can pair the user computing device with a second gaming channel and a apply the NFT for personalization of the second gaming channel.
Resumen de: WO2025230990A1
A system and method for securing and efficiently signing cryptocurrency transactions using fully homomorphic encryption (FHE) comprising: receiving, from a first computer device, a first encryption of a cryptographic private key obfuscated by a first layer of encryption; encrypting the first encryption of the private key to generate a second encryption of the private key obfuscated by a FHE layer - without unencrypting the cryptographic private key; and transmitting the second encryption of the private key (directly or indirectly) to one or more untrusted third parties (which may include, e.g., server farms, cloud blockchain networks, and the like) to efficiently generate a cryptographic signature of a cryptocurrency transaction encrypted under the second encryption of the private key (e.g., the FHE layer).
Resumen de: WO2025229383A1
Techniques for enhancing privacy measures in a blockchain are disclosed. A service generates a smart contract for an asset. The smart contract includes a storage space having a public address field comprising a first public address value. The first public address value is associated with a first private key that is usable to generate a proof of ownership of the asset. The service deploys the smart contract to the blockchain. The service generates a second private key. The service uses the second private key to generate a second public address value. Despite a current owner of the asset not changing such that no transactions involving the asset are performed, the service transmits the second public address value to the smart contract to trigger the smart contract to replace the first public address value in the public address field with the second public address value.
Resumen de: US2025343700A1
A variety of techniques for authentication of jewelry and gemstones is provided. With some example embodiments, blockchain may be used to store a reference signature for the jewelry/gemstone, and a digital asset such as a non-fungible token can link this reference signature with the physical jewelry/gemstone. During an authentication process, the reference signature stored on the blockchain can be accessed and compared with a test signature derived from an item that is purported to be the original jewelry/gemstone to determine whether they match to support a declaration that the purported jewelry/gemstone is authentic.
Resumen de: US2025342521A1
A system and method for viewing a virtual digital object created from components having cryptocurrency value includes receiving a selection of at least one of an avatar, a captured image of the user or a third party, or a digital scene and receiving a selection of the virtual digital object for display on the selected avatar or captured image or within the digital scene. The virtual digital object includes metadata relating to at least one of cryptocurrency value of the virtual digital object, creation of the virtual digital object, and rules governing use and ownership of the virtual digital object. The user may manipulate the displayed virtual digital object within the display and may elect to display at least part of the metadata (e.g., price) along with the virtual digital object. The display of the virtual digital object may be captured and forwarded via a messaging or social media application.
Resumen de: US2025342426A1
Systems, devices, and methods provide for risk management between a source blockchain and a destination blockchain. A risk management network monitors transactions taking place utilizing a cross-chain interoperability protocol. The risk management network is separate from the transaction network. If aspects of the transaction (for example, committed and reconstructed Merkle roots) look as expected, the risk management network blesses the transaction and it proceeds to completion. In contrast, if an anomaly is detected, the risk management network curses the system and the transaction is paused so that the anomaly can be investigated and the transaction potentially reversed, cancelled, or otherwise modified.
Resumen de: US2025343703A1
Provided are blockchain transaction execution methods, apparatuses, computer-readable media and systems. An example method includes: receiving a first transaction, where the first transaction includes a first operation and a second operation, the first operation is used to call a first function in a first contract, and the second operation is used to call a second function in a second contract; and executing the first operation and the second operation.
Resumen de: US2025342466A1
According to a present invention embodiment, a system for renewing a blockchain asset comprises one or more memories and at least one processor coupled to the one or more memories. The system monitors for a set of conditions associated with renewal of the blockchain asset. The set of conditions controls renewal processing and includes one or more blockchain processing values for performance of the renewal on a blockchain. The blockchain asset is renewed on the blockchain in response to satisfaction of the set of conditions. Embodiments of the present invention further include a method and computer program product for renewing a blockchain asset in substantially the same manner described above.
Resumen de: AU2024241772A1
The method can include receiving a key generation request from a user; providing at least one value of a cost parameter associated to the user; calculating a cost value for a first key generation scheme using a cost function for the first key generation scheme and the at least one value of a cost parameter; calculating a cost value for a second key generation scheme using a cost function for the second key generation scheme and the at least one value of a cost parameter; comparing the cost value for the first key generation scheme to the cost value for the second key generation scheme; selecting one of the first key generation scheme and the second key generation scheme based on the results of the comparison; generating a blockchain key based on the selected key generation scheme; and storing the blockchain key in a non-transitory computer memory.
Resumen de: US2025342469A1
This specification provides transaction execution methods, nodes, and blockchain systems. The methods can be applied to a first node in a blockchain system, which includes a control process and N computing processes. In an example method, the control process acquires M transaction groups, where the M transaction groups are obtained by grouping transactions in a target block based on respective pre-execution read-write sets of the transactions, and M and N are positive integers. The control process acquires, when determining that there is another block that is in an execution phase, a pre-execution read-write set of a transaction in the another block, and sends a transaction group irrelevant to the acquired pre-execution read-write set, among the M transaction groups, to different computing processes in the N processes. A first computing process executes, when receiving any one of the M transaction groups, each transaction in the received transaction group.
Resumen de: US2025342496A1
A social media platform facilitates user interaction through digital environments called “bubbles,” which serve as customizable, collaborative spaces for content sharing and engagement. Users can participate in gamified events such as challenges, races, and raffles within these bubbles. The platform incorporates a blockchain-based reward system that issues digital assets, including tokens and non-fungible tokens (NFTs), based on user participation and performance. Each piece of content shared within a bubble can be assigned its own privacy level, independent of the user's account settings. The system supports role-based access, content moderation, and smart contract integration to ensure secure, transparent reward distribution.
Resumen de: US2025342467A1
Methods for deploying a contract in a blockchain and blockchain nodes are provided. In an implementation, a method includes: receiving a first transaction for deploying a first contract, where the first transaction invokes a second contract. An incoming parameter for the second contract includes a code identifier of first code and the value of an immutable variable in the first code, the code identifier and the first code are pre-stored in the blockchain, the first code includes a first function for initialize a contract, and the second contract includes a call to the first function. Before executing the first function based on the call in the second contract, obtaining the first function in the first code based on the code identifier when determining that the second contract is a system contract, and storing state data of the first contract in the blockchain by executing the first function.
Resumen de: US2025342462A1
Techniques for enhancing privacy measures in a blockchain are disclosed. A service generates a smart contract for an asset. The smart contract includes a storage space having a public address field comprising a first public address value. The first public address value is associated with a first private key that is usable to generate a proof of ownership of the asset. The service deploys the smart contract to the blockchain. The service generates a second private key. The service uses the second private key to generate a second public address value. Despite a current owner of the asset not changing such that no transactions involving the asset are performed, the service transmits the second public address value to the smart contract to trigger the smart contract to replace the first public address value in the public address field with the second public address value.
Resumen de: EP4645197A1
A blockchain-based transaction supervision method, comprising: a payer client node constructing first transaction ciphertext information on the basis of a random symmetric key, wherein the first transaction ciphertext information comprises an encrypted payment address, an encrypted transaction amount, an encrypted collection address, and first transaction supervision ciphertext information, and the first transaction supervision ciphertext information comprises encrypted supervision information and one or more encrypted symmetric keys; sending the first transaction ciphertext information and a zero-knowledge proof to a blockchain; a blockchain verification node storing the first transaction ciphertext information to the blockchain when the zero-knowledge proof is established; and an associated supervisor node acquiring the first transaction ciphertext information from the blockchain, performing decryption by using a supervision private key to obtain the random symmetric key, and performing decryption by using the random symmetric key, to obtain transaction plaintext information for supervision and verification.
Resumen de: EP4645192A1
A digital currency cross-border transaction method and apparatus based on a blockchain, and a storage medium, which relate to the technical field of payment transactions. The digital currency cross-border transaction method based on a blockchain is applied to a transaction initiation device in a blockchain payment system. The method comprises: generating a digital currency payment request; creating a payment request block according to the digital currency payment request, and sending the payment request block to a blockchain, wherein the payment request block is obtained according to a private key signature of a transaction initiation device, the blockchain is configured with a digital currency smart contract that comprises a payment function, and the payment function is configured to perform payment processing according to the payment request block; and in response to a payment success result of the payment function for the payment request block, determining that the digital currency payment request is completed. The method is configured to solve the problem in the related art of the payment efficiency being low due to payment processes being cumbersome.
Resumen de: EP4645196A1
A blockchain-based transaction supervision method, relating to the technical field of blockchains. The method comprises: a payer client node acquires transaction plaintext information and transaction ciphertext information, and obtains and sends transaction supervision ciphertext information; an associated supervisor node decrypts the transaction supervision ciphertext information to obtain information to be supervised, obtains and sends signature ciphertext information when transaction plaintext information in the information to be supervised is correct and complete, and records the transaction as a first state; the payer client node sends the signature ciphertext information and zero-knowledge proof to a blockchain; when the zero-knowledge proof is established, a blockchain verification node stores the signature ciphertext information to the blockchain; and when detecting that the signature ciphertext information has been stored on the blockchain, the associated supervisor node modifies the transaction to a second state.
Resumen de: EP4645756A1
Provided in the embodiments of the present application are a consortium blockchain admission management method and apparatus, which are applied to the technical field of blockchains. The method comprises: for each first-level node which has a direct access control permission for a basic admission management component, in response to a hosting transaction, which is initiated by the first-level node toward the basic admission management component, the basic admission management component constructing a corresponding second-level institution contract; and when the second-level institution contract is in a cooperation mode, in response to a node admission transaction, which is initiated by an initial second-level node toward the second-level institution contract, adjusting second-level nodes, wherein each second-level node has an indirect access control permission for the basic admission management component and can join a blockchain network, and the second-level institution contract realizes multi-level node admission management by means of multi-level expansion. In the present application, admission management is performed on nodes of a blockchain network by means of multi-level control, such that the nodes can be adapted to a level-based admission management requirement during expansion of the institution scale and the blockchain node scale, and thus, the robustness of a node admission management mechanism is better, and the security thereof is higher.
Resumen de: EP4645128A2
A service permission management method and apparatus, and a device, which relate to the technical field of computers. The method comprises: a first electronic device monitoring a blockchain node, wherein a plurality of smart contracts corresponding to services on a one-to-one basis are stored in the blockchain node; when service permission change information is newly added to the blockchain node, the first electronic device sending a synchronization request message to the blockchain node, wherein the service permission change information is used for indicating that a service permission of a first service is changed, and service permission change information configured by a second electronic device is stored in the blockchain node; the first electronic device receiving the service permission change information from the blockchain node; and the first electronic device updating service configuration information according to the service permission change information, wherein the updated service configuration information comprises changed service permission information of the first service. The method can solve the problem of it being impossible to manage some service permissions in commercial banks.
Resumen de: EP4645764A1
A blockchain generation method and apparatus, a node and a storage medium are provided. The method includes: generating a second blockchain based on a first blockchain and a first function, and the second blockchain is used to detect whether data on the first blockchain has been tampered with; wherein blocks in the first blockchain are in a one-to-one correspondence with the blocks in the second blockchain, and a block body of each block in the second blockchain other than a genesis block is generated by using the first function, and the first function is formed by using at least two different types of hash functions in a nesting manner.
Resumen de: EP4645752A1
The present invention relates to a method and device for proving the originality of a creative design in a communication system by proving the causal relationship between the creation process of the creative design and the creation result using the hash codes related to images in creation stages of the creative design. Specifically, the present invention relates to a method and device that combine hash codes for intermediate images in the creation process of a creative design, such as a painting, an art work, a commercial or non-commercial design, a clothing design, the interior design of a building, or the like, and a hash code for a final image using an operation function to generate one piece of final hash information and then transmit a non-fungible token (NFT) including the final hash information and final image information to a blockchain so that the design creator can claim the connection between the intermediate images in the creation process of the creative design and the final image at the time of disclosing the design on the blockchain network.
Resumen de: EP4645190A1
Problem To provide an information processing device and the like capable of further ensuring traceability of a resin material that is recycled.Solution According to one aspect of the present invention, an information processing device is provided. The information processing device is provided with an acquisition unit and a registration unit. The acquisition unit associates a resin material and information related to a predetermined parameter obtained by measuring the resin material with each other to acquire first information in any of the steps of a process of recycling the resin material. The registration unit registers the acquired first information in a block chain.
Resumen de: MX2025012750A
The invention relates to a method for protecting a user of one or more social networks (30) or video games, using a connected device (7), against risks of cyberbullying, comprising carrying out semantic and contextual analysis on accessed or received digital content, employing artificial-intelligence techniques implementing a plurality of brains (C1-C5) each dedicated to a particular cyberbullying theme and operating simultaneously, and carrying out processing of the results of the semantic and contextual analysis in order to detect a cyberbullying situation or a toxicity of all or part of said content. If a cyberbullying situation or a toxicity of digital content is detected, the protection method according to the invention writes (105), to a blockchain (15) on the Web3, a set of data describing this cyberbullying, and masks (104) the display of the toxic digital content on the screen of the connected device (7).
Nº publicación: US2025335915A1 30/10/2025
Solicitante:
ANT BLOCKCHAIN TECH SHANGHAI CO LTD [CN]
Ant Blockchain Technology (Shanghai) Co., Ltd
Resumen de: US2025335915A1
Blockchain transaction execution is described. The blockchain includes a first node and a second node, the first node includes a trusted execution environment (TEE). The first node executes a first transaction in the TEE to obtain a first execution read-write set of the first transaction, and signs the first execution read-write set by using a private key in the TEE to obtain a first signature, where the first execution read-write set includes a first execution read set and a first execution write set. The first execution read-write set and the first signature is sent to the second node. The second node verifies the first signature by using a public key corresponding to the private key, verifies the first execution read set after the verification on the first signature succeeds, and stores the first execution write set as an execution write set of the first transaction when the verification succeeds.