H04L9/3236

Global resource locator label
11579239 · 2023-02-14 · ·

A global resource locator (GRL) device can be used to track a physical asset. The GRL device can a semiconductor chip with a processor and a timing device. The semiconductor chip can generate a timing signal. The GRL device can include a blockchain, a communication device, and a memory in logical communication with the processor. The memory can store an identifier, a public key, a private key, and a hash. The communication device can communicate wirelessly with an authenticated radio source, the micro sized timing device, and the blockchain. Each authenticated radio source can be located at a respective reference location. The communication device can receive wireless timing signals from at least three authenticated radio sources. The GRL device can be affixed to a product.

Proof-of-approval distributed ledger
11580238 · 2023-02-14 · ·

A method and system for determining whether a consensus has been achieved for adding a block to a distributed ledger. The system receives a candidate block to add to the distributed ledger and receives block approvals of approving participants for the candidate block. The system calculates a total block approval stake that the approving participants have in the distributed ledger. The system identifies a total stake that participants have in the distributed ledger. When the total block approval stake is at least a threshold fraction of the total skate, the system indicates that the consensus has been achieved for adding the candidate block to the distributed ledger.

Systems and methods to timestamp and authenticate digital documents using a secure ledger
11582044 · 2023-02-14 · ·

Systems and methods to timestamp and authenticate digital documents using a secure ledger are described. Some implementations can include computer-implemented method to timestamp and authenticate electronic documents. The method can include receiving, by a timestamp and authentication server and from a user device, a unique hash value that is generated at the user device based on a source document and a device identifier of the user device, and verifying, by the timestamp and authentication server, the device identifier. The method can also include, upon verifying the device identifier, inserting, by the timestamp and authentication server, the hash value and the device identifier into a secure ledger, and upon successful insertion into the secure ledger, transmitting, from the timestamp and authentication server to the user device, a success status message including a location in the secure ledger where the hash value was inserted.

Systems and methods of providing immutable records
11580075 · 2023-02-14 · ·

Systems and methods of providing immutable records, and immutable ordering of records, in a computing system are disclosed. The computing system can be a member of a blockchain network of a plurality of blockchains. Each block can include a cryptographic digest (or hash) conforming to a minimum degree of difficulty, a nonce by which the cryptographic digest was generated in conformation with the degree of difficulty, and a list of cryptographic digests of most recent blocks of participating neighbor blockchains. Blocks may be passed between blockchains of the plurality of blockchains, which enables each member of the blockchain network to verify an immutable record of data transactions free of the mutual trust requirement of a typical blockchain environment. In conjunction with the generation of each block, an event record may be entered into an event log of the computing system wherein the block was generated. The event record, which may contain actionable instructions, requests, etc., may be transmitted to computing systems of participating neighbor blockchains, where actionable items may be acted upon. Further, the event logs of each computing system may be exchanged, compared, and adjusted to reflect the earliest appearance of each block of each participating neighbor blockchain.

Recordation of device usage to public/private blockchains
11580535 · 2023-02-14 · ·

A personal blockchain is generated as a cloud-based software service in a blockchain environment. The personal blockchain immutably archives usage of any device, perhaps as requested by a user. However, some of the usage may be authorized for public disclosure, while other usage may be designated as private and restricted from public disclosure. The public disclosure may permit public ledgering by still other blockchains, thus providing two-way public/private ledgering for improved record keeping. Private usage, though, may only be documented by the personal blockchain.

Methods and devices in a blockchain network

A first network device for use in a blockchain network is described. The first network device comprises means for, while carrying out a first iteration of a consensus protocol involving a second node device (103), in response to a trigger event (3040), obtaining a time interval function of a time interval start trigger event (3040) and of a time interval end trigger event (3080), each event being linked to a message of the consensus protocol and wherein at least the end trigger event (3080) comprises receiving a message from the second node device; means for transmitting (3083) first data (Delay_102) representative of said time interval to said second node device; means for, during a subsequent iteration of said consensus protocol involving said second node device, receiving a message (3140) from said second node device, said message containing second data (DelayTX_102) representative of said time interval from said second node device; means for authenticating said second node device as a function of said second data. A second network device, methods at the first and second network devices and a computer readable medium with code for carrying out the methods are also described.

Transaction management of machine learning algorithm updates
11580335 · 2023-02-14 · ·

Computer-implemented techniques for managing transactions of machine learning algorithm updates are described. In one embodiment, a computer-implemented is provided that comprises receiving, by a system operatively coupled to a processor, a request for an update to a machine learning model associated with a software program, wherein the request is received in accordance with a defined blockchain protocol, and wherein the request comprises model development data used in association with optimization of an instance of the machine learning model. The method further comprises, employing, by the system, a blockchain network to facilitate managing fulfillment of the request.

Split chain of trust for secure device boot
11580227 · 2023-02-14 · ·

The secure chain of trust steps to boot-up a computing device are split between the shutdown procedure of the computing device and the boot-up procedure of the computing device to reduce the time required for the computing device to boot-up. The main image associated with a central processing unit of the computing device is validated during the shutdown procedure of the computing device such that the operating system for the central processing unit is available when the computing device receives an action to power on. The boot-up time for the computing device is reduced, which allows the computing device to boot-up within an established time frame.

UAV (unmanned aerial vehicle) logistics operation and air traffic control method based on blockchain technology

The present disclosure aims to implement UAV (unmanned aerial vehicle) logistics operation and air traffic control in flyable airspace technically through a UAV task planning system, which depends on blockchain technology to carry out UAV air traffic surveillance on flight segments in a predetermined barrier-free airway and optimize air traffic according to a safe separation distance for fewest UAV operators, air traffic controllers, communications links and airborne loads.

Methods and systems for smart contracts for security and filtering
11580540 · 2023-02-14 · ·

A blockchain value transfer method including receiving a transfer request, executing a first smart contract function to perform data analytics on the transfer request and a second smart contract function to implement a security response responsive to compliance with a security criterion, and recording a result of execution of the second smart contract function to at least one of a relational database, a non-relational database, and an analytics service.