Artificial intelligence is only growing. More and more software services are using artificial intelligence to suggest products and services, perhaps based on our past behavior, current location, or other activity. In time, though, developers of these software services must document their efforts.
The features, aspects, and advantages of the exemplary embodiments are understood when the following Detailed Description is read with reference to the accompanying drawings, wherein:
The exemplary embodiments will now be described more fully hereinafter with reference to the accompanying drawings. The exemplary embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. These embodiments are provided so that this disclosure will be thorough and complete and will fully convey the exemplary embodiments to those of ordinary skill in the art. Moreover, all statements herein reciting embodiments, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure).
Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating the exemplary embodiments. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named manufacturer.
As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless expressly stated otherwise. It will be further understood that the terms “includes,” “comprises,” “including,” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being “connected” or “coupled” to another element, it can be directly connected or coupled to the other element or intervening elements may be present. Furthermore, “connected” or “coupled” as used herein may include wirelessly connected or coupled. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items.
It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first device could be termed a second device, and, similarly, a second device could be termed a first device without departing from the teachings of the disclosure.
Exemplary embodiments thus present elegant reproducibility tools. Exemplary embodiments may use blockchain technology to reproduce any changes made to the learning model 20. The blockchain 70 may contain data records that document the raw electronic data 22 used by the learning model 20. The blockchain 70 may additionally or alternatively contain data records that document the local update(s) 50 used to improve the learning model 20. The blockchain 70 may additionally or alternatively contain data records that document the learning modification 60 implemented in response to the raw electronic data 22 and/or the local update(s) 50. The blockchain 70 may additionally or alternatively contain the cryptographic hash values 78 representing the electronic data 22, the local update 50, and/or the learning modification 60. Because the blockchain 70 contains this documentary evidence 72, any recipient of the blockchain 70 may inspect the blockchain 70 (perhaps according to the device identifier 58) and chronologically reproduce any data and/or changes implemented during federated learning.
Exemplary embodiments may be applied to any software application and to any objective. This disclosure mainly discusses the learning model 20 as the mapping software application 28, as many readers have used mapping services (such as GOOGLE® MAPS® and APPLE® MAPS®). However, exemplary embodiments are applicable to any learning and/or predictive service, such as dating apps, autonomous driving software, energy consumption software (such as learning HVAC thermostats and other home automation services), predictive food/dinner software, social networking software, and any other software using the artificial intelligence 40.
Exemplary embodiments help validate software developers. As the artificial intelligence 40 (or “machine learning”) is applied to more and more real world situations and services, the inventors foresee that software developers will have to thoroughly document their efforts. For example, as self-driving cars add users and accrue mileage, accidents will occur and liability may be at issue. Developers of autonomous driving software (e.g., the learning model 20) may have to reproduce the result 80 and perhaps prove that the learning model 20 could not have caused a vehicular accident. Similarly, developers of mapping services may have to prove that their software is not liable for accidents, muggings, and other crimes along a suggested route. Developers of dating apps and other social services may have to prove that their software is not liable for personal mismatches, poor recommendations, or crimes committed during social suggestions. Should a learning thermostat overheat a room (perhaps causing death of an occupant or pet), the developer may have to prove that the learning model 20 could not have caused injury. Because exemplary embodiments provide the documentary evidence 72 of the developer's efforts, the developer need only retrieve the historical records integrated into the blockchain 70.
Exemplary embodiments also help prevent fraud. As the artificial intelligence 40 grows in usage, unscrupulous activity may also grow. Rogue entities, in other words, may try to hack the electronic data 22, and/or the learning model 20, to cause harm or injury. Exemplary embodiments thus implement protections against fraudulent efforts. The blockchain 70 allows a software developer to document the result 80 generated by the learning model 20, perhaps in near real time. The blockchain 70 documents a current state or version of the learning model 20, any changes to the learning model 20, and/or any of the electronic data 22 used or acted on by the learning model 20. The software developer may thus retrieve any historical records integrated into the blockchain 70 to prove the learning model 20 could not have resulted in damage or injury. In other words, the raw electronic data 22, the local update 50, and/or the learning modification 60 could not have caused harm to person or to property. The blockchain 70 may thus provide the documentary evidence 72 of custody/possession of an original, unaltered version of the electronic data 22. The blockchain 70 may also provide the documentary evidence 72 that the smartphone 32 generated the original, unaltered version of the electronic data 22 (and not some other, different, or alleged device). Moreover, the blockchain 70 may also provide the documentary evidence 72 that none of the electronic data 22 is missing.
Noun chaining may thus be useful for the Internet of Things. As the reader may be aware, more and more devices are equipped with network access. Smartphones, tablet computers, laptop computers, and other processor-controlled devices commonly have Internet access. Moreover, refrigerators and other appliances are also offered with Internet access. Indeed, in the coming years, millions of devices per square mile are predicted to have network access. Exemplary embodiments may thus generate an individual blockchain 70 per device, per software application (per learning model 20), and/or per user. Different blockchains 70, in other words, may be dedicated to data records associated with each noun identifier 90, each device identifier 58, each model identifier 98, and/or each user identifier 100.
Blockchain dedication, in general, may be based on the noun identifier 90. The noun identifier 90 may represent one or more of the device identifier 58, the model identifier 98, and/or the user identifier 100. The noun identifier 90 may thus be any alphanumeric combination that uniquely identifies the source that generates or uses the electronic data 22 to generate the local update 50. The noun identifier 90 may thus pinpoint the mobile device 30, the learning model 20, and even the current user generating training data. Indeed, as the reader understands, people often share computers, tablets, smartphones, and other devices. As the mobile device 30 (again illustrated as the smartphone 32) executes the different learning models 20a-c, exemplary embodiments may track the sub-blockchains 112a-c according to the corresponding noun identifier 90 (the device identifier 58, the model identifier 98, and/or the user identifier 100). Suppose, for example, a first user (e.g., user identifier 100a) selects a dating application (learning model 20a having model identifier 98a), resulting in the first sub-blockchain 112a. A second user (e.g., user identifier 100b) then picks up the smartphone 32 (the device identifier 58) to use a mapping application (learning model 20b having model identifier 98b), resulting in the second sub-blockchain 112b. A third user (e.g., user identifier 100c) then picks up the smartphone 32 to suggest a jogging route (learning model 20c having model identifier 98c), resulting in the third sub-blockchain 112c. Exemplary embodiments may thus integrate data records that individually specify the source “noun” (e.g., the device, the learning model 20, and/or the user). The master blockchain 110 may thus document device-specific, user-specific, and application-specific information.
The master blockchain 110 and the sub-blockchains 112 may have any structure.
Exemplary embodiments are thus helpful in federated learning. Federated learning aggregates individualized usage of a population of devices to generate an improvement to the learning model 20. Federated learning allows the population of devices to collaboratively learn and to improve the predictive learning model 20, based on their individual local updates 50. The blockchain 70 may thus store original versions of any data described by the local update 50 and/or used to train or improve the learning model 20. The original versions of the data may be raw and unencrypted, encrypted, and/or hashed (using the hashing algorithm 76 above discussed). Indeed, the cryptographic hash values 78 may be used to validate the original versions of the data. The mobile device 30 may even store and execute trusted platform modules to sign the electronic data 22, thus proving that the mobile device 30, and only the mobile device 30, generated the electronic data 22. As each piece of data—or its hash thereof—may be stored in the blockchain 70, any missing data is immediately obvious (that is, if the hash value 78 is documented in the blockchain 70, then its corresponding unhashed data may or should also be documented in the blockchain 70). Exemplary embodiments thus allow reproducibility of data in federated learning using the blockchain 70.
Exemplary embodiments may use any hashing function. Many readers may be familiar with the SHA-256 hashing algorithm. The SHA-256 hashing algorithm acts on any electronic data or information to generate a 256-bit hash value 78 as a cryptographic key. The key is thus a unique digital signature. There are many hashing algorithms, though, and exemplary embodiments may be adapted to any hashing algorithm.
Exemplary embodiments may be applied regardless of networking environment. Exemplary embodiments may be easily adapted to stationary or mobile devices having cellular, wireless fidelity (WI-FI®), near field, and/or BLUETOOTH® capability. Exemplary embodiments may be applied to mobile devices utilizing any portion of the electromagnetic spectrum and any signaling standard (such as the IEEE 802 family of standards, GSM/CDMA/TDMA or any cellular standard, and/or the ISM band). Exemplary embodiments, however, may be applied to any processor-controlled device operating in the radio-frequency domain and/or the Internet Protocol (IP) domain. Exemplary embodiments may be applied to any processor-controlled device utilizing a distributed computing network, such as the Internet (sometimes alternatively known as the “World Wide Web”), an intranet, a local-area network (LAN), and/or a wide-area network (WAN). Exemplary embodiments may be applied to any processor-controlled device utilizing power line technologies, in which signals are communicated via electrical wiring. Indeed, exemplary embodiments may be applied regardless of physical componentry, physical configuration, or communications standard(s).
Exemplary embodiments may utilize any processing component, configuration, or system. Any processor could be multiple processors, which could include distributed processors or parallel processors in a single machine or multiple machines. The processor can be used in supporting a virtual processing environment. The processor could include a state machine, application specific integrated circuit (ASIC), programmable gate array (PGA) including a Field PGA, or state machine. When any of the processors execute instructions to perform “operations,” this could include the processor performing the operations directly and/or facilitating, directing, or cooperating with another device or component to perform the operations.
Exemplary embodiments may packetize. The mobile device 30 and the server 54 may have network interfaces to the communications network 52, thus allowing collection and retrieval of information. The information may be received as packets of data according to a packet protocol (such as the Internet Protocol). The packets of data contain bits or bytes of data describing the contents, or payload, of a message. A header of each packet of data may contain routing information identifying an origination address and/or a destination address.
Exemplary embodiments may verify, or deny, originality. Exemplary embodiments may perform cryptographic comparisons to discern data differences. That is, the server 54 may retrieve the cryptographic hash value(s) 78 generated from hashing the original version 130 of the local update 50. The server 54 may also retrieve and hash the current version 132 of the local update 50 (using the same cryptographic hashing algorithm 76) to generate one or more verification hash values 136. If the verification hash values 136 match the cryptographic hash values 78 generated from the original version 130 of the local update 50, then the local update 50 has not changed since the date and time of creation 134. That is, the current version 132 of the local update 50 is the same as the original version 130, unaltered, and thus authentic 138. However, if the verification hash values 136 (generated from hashing the current version 132 of the local update 50) fail to match the cryptographic hash values 78 generated from the original version 130 of the local update 50, then the current version 132 has changed since the date and time of creation 134. Exemplary embodiments, in other words, reveal an alteration that may indicate the current version 132 is inauthentic 140. Exemplary embodiments may thus generate a flag or other alert 142 to initiate further investigation.
The blockchain 70 may thus provide the documentary evidence 72. If the blockchain 70 integrates data or information representing the original version 130, then the blockchain 70 provides historical records for future verification. Any recipient of the blockchain 70 may inspect its data records and obtain or retrieve the data representing the original version 130 and/or its corresponding cryptographic hash value(s) 78. If the current version 132 (and/or its corresponding verification hash value 136 fails to substantially or exactly match, then a difference has been detected and the current version 132 is inauthentic 140.
Exemplary embodiments thus present a simple and effective verification mechanism. Cryptographic hashing may be used to make quick verification decisions. If any entity matches cryptographic digital signatures representing different versions, then perhaps verification is complete and no further investigation is required. But if the current version 132 has changed, the digital signatures will differ, perhaps even substantially. Indeed, even a change to a single bit or character can produce a noticeable difference in hash values. So, if the digital signatures are different, the current version 132 may fail an authentication (e.g., the authentic 138 or inauthentic 140 determination). An auditor or software developer, in other words, may thus simply and quickly discern whether additional investigative scrutiny is needed. The software developer may thus use the blockchain 70 to archive development efforts for historical use and analysis.
Exemplary embodiments may thus protect the secret data 180. When the mobile device 30 generates the local update 50, exemplary embodiments may split the local update 50 into multiple pieces termed shares 182. The server 54, for example, may call or invoke a secret sharing algorithm 184 to generate the shares 182. The server 54 may then distribute one or more of the shares 182 via the blockchain 70.
Exemplary embodiments may thus stash the shares 182a in the multiple blockchains 70a-c. Because the local update 50 may be split into the multiple shares 182, any one or more recipient devices must possess a sufficient minimum number MMin (illustrated as reference numeral 192) of the shares 182 before the local update 50 may be recovered. That is, possession of an insufficient number of the shares 182 guarantees that the local update 50 remains unknown and confidential. In other words, no single one of the multiple blockchains 70a-c may store the requisite minimum number MMin 192 of the shares 182 to launch a brute-force attack on the local update 50. Even multiple ones of the blockchains 70a-c may be purposefully designed to never exceed the requisite minimum number MMin 192 of the shares 182, perhaps thus forcing a hacker to compromise several or all of the blockchains 70a-c. A rogue attack, in simple words, would have to access and compromise multiple blockchains 70 before jeopardizing the local update 50.
Exemplary embodiments thus present another elegant solution. The sensitive, secret local update 50 may be secretly shared via the one or more blockchains 70a-c. Even if the blockchains 70a-c are dispersed to trusted peer devices, the peer devices still cannot discern the local update 50 until the threshold minimum number MMin 192 of the shares 182 is obtained. Exemplary embodiments thus purposefully add a second-layer of protection, beyond merely trusted receipt of the blockchain 70. The trusted peers simply do not have access to the local update 50 until the minimum number MMin 192 of the shares 182 is obtained.
Any secret sharing scheme may be utilized. The reader is perhaps familiar with Shamir's Secret Sharing Algorithm, which is a well-known cryptographic algorithm. Exemplary embodiments may thus divide the local update 50 into unique parts (e.g., the shares 182), with each individual share 182 being different from other shares 182. However, there are many secret sharing or splitting schemes and algorithms for distributing a secret, and exemplary embodiments may be applied regardless of any particular scheme or algorithm.
where the total number NS 202 of the shares 182 is ten thousand (10,000) times the number NB 204 of blockchains 70 that must be used. Again, as a simple example, if the local update 50 is associated with one million (1,000,000) shares 182, then one hundred (100) different blockchains 70 must be generated and distributed. The sharing strategy 200, in other words, may set a maximum number NSmax (illustrated as reference numeral 206) of shares 182 integrated into any single blockchain 70. The sharing strategy 200, in other words, may thus limit the number of the shares 182 exposed by any individual blockchain 70.
where the total number NR 208 of the recipients is one hundred (100) times the number NB 204 of blockchains 70 that must be used. Again, as a simple example, if there are ten thousand recipients, then one hundred (100) different blockchains 70 must be generated and distributed. The sharing strategy 200, in other words, may set a maximum number NRmax (illustrated as reference numeral 210) of recipients per blockchain 70. The sharing strategy 200, in other words, may thus limit the number of the shares 182 exposed by any individual blockchain 70.
The sharing strategy 200 may be implemented as logical rules. If the sharing strategy 200 is mathematically defined (such as the ratio above discussed), the sharing strategy 200 may be expressed as logical statements involving mathematical expressions. Exemplary embodiments may code or program the sharing strategy 200 to achieve policy goals and/or security objectives.
The data fingerprint 220 also allows data reproducibility. Even though the data fingerprint 220 may be a much smaller file or shorter bit string (e.g., cryptographic key), the data fingerprint 220 is different from, and not the same, as the electronic data 22 used by the learning model 20. The data fingerprint 220 may thus guarantee, at the very least, that some of the electronic data 22 is reported to the server 54 for training the federated learning model 20. The data fingerprint 220 may also guarantee that none of the electronic data 22 is omitted from analysis. Exemplary embodiments may thus integrate the raw electronic data 22 and/or the data fingerprint 220 in the blockchain 70. Integrating both the electronic data 22 and the data fingerprint 220 allows a recipient of the blockchain 70 to both verify and reproduce the electronic data 22, based on the data fingerprint 220. A single API call, for example, may be used to retrieve the data fingerprint 220, perhaps with an additional payload as the electronic data 22.
Exemplary embodiments may also include a central repository. Even though the master blockchain 110 may be used a publication and/or archival system, the server 54 may also act as a clearinghouse or central repository for all the activities conducted by the smartphone 32. That is, because there may be multiple blockchains 70 (as this disclosure explains), the server 54 may store any blockchain 70 in an electronic database. The electronic database may have entries that electronically map, relate, or associate the blockchain 70 to the corresponding noun identifier 90 (e.g., the device identifier 58, the model identifier 98, and/or user identifier 100). The electronic database may thus organize and/or group the data records contained within, or referenced by, the master blockchain 110 and/or the multiple sub-blockchains 112a-c according to the mobile device 30, the learning model 20, and/or the current user. The server 54 may thus receive queries from client devices specifying the noun identifier 90 and identify the corresponding data records distributed via the master blockchain 110 and/or the multiple sub-blockchains 112a-c. The server 54 may even send query responses to the client devices, and the query responses may specify or even include the corresponding data records. The server 54 may thus act as a historical repository for the activities conducted by the smartphone 32, the learning model 20, and/or the current user. The server may historically log the local update 50 (such as the data fingerprint 220) in the electronic database in electronic association with the noun identifier 90. Again, then, the server 54 may act as a historical repository for the activities conducted by the smartphone 32, the learning model 20, and/or the current user.
Exemplary embodiments may be applied to any signaling standard. Most readers are thought familiar with the Global System for Mobile (GSM) communications signaling standard. Those of ordinary skill in the art, however, also recognize that exemplary embodiments are equally applicable to any communications device utilizing the Time Division Multiple Access signaling standard, the Code Division Multiple Access signaling standard, the “dual-mode” GSM-ANSI Interoperability Team (GAIT) signaling standard, or any variant of the GSM/CDMA/TDMA signaling standard. Exemplary embodiments may also be applied to other standards, such as the I.E.E.E. 802 family of standards, the Industrial, Scientific, and Medical band of the electromagnetic spectrum, BLUETOOTH®, and any other.
Exemplary embodiments may be physically embodied on or in a computer-readable storage medium. This computer-readable medium, for example, may include CD-ROM, DVD, tape, cassette, floppy disk, optical disk, memory card, memory drive, and large-capacity disks. This computer-readable medium, or media, could be distributed to end-subscribers, licensees, and assignees. A computer program product comprises processor-executable instructions for reproducing and/or verifying data in learning models, as the above paragraphs explained.
While the exemplary embodiments have been described with respect to various features, aspects, and embodiments, those skilled and unskilled in the art will recognize the exemplary embodiments are not so limited. Other variations, modifications, and alternative embodiments may be made without departing from the spirit and scope of the exemplary embodiments.
This patent application is a continuation of U.S. application Ser. No. 16/877,614 filed May 19, 2020 and since issued as U.S. Pat. No. 11,044,097, which is a continuation of U.S. application Ser. No. 16/351,606 filed Mar. 13, 2019 and since issued as U.S. Pat. No. 10,693,652, which is a continuation of U.S. application Ser. No. 15/499,558 filed Apr. 27, 2017 and since issued as U.S. Pat. No. 10,270,599, with all patent applications is incorporated herein by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
4309569 | Merkel | Jun 1982 | A |
5499294 | Friedman | Mar 1996 | A |
5606609 | Houser | Feb 1997 | A |
5862218 | Steinberg | Jan 1999 | A |
5920629 | Rosen | Jul 1999 | A |
5966446 | Davis | Oct 1999 | A |
6363481 | Hardjono | Mar 2002 | B1 |
7028263 | Maguire | Apr 2006 | B2 |
7212808 | Eric | May 2007 | B2 |
7272179 | Siemens et al. | Sep 2007 | B2 |
7572179 | Choi et al. | Aug 2009 | B2 |
7729950 | Mendizabal et al. | Jun 2010 | B2 |
7730113 | Payette | Jun 2010 | B1 |
8245038 | Golle et al. | Aug 2012 | B2 |
8266439 | Haber et al. | Sep 2012 | B2 |
8359361 | Thornton | Jan 2013 | B2 |
8442903 | Zadoorian et al. | May 2013 | B2 |
8560722 | Gates et al. | Oct 2013 | B2 |
8612477 | Becker | Dec 2013 | B2 |
8706616 | Flynn | Apr 2014 | B1 |
8712887 | DeGroeve et al. | Apr 2014 | B2 |
8867741 | McCorkindale et al. | Oct 2014 | B2 |
8943332 | Horne et al. | Jan 2015 | B2 |
8990322 | Cai | Mar 2015 | B2 |
9124423 | Jennas, II et al. | Sep 2015 | B2 |
9378343 | David | Jun 2016 | B1 |
9396006 | Kundu et al. | Jul 2016 | B2 |
9398018 | MacGregor | Jul 2016 | B2 |
9407431 | Bellare et al. | Aug 2016 | B2 |
9411524 | O'Hare et al. | Aug 2016 | B2 |
9411976 | Irvine | Aug 2016 | B2 |
9411982 | Dippenaar et al. | Aug 2016 | B1 |
9424576 | Vandervort | Aug 2016 | B2 |
9436923 | Sriram | Sep 2016 | B1 |
9436935 | Hudon | Sep 2016 | B2 |
9472069 | Roskowski | Oct 2016 | B2 |
9489827 | Quinn et al. | Nov 2016 | B2 |
9584493 | Leavy | Feb 2017 | B1 |
9588790 | Wagner | Mar 2017 | B1 |
9647977 | Levasseur | May 2017 | B2 |
9722790 | Ebrahimi | Aug 2017 | B2 |
9818109 | Loh | Nov 2017 | B2 |
9830580 | MacGregor | Nov 2017 | B2 |
9875510 | Kasper | Jan 2018 | B1 |
9876646 | Ebrahimi | Jan 2018 | B2 |
9882918 | Ford et al. | Jan 2018 | B1 |
10025941 | Griffin | Jul 2018 | B1 |
10046228 | Tran | Aug 2018 | B2 |
10102265 | Madisetti | Oct 2018 | B1 |
10102526 | Madisetti | Oct 2018 | B1 |
10108954 | Dunlevy | Oct 2018 | B2 |
10135607 | Roets | Nov 2018 | B1 |
10163080 | Chow | Dec 2018 | B2 |
10270599 | Nadeau | Apr 2019 | B2 |
10346815 | Glover | Jul 2019 | B2 |
10355869 | Bisti | Jul 2019 | B2 |
10366204 | Tanner, Jr. | Jul 2019 | B2 |
10373129 | James | Aug 2019 | B1 |
10411897 | Paolini-Subramanya | Sep 2019 | B2 |
10419225 | Deery | Sep 2019 | B2 |
10438285 | Konstantinides | Oct 2019 | B1 |
10476847 | Smith | Nov 2019 | B1 |
10532268 | Tran | Jan 2020 | B2 |
10586270 | Reddy | Mar 2020 | B2 |
10628268 | Baruch | Apr 2020 | B1 |
10685399 | Snow | Jun 2020 | B2 |
10693652 | Nadeau | Jun 2020 | B2 |
10726346 | Saxena | Jul 2020 | B2 |
10749848 | Voell | Aug 2020 | B2 |
10764752 | Avetisov | Sep 2020 | B1 |
10783164 | Snow | Sep 2020 | B2 |
10817873 | Paolini-Subramanya | Oct 2020 | B2 |
10826685 | Campagna | Nov 2020 | B1 |
10855446 | Ow | Dec 2020 | B2 |
10873457 | Beaudoin | Dec 2020 | B1 |
10915895 | Fogg | Feb 2021 | B1 |
10929842 | Arvanaghi | Feb 2021 | B1 |
10949926 | Call | Mar 2021 | B1 |
10956973 | Chang | Mar 2021 | B1 |
10958418 | Ajoy | Mar 2021 | B2 |
10997159 | Iwama | May 2021 | B2 |
11042871 | Snow | Jun 2021 | B2 |
11044095 | Lynde | Jun 2021 | B2 |
11044097 | Snow | Jun 2021 | B2 |
11044100 | Deery | Jun 2021 | B2 |
11063770 | Peng | Jul 2021 | B1 |
11075744 | Tormasov | Jul 2021 | B2 |
11093933 | Peng | Aug 2021 | B1 |
11134120 | Snow | Sep 2021 | B2 |
11164250 | Snow | Nov 2021 | B2 |
11164254 | Gordon, III | Nov 2021 | B1 |
11170366 | Snow | Nov 2021 | B2 |
11171782 | Tang | Nov 2021 | B2 |
11205172 | Snow | Dec 2021 | B2 |
11276056 | Snow | Mar 2022 | B2 |
11295296 | Snow | Apr 2022 | B2 |
11296889 | Snow | Apr 2022 | B2 |
11328290 | Snow | May 2022 | B2 |
11334874 | Snow | May 2022 | B2 |
11347769 | Snow | May 2022 | B2 |
11348097 | Snow | May 2022 | B2 |
11348098 | Snow | May 2022 | B2 |
11423398 | Mullins | Aug 2022 | B1 |
11443370 | Snow | Sep 2022 | B2 |
20010029482 | Tealdi | Oct 2001 | A1 |
20030018563 | Kilgour et al. | Jan 2003 | A1 |
20040085445 | Park | May 2004 | A1 |
20050206741 | Raber | Sep 2005 | A1 |
20060075228 | Black et al. | Apr 2006 | A1 |
20060184443 | Erez et al. | Aug 2006 | A1 |
20070027787 | Tripp | Feb 2007 | A1 |
20070094272 | Yeh | Apr 2007 | A1 |
20070174630 | Shannon | Jul 2007 | A1 |
20070296817 | Ebrahimi et al. | Dec 2007 | A1 |
20080010466 | Hopper | Jan 2008 | A1 |
20080028439 | Shevade | Jan 2008 | A1 |
20080059726 | Rozas | Mar 2008 | A1 |
20090025063 | Thomas | Jan 2009 | A1 |
20090287597 | Bahar | Nov 2009 | A1 |
20100049966 | Kato | Feb 2010 | A1 |
20100058476 | Isoda | Mar 2010 | A1 |
20100161459 | Kass et al. | Jun 2010 | A1 |
20100228798 | Kodama | Sep 2010 | A1 |
20100241537 | Kass et al. | Sep 2010 | A1 |
20110061092 | Bailloeul | Mar 2011 | A1 |
20110161674 | Ming | Jun 2011 | A1 |
20120203670 | Piersol | Aug 2012 | A1 |
20120264520 | Marsland | Oct 2012 | A1 |
20130142323 | Chiarella | Jun 2013 | A1 |
20130222587 | Roskowski | Aug 2013 | A1 |
20130275765 | Lay | Oct 2013 | A1 |
20130276058 | Buldas | Oct 2013 | A1 |
20140022973 | Kopikare | Jan 2014 | A1 |
20140201541 | Paul | Jul 2014 | A1 |
20140229738 | Sato | Aug 2014 | A1 |
20140279762 | Xaypanya | Sep 2014 | A1 |
20140282852 | Vestevich | Sep 2014 | A1 |
20140289802 | Lee | Sep 2014 | A1 |
20140297447 | O'Brien | Oct 2014 | A1 |
20140344015 | Puertolas-Montasnes et al. | Nov 2014 | A1 |
20150052615 | Gault | Feb 2015 | A1 |
20150193633 | Chida | Jul 2015 | A1 |
20150206106 | Yago | Jul 2015 | A1 |
20150242835 | Vaughan | Aug 2015 | A1 |
20150244729 | Mao | Aug 2015 | A1 |
20150309831 | Powers | Oct 2015 | A1 |
20150332256 | Minor | Nov 2015 | A1 |
20150363769 | Ronca | Dec 2015 | A1 |
20150378627 | Kitazawa | Dec 2015 | A1 |
20150379484 | McCarthy | Dec 2015 | A1 |
20160002923 | Alobily | Jan 2016 | A1 |
20160012240 | Smith | Jan 2016 | A1 |
20160021743 | Pai | Jan 2016 | A1 |
20160071096 | Rosca | Mar 2016 | A1 |
20160098578 | Hincker | Apr 2016 | A1 |
20160119134 | Hakoda et al. | Apr 2016 | A1 |
20160148198 | Kelley | May 2016 | A1 |
20160162897 | Feeney | Jun 2016 | A1 |
20160217436 | Brama | Jul 2016 | A1 |
20160239653 | Loughlin-Mchugh | Aug 2016 | A1 |
20160253663 | Clark et al. | Sep 2016 | A1 |
20160260091 | Tobias | Sep 2016 | A1 |
20160267472 | Lingham et al. | Sep 2016 | A1 |
20160267558 | Bonnell et al. | Sep 2016 | A1 |
20160275294 | Irvine | Sep 2016 | A1 |
20160283920 | Fisher et al. | Sep 2016 | A1 |
20160292396 | Akerwall | Oct 2016 | A1 |
20160292672 | Fay et al. | Oct 2016 | A1 |
20160292680 | Wilson, Jr. et al. | Oct 2016 | A1 |
20160294783 | Piqueras Jover | Oct 2016 | A1 |
20160300200 | Brown et al. | Oct 2016 | A1 |
20160300234 | Moss-Pultz et al. | Oct 2016 | A1 |
20160321675 | McCoy et al. | Nov 2016 | A1 |
20160321751 | Creighton, IV et al. | Nov 2016 | A1 |
20160321769 | McCoy | Nov 2016 | A1 |
20160328791 | Parsells et al. | Nov 2016 | A1 |
20160330031 | Drego et al. | Nov 2016 | A1 |
20160330244 | Denton | Nov 2016 | A1 |
20160337119 | Hosaka et al. | Nov 2016 | A1 |
20160342977 | Lam | Nov 2016 | A1 |
20160342989 | Davis | Nov 2016 | A1 |
20160344737 | Anton et al. | Nov 2016 | A1 |
20160371771 | Serrano | Dec 2016 | A1 |
20170000613 | Lerf | Jan 2017 | A1 |
20170005797 | Lanc et al. | Jan 2017 | A1 |
20170005804 | Zinder | Jan 2017 | A1 |
20170033933 | Haber | Feb 2017 | A1 |
20170053249 | Tunnell et al. | Feb 2017 | A1 |
20170061396 | Melika et al. | Mar 2017 | A1 |
20170075938 | Black | Mar 2017 | A1 |
20170103167 | Shah | Apr 2017 | A1 |
20170124534 | Savolainen | May 2017 | A1 |
20170124535 | Juels et al. | May 2017 | A1 |
20170134162 | Code | May 2017 | A1 |
20170148016 | Davis | May 2017 | A1 |
20170161439 | Raduchel | Jun 2017 | A1 |
20170177898 | Dillenberger | Jun 2017 | A1 |
20170178237 | Wong | Jun 2017 | A1 |
20170213287 | Bruno | Jul 2017 | A1 |
20170221052 | Sheng | Aug 2017 | A1 |
20170228731 | Sheng | Aug 2017 | A1 |
20170236123 | Ali | Aug 2017 | A1 |
20170243208 | Kurian et al. | Aug 2017 | A1 |
20170243289 | Rufo | Aug 2017 | A1 |
20170244757 | Castinado et al. | Aug 2017 | A1 |
20170330279 | Ponzone | Nov 2017 | A1 |
20170344983 | Muftic | Nov 2017 | A1 |
20170346693 | Dix | Nov 2017 | A1 |
20170352031 | Collin | Dec 2017 | A1 |
20170353309 | Gray | Dec 2017 | A1 |
20170359374 | Smith | Dec 2017 | A1 |
20170364642 | Bogdanowicz | Dec 2017 | A1 |
20170373859 | Shors et al. | Dec 2017 | A1 |
20180005186 | Erato | Jan 2018 | A1 |
20180048599 | Arghandiwal | Feb 2018 | A1 |
20180075239 | Boutnaru | Mar 2018 | A1 |
20180075527 | Nagla et al. | Mar 2018 | A1 |
20180082043 | Witchey | Mar 2018 | A1 |
20180088928 | Smith | Mar 2018 | A1 |
20180091524 | Setty | Mar 2018 | A1 |
20180097779 | Karame et al. | Apr 2018 | A1 |
20180101701 | Barinov | Apr 2018 | A1 |
20180101842 | Ventura | Apr 2018 | A1 |
20180108024 | Greco | Apr 2018 | A1 |
20180117446 | Tran | May 2018 | A1 |
20180123779 | Zhang | May 2018 | A1 |
20180139042 | Binning | May 2018 | A1 |
20180144292 | Mattingly | May 2018 | A1 |
20180157700 | Roberts | Jun 2018 | A1 |
20180158034 | Hunt | Jun 2018 | A1 |
20180167201 | Naqvi | Jun 2018 | A1 |
20180173906 | Rodriguez | Jun 2018 | A1 |
20180176017 | Rodriguez | Jun 2018 | A1 |
20180181768 | Leporini | Jun 2018 | A1 |
20180182042 | Vinay | Jun 2018 | A1 |
20180189333 | Childress | Jul 2018 | A1 |
20180189781 | McCann | Jul 2018 | A1 |
20180204213 | Zappier | Jul 2018 | A1 |
20180219683 | Deery | Aug 2018 | A1 |
20180219685 | Deery | Aug 2018 | A1 |
20180225640 | Chapman | Aug 2018 | A1 |
20180225649 | Babar | Aug 2018 | A1 |
20180241565 | Paolini-Subramanya | Aug 2018 | A1 |
20180260888 | Paolini-Subramanya | Sep 2018 | A1 |
20180260889 | Paolini-Subramanya | Sep 2018 | A1 |
20180268162 | Dillenberger | Sep 2018 | A1 |
20180268382 | Wasserman | Sep 2018 | A1 |
20180268504 | Paolini-Subramanya | Sep 2018 | A1 |
20180276270 | Bisbee | Sep 2018 | A1 |
20180276668 | Li | Sep 2018 | A1 |
20180276745 | Paolini-Subramanya | Sep 2018 | A1 |
20180285879 | Gadnis | Oct 2018 | A1 |
20180285970 | Snow | Oct 2018 | A1 |
20180285971 | Rosenoer | Oct 2018 | A1 |
20180288022 | Madisetti | Oct 2018 | A1 |
20180315051 | Hurley | Nov 2018 | A1 |
20180316502 | Nadeau | Nov 2018 | A1 |
20180356236 | Lawrenson | Dec 2018 | A1 |
20180365201 | Hunn | Dec 2018 | A1 |
20180365686 | Kondo | Dec 2018 | A1 |
20180365764 | Nelson | Dec 2018 | A1 |
20180367298 | Wright | Dec 2018 | A1 |
20190012637 | Gillen | Jan 2019 | A1 |
20190013948 | Mercuri | Jan 2019 | A1 |
20190018947 | Li | Jan 2019 | A1 |
20190034459 | Qiu | Jan 2019 | A1 |
20190036887 | Miller | Jan 2019 | A1 |
20190036957 | Smith | Jan 2019 | A1 |
20190043048 | Wright | Feb 2019 | A1 |
20190044727 | Scott | Feb 2019 | A1 |
20190050855 | Martino | Feb 2019 | A1 |
20190057382 | Wright | Feb 2019 | A1 |
20190065709 | Salomon | Feb 2019 | A1 |
20190073666 | Ortiz | Mar 2019 | A1 |
20190080284 | Kim | Mar 2019 | A1 |
20190081793 | Martino | Mar 2019 | A1 |
20190081796 | Chow | Mar 2019 | A1 |
20190087446 | Sharma | Mar 2019 | A1 |
20190123889 | Schmidt-Karaca | Apr 2019 | A1 |
20190132350 | Smith | May 2019 | A1 |
20190188699 | Thibodeau | Jun 2019 | A1 |
20190197532 | Jayachandran | Jun 2019 | A1 |
20190205563 | Gonzales, Jr. | Jul 2019 | A1 |
20190236286 | Scriber | Aug 2019 | A1 |
20190251557 | Jin | Aug 2019 | A1 |
20190253240 | Treat | Aug 2019 | A1 |
20190253258 | Thekadath | Aug 2019 | A1 |
20190268141 | Pandurangan | Aug 2019 | A1 |
20190268163 | Nadeau | Aug 2019 | A1 |
20190281259 | Palazzolo | Sep 2019 | A1 |
20190287107 | Gaur | Sep 2019 | A1 |
20190287199 | Messerges | Sep 2019 | A1 |
20190287200 | Schuler | Sep 2019 | A1 |
20190288832 | Dang | Sep 2019 | A1 |
20190296915 | Lancashire | Sep 2019 | A1 |
20190303623 | Reddy | Oct 2019 | A1 |
20190303887 | Wright | Oct 2019 | A1 |
20190306150 | Letz | Oct 2019 | A1 |
20190311357 | Madisetti | Oct 2019 | A1 |
20190324867 | Tang | Oct 2019 | A1 |
20190332691 | Beadles | Oct 2019 | A1 |
20190333054 | Cona | Oct 2019 | A1 |
20190334715 | Gray | Oct 2019 | A1 |
20190334912 | Sloane | Oct 2019 | A1 |
20190340586 | Sheng | Nov 2019 | A1 |
20190340607 | Lynn | Nov 2019 | A1 |
20190342422 | Li | Nov 2019 | A1 |
20190347444 | Lowagie | Nov 2019 | A1 |
20190347628 | Al-Naji | Nov 2019 | A1 |
20190349190 | Smith | Nov 2019 | A1 |
20190349426 | Smith | Nov 2019 | A1 |
20190354606 | Snow | Nov 2019 | A1 |
20190354607 | Snow | Nov 2019 | A1 |
20190354611 | Snow | Nov 2019 | A1 |
20190354724 | Lowagie | Nov 2019 | A1 |
20190354725 | Lowagie | Nov 2019 | A1 |
20190354964 | Snow | Nov 2019 | A1 |
20190356733 | Snow | Nov 2019 | A1 |
20190361917 | Tran | Nov 2019 | A1 |
20190372770 | Xu | Dec 2019 | A1 |
20190378128 | Moore | Dec 2019 | A1 |
20190385165 | Castinado | Dec 2019 | A1 |
20190386940 | Hong | Dec 2019 | A1 |
20190391540 | Westervelt | Dec 2019 | A1 |
20190391858 | Studnicka | Dec 2019 | A1 |
20190394044 | Snow | Dec 2019 | A1 |
20190394048 | Deery | Dec 2019 | A1 |
20200004263 | Dalla Libera | Jan 2020 | A1 |
20200004946 | Gilpin | Jan 2020 | A1 |
20200005290 | Madisetti | Jan 2020 | A1 |
20200019937 | Edwards | Jan 2020 | A1 |
20200034571 | Fett | Jan 2020 | A1 |
20200034813 | Calinog | Jan 2020 | A1 |
20200042635 | Douglass | Feb 2020 | A1 |
20200042960 | Cook | Feb 2020 | A1 |
20200042982 | Snow | Feb 2020 | A1 |
20200042983 | Snow | Feb 2020 | A1 |
20200042984 | Snow | Feb 2020 | A1 |
20200042985 | Snow | Feb 2020 | A1 |
20200042986 | Snow | Feb 2020 | A1 |
20200042987 | Snow | Feb 2020 | A1 |
20200042988 | Snow | Feb 2020 | A1 |
20200042990 | Snow | Feb 2020 | A1 |
20200042995 | Snow et al. | Feb 2020 | A1 |
20200044827 | Snow | Feb 2020 | A1 |
20200044856 | Lynde | Feb 2020 | A1 |
20200044857 | Snow | Feb 2020 | A1 |
20200065761 | Tatchell | Feb 2020 | A1 |
20200067907 | Avetisov | Feb 2020 | A1 |
20200075056 | Yang | Mar 2020 | A1 |
20200089690 | Qiu | Mar 2020 | A1 |
20200099524 | Schiatti | Mar 2020 | A1 |
20200099534 | Lowagie | Mar 2020 | A1 |
20200104712 | Katz | Apr 2020 | A1 |
20200118068 | Turetsky | Apr 2020 | A1 |
20200127812 | Schuler | Apr 2020 | A1 |
20200134760 | Messerges | Apr 2020 | A1 |
20200145219 | Sebastian | May 2020 | A1 |
20200167870 | Isaacson | May 2020 | A1 |
20200175506 | Snow | Jun 2020 | A1 |
20200195441 | Suen | Jun 2020 | A1 |
20200211011 | Anderson | Jul 2020 | A1 |
20200234386 | Blackman | Jul 2020 | A1 |
20200258061 | Beadles | Aug 2020 | A1 |
20200279324 | Snow | Sep 2020 | A1 |
20200279325 | Snow | Sep 2020 | A1 |
20200279326 | Snow | Sep 2020 | A1 |
20200280447 | Snow | Sep 2020 | A1 |
20200302433 | Green | Sep 2020 | A1 |
20200320097 | Snow | Oct 2020 | A1 |
20200320514 | Snow | Oct 2020 | A1 |
20200320521 | Snow | Oct 2020 | A1 |
20200320522 | Snow | Oct 2020 | A1 |
20200320620 | Snow | Oct 2020 | A1 |
20200374129 | Dilles | Nov 2020 | A1 |
20200382480 | Isaacson | Dec 2020 | A1 |
20200389294 | Soundararajan | Dec 2020 | A1 |
20210035092 | Pierce | Feb 2021 | A1 |
20210042758 | Durvasula | Feb 2021 | A1 |
20210044976 | Avetisov | Feb 2021 | A1 |
20210073212 | Conley | Mar 2021 | A1 |
20210073750 | Ledford | Mar 2021 | A1 |
20210090076 | Wright | Mar 2021 | A1 |
20210097602 | Eichel | Apr 2021 | A1 |
20210119785 | Ben-Reuven | Apr 2021 | A1 |
20210144149 | Simons | May 2021 | A1 |
20210174353 | Snow | Jun 2021 | A1 |
20210200653 | Jetzfellner | Jul 2021 | A1 |
20210201321 | Studnitzer | Jul 2021 | A1 |
20210201328 | Gunther | Jul 2021 | A1 |
20210226769 | Snow | Jul 2021 | A1 |
20210226773 | Snow | Jul 2021 | A1 |
20210241282 | Gu | Aug 2021 | A1 |
20210248514 | Cella | Aug 2021 | A1 |
20210266167 | Lohe | Aug 2021 | A1 |
20210266174 | Snow | Aug 2021 | A1 |
20210272103 | Snow | Sep 2021 | A1 |
20210273810 | Lynde | Sep 2021 | A1 |
20210273816 | Deery | Sep 2021 | A1 |
20210326815 | Brody | Oct 2021 | A1 |
20210342836 | Cella | Nov 2021 | A1 |
20210366586 | Ryan | Nov 2021 | A1 |
20220006641 | Snow | Jan 2022 | A1 |
20220012731 | Derosa-Grund | Jan 2022 | A1 |
20220019559 | Snow | Jan 2022 | A1 |
20220020001 | Snow | Jan 2022 | A1 |
20220023742 | Tran | Jan 2022 | A1 |
20220027893 | Snow | Jan 2022 | A1 |
20220027897 | Snow | Jan 2022 | A1 |
20220027994 | Snow | Jan 2022 | A1 |
20220027995 | Snow | Jan 2022 | A1 |
20220027996 | Snow | Jan 2022 | A1 |
20220029805 | Snow | Jan 2022 | A1 |
20220030054 | Snow | Jan 2022 | A1 |
20220034004 | Snow | Feb 2022 | A1 |
20220040557 | Tran | Feb 2022 | A1 |
20220043831 | Douglass | Feb 2022 | A1 |
20220044162 | Zhang | Feb 2022 | A1 |
20220058622 | Snow | Feb 2022 | A1 |
20220058623 | Snow | Feb 2022 | A1 |
20220083991 | Kemper | Mar 2022 | A1 |
20220103341 | Snow | Mar 2022 | A1 |
20220103343 | Snow | Mar 2022 | A1 |
20220103344 | Snow | Mar 2022 | A1 |
20220103364 | Snow | Mar 2022 | A1 |
20220141231 | Simons | May 2022 | A1 |
20220156737 | Wright | May 2022 | A1 |
20220172207 | Cella | Jun 2022 | A1 |
20220173893 | Basu | Jun 2022 | A1 |
20220198554 | Filter | Jun 2022 | A1 |
20220215389 | Balaraman | Jul 2022 | A1 |
20220245626 | Sewell | Aug 2022 | A1 |
20230185783 | Haddad | Jun 2023 | A1 |
Number | Date | Country |
---|---|---|
107392618 | Nov 2017 | CN |
110392052 | Oct 2019 | CN |
110599147 | Dec 2019 | CN |
112329041 | Feb 2021 | CN |
10128728 | Jan 2003 | DE |
3726438 | Oct 2020 | EP |
3862947 | Aug 2021 | EP |
5383297 | Jan 2014 | JP |
2021152931 | Sep 2021 | JP |
100653512 | Nov 2006 | KR |
1747221 | May 2017 | KR |
101747221 | Jun 2017 | KR |
WO 0049797 | Aug 2000 | WO |
WO 2007069176 | Jun 2007 | WO |
WO 2015077378 | May 2015 | WO |
2017190795 | Nov 2017 | WO |
WO 2018013898 | Jan 2018 | WO |
WO 2018109010 | Jun 2018 | WO |
2018127923072018 | Jul 2018 | WO |
WO 2018127923 | Jul 2018 | WO |
2019180702 | Sep 2019 | WO |
2019207504 | Oct 2019 | WO |
2020125839 | Jun 2020 | WO |
Entry |
---|
“Money in programmable applications: Cross-sector perspectives from the German economy”, Deutsche Bundesbank Eurosystem, https://www.bundesbank.de, 18 pages, 2020. |
Ana Reyna et al.; On blockchain and its integration with IoT. Challenges and opportunities. Future generation computer systems. vol. 88, Nov. 2018, pp. 173-190. https://www.sciencedirect.com/science/article/pii/S0167739X17329205 (Year: 2018). |
Dai et al. TrialChain: A Blockchain-Based Platform to Validate Data Integrity in Large, Biomedical Research Studies arXiv: 1807.03662 Jul. 10, 2018 (Year: 2018). |
Eberhardt et al., “ZoKrates—Scalable Privacy-Preserving Off-Chain Computations,” https://ieeeexplore.ieee.org/stamp/JSP?tp:::&armumber:::8726497. (Year:2018). |
Feng and Luo, “Evaluating Memory-Hard Proof-of-Work Algorithms on Three Processors,” PVLDB, 13(6): 898-911, 2020. |
Fernandez-Carames et al.; A Review on the Use of Blockchain for the Internet of Things. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8370027 (Year: 2018). 23 pages. |
Iddo Bentov, Bitcoin and Secure Computation with Money, May 2016 (Year: 2016). |
Kroeger, T. et al., The Case for Distributed Data Archival Using Secret Splitting with Percival, 6th International Symposium on Resilient Control Systems (available at IEEE Xplore), p. 204-209 (Year: 2013). |
Krol, Michal et al., “SPOC: Secure Payments for Outsourced Computations” https://arxiv.org/pdf/1807.06462.pdf. (Year: 2018). |
Luther, “Do We Need a “Fedcoin” Cryptocurrency?,” ValueWalk, Newstex Global Business Blogs, Dec. 30, 2015 (Year: 2015). |
Muhamed et al. EduCTX: A Blockchain-Based Higher Education Credit Platform, https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8247166. (Year: 2017). 16 pages. |
Sokolowski, R. (2011). Signed, sealed, delivered: EMortgages are protected from unauthorized alteration by something called a tamper seal. Mortgage Banking, 71(6), 108(4). Retrieved from https://dialog.proquest.com/professional/docview/1068158815? accountid=131444 (Year: 2011). |
United States: New Generation cryptocurrency, USDX Protocol, Offers Crypto Advantages and Fiat Pegging, Apr. 2, 2018 (Year: 2018). |
Why offchain storage is needed for blockchain_V4_1 Final (Year: 2018), by IBM, 13 pages. |
Written Opinion in PCT/US2021/040207, Inventor Snow, Mail date Oct. 7, 2021, 14 pages. |
ZoKrates—Scalable Privacy-Preserving Off-Chain Computations, by Jacob Eberhardt, Stefan Tai , 8 pages, Nov. 3, 2011 (Year: 2011). |
P. Sood, P. Palsania, S. Ahuja, S. Kumar, K. Khatter and A. Mishra, “Decentralised & Collaborative DocuPad Using Blockchain,” 2022 IEEE Delhi Section Conference (DELCON), New Delhi, India, 2022, pp. 1-8, doi: 10.1109/DELCON54057.2022.9752853. ( Year: 2022). |
Merkle Mountain Ranges (MMRs)—Grin Documentation, https://quentinlesceller.github.io/grin-docs/technical/building-blocks/merkle-mountain-ranges/, 5 pages, printed Jun. 1, 2022. |
Merkle Mountain Ranges, https://github.com/opentimestamps/opentimestamps-server/blob/master/doc/merkle-mountain-range.md, 3 pages, printed Jun. 1, 2022. |
Michelson, Kyle, et al., “Accumulate: An identity-based blockchain protocol with cross-chain support, human-readable addresses, and key management capabilities”, Accumulate Whitepaper, v1.0, Jun. 12, 2022, 28 pages. |
MOF-BC: A Memory Optimized and Flexible BlockChain for Large Scale Networks. lle:///C:/Users/eoussir/Documents/e-Red%20Folder/16905961/NPL_MOF_BC_A%20Memory%20Optimized%20and%20Flexible%20Blockchain.pdf (Year:2018) 43 pages. |
On blockchain and its integration with IoT. Challenges and opportunities. file:///C:/Users/eoussir/Downloads/1-s2.0S0167739X17329205-main%20(1). pdf (Year: 2018) 18 pages. |
Watanabe, Hiroki, et al. “Blockchain contract: Securing a blockchain applied to smart contracts.” 2016 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2016. |
Crosby, Michael et al., “BlockChain Technology, Beyond Bitcoin”, Sutardja Center for Entrepreneurship & Technology, Berkeley Engineering, Oct. 16, 2015, 35 pages. |
Alsolami, Fahad, and Terrance E. Boult. “CloudStash: using secret-sharing scheme to secure data, not keys, in multi-clouds.” Information Technology: New Generations (ITNG), 2014 11th International Conference on. IEEE, 2014. |
Unknown, “Midex”, https://promo.midex.com/Midex_EN.pdf, 25 pages. |
Unknown, Xtrade White Paper, https://xtrade1-9649.kxcdn.com/wp-content/uploads/2017/09/xtrade-whitepaper.pdf Feb. 7, 2018, 37 pages. |
Haarmann, et al., “DMN Decision Execution on the Ethereum Blockchain,” Hasso Plattner Institute, University of Potsdam, 15 pages. |
Kim et al., “A Perspective on Blockchain Smart Contracts,” Schulich School of Business, York University, Toronto, Canada, 6 pages. |
Chakravorty, Antorweep, and Chunming Rong, “Ushare: user controlled social media based on blockchain.” Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication. ACM, 2017. |
Chen, Zhixong, and Yixuan Zhu. “Personal Archive Service System using Blockchain Technology: Case Study, Promising and Challenging.” AI & Mobile Services (AIMS), 2017 IEEE International Conference on. IEEE, 2017. |
Al-Naji, Nader et al., “Basis: A Price-Stable Cryptocurrency with an Algorithmic Central Bank” www.basis.io Jun. 20, 2017, 27 pages. |
Unkown, “Federated Learning: Collaborative Machine Learning without Centralized Training Data” Apr. 6, 2017, 11 pages. |
Casey, “BitBeat: Factom Touts Blockchain Tool for Keeping Record Keepers Honest”, Wall Street Journal, Nov. 5, 2014. |
Menezes, Alfred. J., et al. “Handbook of Applied Cryptography,” 1997, CRC Press, p. 527-28. |
White, Ron, “How Computers Work,” Oct. 2003, QUE, Seventh Edition (Year: 2003), 23 pages. |
Luu et al., Making Smart Contracts Smarter, 2016. |
Number | Date | Country | |
---|---|---|---|
20210328804 A1 | Oct 2021 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16877614 | May 2020 | US |
Child | 17323067 | US | |
Parent | 16351606 | Mar 2019 | US |
Child | 16877614 | US | |
Parent | 15499558 | Apr 2017 | US |
Child | 16351606 | US |