Patent classifications
H04L9/50
Anomalous transaction detection for database
An example operation may include one or more of receiving, by a risk score module, a blockchain transaction proposal, obtaining transaction proposal data, obtaining external data, computing a risk score from the transaction proposal data and the external data, comparing the risk score to a risk score threshold, providing an endorsement decision, based on the comparison, and one of endorsing or rejecting the transaction proposal.
Transaction-enabled systems and methods for royalty apportionment and stacking
Transaction-enabled systems and methods for royalty apportionment and stacking are disclosed. An example system may include a plurality of royalty generating elements (a royalty stack) each related to a corresponding one or more of a plurality of intellectual property (IP) assets (an aggregate stack of IP). The system may further include a royalty apportionment wrapper to interpret IP licensing terms and apportion royalties to a plurality of owning entities corresponding to the aggregate stack of IP in response to the IP licensing terms and a smart contract wrapper. The smart contract wrapper is configured to access a distributed ledger, interpret an IP description value and IP addition request, to add an IP asset to the aggregate stack of IP, and to adjust the royalty stack.
SYSTEM AND METHOD FOR MANAGING TRANSACTIONS IN DYNAMIC DIGITAL DOCUMENTS
A system software and method which relates to the field of computing technology or business process models or computer systems or distributed computer systems or computer networks relating to general purpose devices that can be programmed to carry out a set of data table or hash table updates, validations or modifications supporting, enabling or executing public and private services, financial transactions and commercial applications. More specifically, the present invention is directed to distributed and decentralized computing in which said distributed network is supported and encrypted by cryptographic technology, hash functions and distributed public or private keys or other related technology. System and methods for managing dynamic electronic documents on a private distributed ledger comprise establishing a dynamic electronic document comprising a first state object, wherein the state object references a prior approved first transaction; proposing a second transaction comprising as an input the first state object and as an output a transaction command to alter the state object as well as what parameters are required to validate the second transaction; validating the proposed second transaction; and updating the state object on a private distributed ledger to reference the second transaction.
Blockchain Implemented Data Hiding Solutions For Improvements In Secure Communication, Storage And Transmission Of Data
Embodiments of the disclosure provide blockchain-implemented methods and systems for secure data transfer and/or storage via the use of data hiding (e.g. steganography algorithms, watermarking etc). In accordance with one aspect, a data hiding algorithm is applied multiple times to a portion of secret data to embed it in a cover file. This constructs layers of hidden data, e.g. secret data hidden in an image that is then used as secret data in a further cover file and so on. Each layer can incorporate encryption and authentication techniques to further enhance security. The final layer or a compressed version is provided within a blockchain transaction. Additionally or alternatively, the secret data can be split into a plurality of shares. This can be achieved using a splitting scheme such as, for example Shamir's Secret Sharing Scheme. Different shares of the secret data can then be encrypted before being hidden within a cover file. Different cover files can hide different shares, preferably each share being provided on the blockchain in a different transaction. To access the secret data, all of the cover files need to be identified and accessed from the blockchain, the relevant steganography, compression and encryption technique(s) applied to each, and then the secret data is reconstructed.
METHOD FOR SUPPORTING SHARING OF TRAVEL HISTORY OF TRAVELERS IN AIRPORTS
A method for supporting sharing of travel history of travelers in airports includes receiving, by a trusted entity of the distributed ledger system, a registration request from a traveler via a traveler application. The registration request provides personal information of the traveler to the trusted entity. The method further includes generating, by the trusted entity, a public key for the traveler using an identity-based encryption mechanism and sending, from the trusted entity to the global identity blockchain, a registration transaction with respect to the traveler. The registration transaction comprises the public key of the traveler. The method further includes recording a travel history that includes all travel tickets of the traveler, wherein a Merkle tree of all the travel tickets of the traveler is generated. The Merkle tree has a Merkle root, and the Merkle root of the Merkle tree is stored in the global identity blockchain.
DATA PROCESSING METHOD AND APPARATUS BASED ON BLOCKCHAIN NETWORK, AND COMPUTER DEVICE
A data processing method and apparatus based on a blockchain network, and a computer device. The method includes acquiring a transaction request, the transaction request carrying transaction data and reference signature data corresponding to the transaction data; validating the transaction data and the reference signature data; determining a matching node device from a target node device if the transaction data and the reference signature data are validated, and acquiring a signing key of the matching node device; determining data to be signed according to the transaction data, and signing on the data to be signed using the signing key of the matching node device to obtain endorsement signature data; and transmitting the endorsement signature data to the management device, wherein the management device generates a transaction block according to the endorsement signature data and the transaction data.
SYSTEM AND METHOD FOR SECURE PEER-TO-PEER TRANSMISSION OF CONTENT IN DISTRIBUTED LEDGER NEWORKS
Different aspects of the invention implement an enhanced DLT system, and corresponding method, that allows the peer-to-peer transmission of huge amounts of data packets of content between users, and to be stored in the DLT network, in a secure, trustworthy and efficient manner. By allowing the interface between any type of existing layer 1 DLT network, it does not require the complex, slow, costly and highly risk process involved in the generation of a new layer 1 DLT network. It opens up the range of possible applications of the DLT network to applications in Big Data, IOT, Web 3, MMOG, or any other environment that needs the trust provided by the immutability of data stored in the DLT network.
MANAGEMENT ELECTRONIC DEVICE AND METHOD FOR WIRELESS COMMUNICATION, AND COMPUTER READABLE MEDIUM
A management electronic device includes a processing circuit configured to: obtain a spectrum in an N-th round of spectrum trading and acquire the interference received by the management electronic device when an electronic device uses the traded spectrum; receive the interference received by another electronic device as determined by another electronic device related to spectrum trading; determine competition rights parameters of the management electronic device and the other electronic device, respectively, the competition rights parameters representing the credibility of the electronic devices and the magnitude of competitiveness when competing for management rights in an N+1-th round of spectrum trading; and select a new management electronic device on the basis of at least one among the interference and the competition rights parameters, the new management electronic device having management rights in the N+1-th round of spectrum trading, instead of the management electronic device having management rights.
SYSTEM AND METHOD FOR PREVENTING SUSPICIOUS TRANSACTIONS IN DISTRIBUTED LEDGER
A system and method for preventing hacking of blockchain is proposed. The system includes a cryptocurrency owner configured to own a cryptocurrency wallet storing a cryptocurrency, a public key, and a private key, and capable of setting monitoring-subjected data and monitoring-excluded data, a hacking countermeasure system configured to check status of the cryptocurrency wallet by being connected to the cryptocurrency owner to receive the cryptocurrency and the public key, invalidate a hacking transaction when the hacking transaction matching the monitoring-subjected data is received, and allow the cryptocurrency to be traded by opening the cryptocurrency wallet with the private key and process transaction details into a block file when a monitoring-excluded transaction matching the monitoring-excluded data is received, and a blockchain network configured to receive the block file from the hacking countermeasure system and duplicate the block file into a plurality of block files to distribute and store each block file.
SYSTEMS AND METHODS FOR COMPLIANCE CHECKS
Systems and methods for performing a compliance check on a proposed transfer of one or more digital assets between a user and a counterparty. In some embodiments, one or more attribute values of the counterparty may be received, the one or more attribute values comprises a first attribute value indicating a status of a distributed ledger address of the counterparty. One or more corresponding attribute attestations may be accessed from a distributed ledger, and may be checked against the one or more attribute values. For instance, it may be checked whether each attribute attestation includes a cryptographic proof of the corresponding attribute value, and/or whether the cryptographic proof is electronically signed by a trusted entity. Additionally, or alternatively, it may be determined, based on the first attribute value indicating the status of the distributed ledger address of the counterparty, whether one or more compliance requirements are triggered.