NON-FUNGIBLE TOKEN (NFT) BASED INTELLIGENT DOCUMENT PROTOCOLS

    公开(公告)号:US20240364544A1

    公开(公告)日:2024-10-31

    申请号:US18138844

    申请日:2023-04-25

    IPC分类号: H04L9/00 H04L9/08

    CPC分类号: H04L9/50 H04L9/0819

    摘要: Systems, methods, and apparatus are provided for NFT-based self-actuating document management. A private blockchain network may capture a document and a set of rules associated with the document. The network may mint an NFT that embeds the digitized document. The document rules may be encoded in self-actuating NFT metadata. The NFT may be encrypted using multiple layers of encryption prior to blockchain storage. The blockchain network may transmit a token identifier to the document owner.

    TRUST AND IDENTITY MANAGEMENT SYSTEMS AND METHODS

    公开(公告)号:US20240364532A1

    公开(公告)日:2024-10-31

    申请号:US18769253

    申请日:2024-07-10

    发明人: David P. Maher

    IPC分类号: H04L9/32 H04L9/00 H04L9/08

    摘要: The disclosure relates to, among other things, systems and methods for facilitating the secure recording and use of assertions made by entities regarding other entities. Embodiments of the disclosed systems and methods provide mechanisms to make assertions in an authentic and authoritative manner and enable discovery and reliance on those assertions using trusted distributed ledgers and/or derivatives of the same. Various embodiments may be used in connection with establishing security associations and/or secure communication channels between entities and/or the secure management of governed electronic resources.

    Authenticated Modification of Blockchain-Based Data

    公开(公告)号:US20240364529A1

    公开(公告)日:2024-10-31

    申请号:US18769140

    申请日:2024-07-10

    IPC分类号: H04L9/32 H04L9/00

    CPC分类号: H04L9/3236 H04L9/50

    摘要: Example systems and methods for a node of a blockchain are disclosed. The node may receive a request message for placing an entry on the blockchain, the message including: a request specification including an action and identity of a party subject to the action, an indicator that the entry was authorized by a trusted entity, and a plurality of cryptographic verification codes generated by a plurality of trust verifiers, each cryptographic verification code including an encoded action-payload from the trusted entity and cryptographically signed by one of the trust verifiers. The node may apply a public encryption key of each trust verifier to its cryptographic verification code to decrypt an encoded action-payload, and then verify that at least a threshold number of the decrypted corresponding encoded action-payloads are identical. The node may then submit the entry for processing to be added to the blockchain responsive to at least the verification.

    BLOCKCHAIN FOR GENERAL COMPUTATION
    5.
    发明公开

    公开(公告)号:US20240364498A1

    公开(公告)日:2024-10-31

    申请号:US18769344

    申请日:2024-07-10

    摘要: Techniques are presented for a computer-implemented method that may be implemented using a blockchain network. The computer-implemented method includes: monitoring a system to detect a challenge to a proposer string in response to a request, and as a result of detecting the challenge: placing a first digital asset and a second digital asset under exclusive control of a group of nodes via a public key associated with a group of nodes, wherein the first and second digital assets are configured to be released when a threshold number of members of the group of nodes generate a valid signature for the public key associated with the group of nodes; resolving the challenge using a blockchain network; and distributing, by the group of nodes, digital assets from the first digital asset and the second digital asset to one or more parties of the system based at least in part on the solution.

    SCRIPT BASED BLOCKCHAIN INTERACTION
    6.
    发明公开

    公开(公告)号:US20240362627A1

    公开(公告)日:2024-10-31

    申请号:US18673175

    申请日:2024-05-23

    发明人: Ying CHAN Dean KRAMER

    摘要: Techniques are presented for causing, as a result of successfully verifying that a first set of constraints and a second set of constraints are satisfied, a second transaction to be recorded to a blockchain network. The method comprises receiving, at a node in a blockchain network, a first transaction that specifies at least: a first set of constraints on a second transaction, the first set of constraints including one or more constraints that cause the second transaction to contain a set of data from the blockchain network; and a second set of constraints on the second transaction, the second set of constraints including a constraint that the set of data includes a block that includes the first transaction, the block included in a blockchain associated with the blockchain network.

    SYSTEM AND METHOD FOR IMPLEMENTING A BLOCKCHAIN PLATFORM

    公开(公告)号:US20240362626A1

    公开(公告)日:2024-10-31

    申请号:US18140204

    申请日:2023-04-27

    申请人: Livegage, Inc.

    IPC分类号: G06Q20/38 G06Q40/03 H04L9/00

    摘要: An embodiment of the present invention is directed to storing loan data and transaction history on a distributed ledger, such as a private blockchain. This enables access to an entire history of transactions and relevant data associated with a loan. An embodiment of the present invention supports various users, participants, etc. For example, investors may access data on the blockchain in real-time through an interface, such as an investor portal. With current systems, servicers and investors require back and forth communications which tend to lead to delay and inefficiencies. With an embodiment of the present invention, daily cash details are available in real-time which facilities cash reconciliation, audit processes, etc.

    Decentralised authentication
    8.
    发明授权

    公开(公告)号:US12132839B2

    公开(公告)日:2024-10-29

    申请号:US17251916

    申请日:2019-05-31

    申请人: Iothic Ltd

    IPC分类号: H04L9/32 H04L9/40 H04L9/00

    摘要: First and second devices store respective device data and private keys. The first-device data is additionally stored by the second device and by a proxy; and the second-device data is additionally stored by the first device and by the proxy. In a commitment phase, each of the first and second devices uses its respective device data, private key and a random nonce to generate a respective one-time first-device or second-device commitment value, which it sends to the proxy. In a checking phase, the devices communicate secret-key information to the proxy, which verifies the received one-time commitment values. In a digest phase, the proxy calculates a one-time digest, which it sends to the second device. The second device then verifies the received one-time digest to authenticate the first device.

    Method and system for privacy preserving classification of websites URL

    公开(公告)号:US12132818B2

    公开(公告)日:2024-10-29

    申请号:US17179244

    申请日:2021-02-18

    IPC分类号: H04L9/00 G06N3/08

    CPC分类号: H04L9/008 G06N3/08

    摘要: Malicious website detection has been very crucial in timely manner to avoid phishing. User privacy also needs to be maintained at the same time. A system and method for classifying a website URL have been provided. The system is configured to achieve end-to-end privacy for machine learning based malicious URL detection. The system provides privacy preserving malicious URL detection models based on Fully Homomorphic Encryption (FHE) approach either using deep neural network (DNN), using logistic regression or using a hybrid approach of both. The system is utilizing a split architecture (client-server) where-in feature extraction is done by a client machine and classification is done by a server. The client machine encrypts the query using FHE and sends it to the server which hosts machine learning model. During this process, the server doesn't learn any information about the query.