会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • AGENT-BASED TURING COMPLETE TRANSACTIONS INTEGRATING FEEDBACK WITHIN A BLOCKCHAIN SYSTEM
    • 基于代理的完整事务集成反馈在一个BLOCKCHAIN系统中
    • WO2017145006A1
    • 2017-08-31
    • PCT/IB2017/050821
    • 2017-02-14
    • NCHAIN HOLDINGS LIMITED
    • WRIGHT, Craig StevenSAVANAH, Stephane
    • G06Q20/06G06N7/00
    • H04L9/00G06N7/00G06Q20/065G06Q2220/00H04L9/3236H04L2209/38H04L2209/463H04L2209/56
    • This invention relates generally to blockchain implementations and is suited for, but not limited to, use with the Bitcoin blockchain. It can be used for the implementation of automated processes such as device/system control, process control, distributed computing and storage and others. The invention provides a solution which uses a blockchain to control a process executing on a computing resource. In a preferred embodiment, the computing resource, running simultaneously and in parallel to the blockchain, manages a loop-based operation. The computing resource continuously monitors the state of the blockchain as well as any other off-blockchain input data or source. The execution of the loop is influenced by the state of the blockchain. Each iteration of the loop that is executed by the computing resource is recorded in a transaction that is written to the blockchain. It is stored as a hash within the transaction's metadata. If the computing resource finds a transaction which contains a hash relating to the loop it accesses the relevant portion of code. The loop contains a conditional statement which enables the computing resource to decide which action to take. The condition may be dependent upon the state of the blockchain or any other data source. The action can be any type of action, on or off the blockchain. Thus, the combination of the computing resource and blockchain provide a solution which is (at least partially) Turing-complete.
    • 本发明一般涉及区块链实现,并且适用于但不限于与比特币区块链一起使用。 它可以用于执行自动化过程,如设备/系统控制,过程控制,分布式计算和存储等。 本发明提供了一种使用区块链来控制在计算资源上执行的过程的解决方案。 在优选实施例中,与区块链同时并行运行的计算资源管理基于循环的操作。 计算资源持续监控区块链状态以及任何其他区块外链输入数据或源。 循环的执行受区块链状态的影响。 由计算资源执行的循环的每次迭代都记录在写入区块链的事务中。 它作为散列存储在事务的元数据中。 如果计算资源发现包含与循环相关的散列的事务,它将访问代码的相关部分。 循环包含一个条件语句,它使计算资源能够决定采取何种操作。 条件可能取决于区块链或任何其他数据源的状态。 该行为可以是任何类型的行为,在区块链上或区块链之外。 因此,计算资源和区块链的组合提供了一个解决方案(至少部分)是图灵完备的。
    • 4. 发明申请
    • BLOCKCHAIN IMPLEMENTED COUNTING SYSTEM AND METHOD FOR USE IN SECURE VOTING AND DISTRIBUTION
    • 用于安全表决和分配的块计算实现计数系统和方法
    • WO2017145005A1
    • 2017-08-31
    • PCT/IB2017/050820
    • 2017-02-14
    • NCHAIN HOLDINGS LIMITED
    • WRIGHT, Craig StevenSAVANAH, Stephane
    • H04L9/32H04L9/00
    • H04L9/00G06N7/00G06Q20/065G06Q2220/00H04L9/3236H04L2209/38H04L2209/463H04L2209/56
    • This invention relates generally to blockchain implementations and is suited for, but not limited to, use with the Bitcoin blockchain. The invention relates to a technical solution for managing a voting, counting, selection and/or decision making process. It can be used for the implementation of automated processes such as device/system control, process control, distributed computing and storage and others. The invention provides an event detecting, monitoring and/or counting mechanism. The event may be, for example, a vote, decision or selection which is made by a given entity. The invention provides a counting solution in which a computing resource, running simultaneously and in parallel to the blockchain, manages a loop-based operation. The computing resource continuously monitors the state of the blockchain as well as any other off-blockchain input data or source. The execution of the loop is influenced by the state of the blockchain. Each iteration of the loop that is executed by the computing resource is recorded in a transaction that is written to the blockchain. It is stored as a hash within the transaction's metadata. If the computing resource finds a transaction which contains a hash relating to the loop it accesses the relevant portion of code. The loop contains a conditional statement which enables the computing resource to decide which action to take. The condition may be dependent upon the state of the blockchain or any other data source. The action can be any type of action, on or off the blockchain. Thus, the combination of the computing resource and blockchain provide a Turing-complete solution.
    • 本发明一般涉及区块链实现,并且适用于但不限于与比特币区块链一起使用。 本发明涉及用于管理投票,计数,选择​​和/或决策过程的技术解决方案。 它可以用于执行自动化过程,如设备/系统控制,过程控制,分布式计算和存储等。 本发明提供了一种事件检测,监测和/或计数机制。 例如,该事件可以是由给定实体进行的投票,决定或选择。 本发明提供了一种计数解决方案,其中与区块链同时并行运行的计算资源管理基于环路的操作。 计算资源持续监控区块链状态以及任何其他区块外链输入数据或源。 循环的执行受区块链状态的影响。 由计算资源执行的循环的每次迭代都记录在写入区块链的事务中。 它作为散列存储在事务的元数据中。 如果计算资源发现包含与循环相关的散列的事务,它将访问代码的相关部分。 循环包含一个条件语句,它使计算资源能够决定采取何种操作。 条件可能取决于区块链或任何其他数据源的状态。 该行为可以是任何类型的行为,在区块链上或区块链之外。 因此,计算资源和区块链的结合提供了一个图灵完整的解决方案。
    • 10. 发明申请
    • COMPUTER AND METHOD FOR TRANSMITTING CONFIDENTIAL INFORMATION IN A NETWORK
    • 用于在网络中传输保密信息的计算机和方法
    • WO2017059396A1
    • 2017-04-06
    • PCT/US2016/055066
    • 2016-09-30
    • CLARK, Jonathan A.
    • CLARK, Jonathan A.XOVOX, Ruth
    • G06F17/00
    • H04L9/00H04L9/0894H04L2209/80
    • A client computer ("CC") for securely routing confidential information ("CI") to a server. A security application ("SA") in CC receives confidential data in a first type of field ("FTOF") designated as unsavable, which data is only temporary stored in an isolated portion of the memory ("IPOM") while in secure transit to the server, and which data is purged from IPOM after SA session termination, to comply with a security standard ("SS"). The FTOF is disabled from receiving input data from the input/output devices "(IODs") coupled to the CC, except from an analog device. The SA quashes any unauthorized attempt to access the IPOM and the SA will terminate if the quash fails. Upon terminating any SA session, IPOM is purged. Insecure applications can operate simultaneously with the SA, with no access to IPOM. The CC optionally includes a randomizer module for a virtual keyboard GUI. Optional tokens available at server.
    • 用于将机密信息(“CI”)安全路由到服务器的客户端计算机(“CC”)。 CC中的安全应用程序(“SA”)接收被指定为不可取的第一类型的字段(“FTOF”)中的机密数据,在安全传输过程中,该数据仅临时存储在存储器(“IPOM”)的隔离部分中 到服务器,以及哪些数据在SA会话终止后从IPOM清除,以符合安全标准(“SS”)。 除了模拟设备之外,FTOF被禁止从耦合到CC的输入/输出设备“(IOD”)接收输入数据。 SA撤销任何未经授权的访问IPOM的尝试,如果quash发生故障,SA将终止。 在终止任何SA会话后,IPOM被清除。 不安全的应用程序可以与SA同时运行,无需访问IPOM。 CC可选地包括用于虚拟键盘GUI的随机化模块。 服务器可用的令牌。