Movatterモバイル変換


[0]ホーム

URL:


US20220036455A1 - Selection of cryptographic identifiers in a block - Google Patents

Selection of cryptographic identifiers in a block
Download PDF

Info

Publication number
US20220036455A1
US20220036455A1US16/941,380US202016941380AUS2022036455A1US 20220036455 A1US20220036455 A1US 20220036455A1US 202016941380 AUS202016941380 AUS 202016941380AUS 2022036455 A1US2022036455 A1US 2022036455A1
Authority
US
United States
Prior art keywords
events
data structure
cryptographic
block data
mempool
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/941,380
Inventor
Sheldon Bennett
Adrian Glover
James Stafford-Coyte
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DMG Blockchain Solutions Inc
Original Assignee
DMG Blockchain Solutions Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DMG Blockchain Solutions IncfiledCriticalDMG Blockchain Solutions Inc
Priority to US16/941,380priorityCriticalpatent/US20220036455A1/en
Assigned to DMG BLOCKCHAIN SOLUTIONS INC.reassignmentDMG BLOCKCHAIN SOLUTIONS INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GLOVER, ADRIAN, STAFFORD-COYTE, James, BENNETT, Sheldon
Priority to EP21849895.4Aprioritypatent/EP4189623A4/en
Priority to PCT/US2021/043546prioritypatent/WO2022026605A1/en
Publication of US20220036455A1publicationCriticalpatent/US20220036455A1/en
Priority to US18/160,281prioritypatent/US12315009B2/en
Priority to US19/087,281prioritypatent/US20250217890A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method for detecting and tracking tainted cryptographic wallets. The method measures a wallet's propensity to engage in criminal or suspicious activity. Naturally, transacting with a criminal is tantamount either to funding crime or laundering its proceeds, so it is in our collective interest to identify—and then monitor or quarantine—any wallet with criminal association. The method also automatically flags risky withdrawal requests in real-time for further review before committing them to the blockchain. In some embodiments, the exchange can quarantine wallets at a certain AddressScore.

Description

Claims (20)

1. A method of operating a pool of proof of work hashing processors (“hashing processors”) associated with a filter node and a filter node mempool comprising:
receiving, by the hashing processors of the filter node from a non-filter node mempool, a plurality of events each associated with a cryptographic identifier, wherein the hashing processors are configured to generate a block data structure that is appended to a blockchain data structure, the block data structure based on a subset of the plurality of events;
sorting the plurality of events based on each respective cryptographic identifier associated with each respective event of the plurality of events, wherein said sorting identifies events of the plurality of events to include in the subset where those events associated with a predetermined list of cryptographic identifiers are selectively excluded from the subset;
in response to association of events in the filter node mempool with the predetermined list of cryptographic identifiers, deleting those events from the filter node mempool;
propagating of events present in the filter node mempool post-deletion to other mempools;
generating, by the hashing processors, the block data structure based on the subset, wherein the block data structure is compatible with a blockchain network populated by the filter node and non-filter nodes; and
appending the block data structure to the blockchain data structure of the blockchain network populated by the filter node and non-filter nodes.
11. A filter node system comprising:
a pool of hashing processors executing a filter node protocol and configured to receive, via a network interface, a plurality of events each associated with a cryptographic identifier, wherein the pool of hashing processors are configured to generate a block data structure that is appended to a blockchain data structure, the block data structure based on a subset of the plurality of events;
a filter node mempool associated with the pool of hashing processors, the filter node mempool storing the plurality of events, wherein at least a portion of the plurality of events were received by the filter node mempool from a non-filter node mempool;
a memory including a predetermined list of cryptographic identifiers and filter node protocol instructions that when executed cause the hashing processors to sort the plurality of events based on each respective cryptographic identifier associated with the plurality of events, wherein the sorting identifies events of the plurality of events to include in the subset where those events associated with the predetermined list of cryptographic identifiers are selectively excluded from the subset, and the instructions further cause the hashing processors to generate the block data structure based on the subset, wherein the block data structure is compatible with a blockchain network populated by the filter node and non-filter nodes, and wherein the memory further includes instructions that when executed delete events associated with the predetermined list of cryptographic identifiers from the filter node mempool in response to the association of those events with the predetermined list of cryptographic identifiers, thereby preventing propagation of the those events from the filter node mempool to other mempools; and
a network interface configured to append the block data structure to the blockchain data structure of the blockchain network populated by the filter node and non-filter nodes.
17. A computer-readable storage medium storing instructions that, when executed by a computing system, cause the computing system to perform a process comprising:
receiving, by hashing processors of a filter node from a non-filter node mempool, a plurality of events each associated with a cryptographic identifier, wherein the hashing processors are configured to generate a block data structure that is appended to a blockchain data structure, the block data structure based on a subset of the plurality of events;
sorting the plurality of events based on each respective cryptographic identifier associated with each respective event of the plurality of events, wherein said sorting identifies events of the plurality of events to include in the subset where those events associated with a predetermined list of cryptographic identifiers are selectively excluded from the subset;
in response to association of events in a filter node mempool with the predetermined list of cryptographic identifiers, deleting those events from the filter node mempool;
propagating of events present in the filter node mempool post-deletion to other mempools;
generating, by the hashing processors, the block data structure based on the subset, wherein the block data structure is compatible with a blockchain network populated by the filter node and non-filter nodes; and
appending the block data structure to the blockchain network populated by the filter node and non-filter nodes.
US16/941,3802020-07-282020-07-28Selection of cryptographic identifiers in a blockAbandonedUS20220036455A1 (en)

Priority Applications (5)

Application NumberPriority DateFiling DateTitle
US16/941,380US20220036455A1 (en)2020-07-282020-07-28Selection of cryptographic identifiers in a block
EP21849895.4AEP4189623A4 (en)2020-07-282021-07-28Selection of cryptographic identifiers in a block
PCT/US2021/043546WO2022026605A1 (en)2020-07-282021-07-28Selection of cryptographic identifiers in a block
US18/160,281US12315009B2 (en)2020-07-282023-01-26Selection of cryptographic identifiers in a block
US19/087,281US20250217890A1 (en)2020-07-282025-03-21Selection of cryptographic identifiers in a block

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US16/941,380US20220036455A1 (en)2020-07-282020-07-28Selection of cryptographic identifiers in a block

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
PCT/US2021/043546ContinuationWO2022026605A1 (en)2020-07-282021-07-28Selection of cryptographic identifiers in a block

Publications (1)

Publication NumberPublication Date
US20220036455A1true US20220036455A1 (en)2022-02-03

Family

ID=80003372

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US16/941,380AbandonedUS20220036455A1 (en)2020-07-282020-07-28Selection of cryptographic identifiers in a block
US18/160,281Active2040-11-16US12315009B2 (en)2020-07-282023-01-26Selection of cryptographic identifiers in a block
US19/087,281PendingUS20250217890A1 (en)2020-07-282025-03-21Selection of cryptographic identifiers in a block

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US18/160,281Active2040-11-16US12315009B2 (en)2020-07-282023-01-26Selection of cryptographic identifiers in a block
US19/087,281PendingUS20250217890A1 (en)2020-07-282025-03-21Selection of cryptographic identifiers in a block

Country Status (3)

CountryLink
US (3)US20220036455A1 (en)
EP (1)EP4189623A4 (en)
WO (1)WO2022026605A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2024005824A1 (en)*2022-06-302024-01-04Google LlcDeduplication of non-fungible tokens in search index
US20240236144A9 (en)*2021-04-232024-07-11Dbappsecurity Co., LtdMethod and apparatus for identifying malicious mining behavior, and device and storage medium
US20240303733A1 (en)*2022-06-302024-09-12Google LlcGenerating a Comprehensive Non- Fungible Token Search Index

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN114826801A (en)*2022-03-032022-07-29杭州复杂美科技有限公司Block broadcasting method, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20180109541A1 (en)*2016-10-172018-04-19Arm Ltd.Blockchain mining using trusted nodes
US20180247191A1 (en)*2017-02-032018-08-30Milestone Entertainment LlcArchitectures, systems and methods for program defined entertainment state system, decentralized cryptocurrency system and system with segregated secure functions and public functions
US20190279215A1 (en)*2018-03-072019-09-12Coral ProtocolBlockchain transaction safety

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10554746B2 (en)*2016-11-142020-02-04International Business Machines CorporationDecentralized immutable storage blockchain configuration
CN112740252B (en)*2018-07-202024-08-09珊瑚协议有限公司 Security of blockchain transactions using smart contracts
US12277559B2 (en)*2018-11-272025-04-15Akamai Technologies, Inc.High performance distributed system of record with confidence-based consensus
CR20240221A (en)2019-06-132024-08-30Gutierrez Sheris Luis EduardoSystem and method using a fitness-gradient blockchain consensus
US11387979B2 (en)2019-12-232022-07-12International Business Machines CorporationPartially-ordered blockchain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20180109541A1 (en)*2016-10-172018-04-19Arm Ltd.Blockchain mining using trusted nodes
US20180247191A1 (en)*2017-02-032018-08-30Milestone Entertainment LlcArchitectures, systems and methods for program defined entertainment state system, decentralized cryptocurrency system and system with segregated secure functions and public functions
US20190279215A1 (en)*2018-03-072019-09-12Coral ProtocolBlockchain transaction safety

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
dos Santos, ("An Efficient Miner Strategy for Selecting Cryptocurrency Transactions", downloaded from https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8946174, attached as PDF file, dated 2019 (Year: 2019)*
Ipeirotis, "Analyzing the Amazon Mechanical Turk Marketplace", predating 2012; downloaded from https://archive.nyu.edu/bitstream/2451/29801/4/CeDER-10-04.pdf attached as PDF file; Wayback screen shot also provided for date proof (Year: 2012)*
Lee, "Cybercriminal Minds: An Investigative Study of Cryptocurrency Abuses in the Dark Web", dated 2019, downloaded from https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_09-1_Lee_paper.pdf and attached as PDF file (Year: 2019)*
OFAC, ("OFAC’S Proposed Virtual Currency Blacklist Could Complicate Sanctions, Crypto Compliance", dated 3/29/2018, downloaded from https://www.acfcs.org/ofacs-proposed-virtual-currency-blacklist-could-complicate-sanctions-crypto-compliance/ and attached as PDF file (Year: 2018)*

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20240236144A9 (en)*2021-04-232024-07-11Dbappsecurity Co., LtdMethod and apparatus for identifying malicious mining behavior, and device and storage medium
WO2024005824A1 (en)*2022-06-302024-01-04Google LlcDeduplication of non-fungible tokens in search index
US20240303733A1 (en)*2022-06-302024-09-12Google LlcGenerating a Comprehensive Non- Fungible Token Search Index
US20240303734A1 (en)*2022-06-302024-09-12Google LlcDeduplication of Non-Fungible Tokens in Search Index

Also Published As

Publication numberPublication date
US12315009B2 (en)2025-05-27
US20250217890A1 (en)2025-07-03
EP4189623A4 (en)2024-08-14
US20230177607A1 (en)2023-06-08
EP4189623A1 (en)2023-06-07
WO2022026605A1 (en)2022-02-03

Similar Documents

PublicationPublication DateTitle
US12315009B2 (en)Selection of cryptographic identifiers in a block
US12238136B2 (en)Malware data clustering
Dou et al.Enhancing graph neural network-based fraud detectors against camouflaged fraudsters
KR102848672B1 (en) Systems and methods for anti-money laundering analysis
US12067572B2 (en)Cryptographic taint tracking
CN109087079B (en)Digital currency transaction information analysis method
US20200014708A1 (en)System security configurations based on assets associated with activities
US20120259753A1 (en)System and method for managing collaborative financial fraud detection logic
US20250165788A1 (en)Automatic triaging of network events
EP3881197A1 (en)Systems and method for scoring entities and networks in a knowledge graph
CN110781229B (en) System and method for entity network analysis
Qi et al.Blockchain data mining with graph learning: A survey
US11711381B2 (en)Automatic hotspot identification in network graphs
US20240152903A1 (en)Custom mempool protocol associated with processing of cryptographic events
EP3908949A1 (en)Anomalous behaviour detection in a distributed transactional database
CN113850456A (en) A Risk Control Management System Based on Consortium Blockchain
CN114116799B (en)Method, device, terminal and storage medium for identifying abnormal transaction loop
CN116055156A (en) Method and device for detecting phishing addresses
CN119599789B (en) A digital resource transaction link tracking method, device, equipment and storage medium
Kavitha et al.Fraud detection in current scenario, sophistications and directions: a comprehensive survey
Deprez et al.GARG-AML against Smurfing: A Scalable and Interpretable Graph-Based Framework for Anti-Money Laundering
Reddy et al.Double Phased Algorithm for Frequent Sub Graph Mining with More Security
Liu et al.Graph Embedding-Based Money Laundering Detection for Ethereum. Electronics 2023, 12, 3180
CN118353705A (en) Threat map construction method, device, electronic device and storage medium
CN116091188A (en) Risk identification method and device based on consortium chain

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:DMG BLOCKCHAIN SOLUTIONS INC., CANADA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GLOVER, ADRIAN;BENNETT, SHELDON;STAFFORD-COYTE, JAMES;SIGNING DATES FROM 20200730 TO 20200807;REEL/FRAME:053457/0888

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp