Green Mining System for Distributed and Centralized Operations

    公开(公告)号:US20250148435A1

    公开(公告)日:2025-05-08

    申请号:US18387307

    申请日:2023-11-06

    Abstract: Systems and methods to enable green mining for centralized and/or decentralized financial systems are discussed. In some cases, the green mining methodologies are incorporated in distributed quantum ledger-based decentralized finance ecosystems, in decentralized financial systems and/or centralized financial systems. A proof of influence algorithm enables miners to accumulate and use reputation points to reduce computational power requirements on their systems and/or reduce energy consumptionInfluence points is an indicator of trustworthiness of the miner established based utilizing a predictive algorithm that analyzes the past mining behavior. Higher reputational scores result in lesser computationally intensive activities, which reduce energy consumption. The proof of influence algorithm rewards miners to encourage participation as validators of new blocks and/or other activities on the decentralized or centralized ledger-based systems.

    System and method for secure database management

    公开(公告)号:US12287900B2

    公开(公告)日:2025-04-29

    申请号:US18448865

    申请日:2023-08-11

    Abstract: A method includes encrypting a request received from a user device to generate an encrypted request. Encrypted data items are searched based on the encrypted request to identify desired encrypted data items. In response to determining that two or more encrypted data items of the desired encrypted data items have a same interaction identification, the two or more encrypted data items are locked and masked, and the masked two or more encrypted data items are removed. Algebraic operations are determined based on the encrypted request. An encrypted response is determined by performing the algebraic operations on the desired encrypted data items. The encrypted response is decrypted to obtain a decrypted response. An error is determined due to the algebraic operations performed on the desired encrypted data items. In response to determining that the error is less than an error threshold, the decrypted response is sent to the user device.

    System and method for secure database management

    公开(公告)号:US20250053678A1

    公开(公告)日:2025-02-13

    申请号:US18448865

    申请日:2023-08-11

    Abstract: A method includes encrypting a request received from a user device to generate an encrypted request. Encrypted data items are searched based on the encrypted request to identify desired encrypted data items. In response to determining that two or more encrypted data items of the desired encrypted data items have a same interaction identification, the two or more encrypted data items are locked and masked, and the masked two or more encrypted data items are removed. Algebraic operations are determined based on the encrypted request. An encrypted response is determined by performing the algebraic operations on the desired encrypted data items. The encrypted response is decrypted to obtain a decrypted response. An error is determined due to the algebraic operations performed on the desired encrypted data items. In response to determining that the error is less than an error threshold, the decrypted response is sent to the user device.

Patent Agency Ranking